Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2018Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled GardensOrçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten
    SOUPS 2018Action Needed! Helping Users Find and Complete the Authentication Ceremony in SignalElham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, Daniel Zappala
    SOUPS 2018User Comfort with Android Background Resource Accesses in Different ContextsDaniel Votipka, Seth M. Rabin, Kristopher Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster
    SOUPS 2018Programming Experience Might Not Help in Comprehending Obfuscated Source Code EfficientlyNorman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix Freiling, Zinaida Benenson
    SOUPS 2018Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API MisusePeter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl
    SOUPS 2018"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data BreachYixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub
    SOUPS 2017Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability MetricsCasey Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas
    SOUPS 2017DigiTally: Piloting Offline Payments for PhonesKhaled Baqer, Ross Anderson, Lorna Mutegi, Jeunese Adrienne Payne, Joseph Sevilla
    SOUPS 2017Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security PostureScott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent Seamons
    SOUPS 2017Turtle Guard: Helping Android Users Apply Contextual Privacy PreferencesLynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good, Jung-Wei Chen
    SOUPS 2017How Effective is Anti-Phishing Training for Children?Elmer Lastdrager, Inés Carvajal Gallardo, Pieter Hartel, Marianne Junger
    SOUPS 2017A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016Peter Mayer, Jan Kirchner, Melanie Volkamer
    SOUPS 2017Impact of User Characteristics on Attitudes Towards Automatic Mobile Application UpdatesArunesh Mathur, Marshini Chetty
    SOUPS 2017A Qualitative Investigation of Bank Employee Experiences of Information Security and PhishingDan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen
    SOUPS 2017Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging ApplicationsElham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala
    SOUPS 2017Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke DynamicsHeather Crawford, Ebad Ahmadzadeh
    SOUPS 2017The importance of visibility for folk theories of sensor dataEmilee Rader, Janine Slaker
    SOUPS 2017“I feel stupid I can’t delete...”: A Study of Users’ Cloud Deletion Practices and Coping StrategiesKopo Marvin Ramokapane, Awais Rashid, Jose Miguel Such
    SOUPS 2017Format vs. Content: The Impact of Risk and Presentation on Disclosure DecisionsSonam Samat, Alessandro Acquisti
    SOUPS 2017New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity NetworkKevin Gallagher, Sameer Patil, Nasir Memon
    SOUPS 2017Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase IntentionsSonam Samat, Alessandro Acquisti, Linda Babcock
    SOUPS 2017End User Security and Privacy Concerns with Smart HomesEric Zeng, Shrirang Mare, Franziska Roesner
    SOUPS 2017Diversify to Survive: Making Passwords Stronger with Adaptive PoliciesSean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek
    SOUPS 2017Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money ServicesJasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin Butler
    SOUPS 2017Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detectionJames Nicholson, Lynne Coventry, Pam Briggs

Pages