Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2017Valuating Friends’ Privacy: Does Anonymity of Sharing Personal Data Matter?Yu Pu, Jens Grossklags
    SOUPS 2017Exploring decision making with Android’s runtime permission dialogs using in-context surveysBram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft
    SOUPS 2017Self-driving cars and data collection: Privacy perceptions of networked autonomous vehiclesCara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer
    SOUPS 2017“...better to use a lock screen than to worry about saving a few seconds of time”: Effect of Fear Appeal in the Context of Smartphone Locking BehaviorYusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen
    SOUPS 2017Using chatbots against voice spam: Analyzing Lenny’s effectivenessMerve Sahin, Marc Relieu, Aurélien Francillon
    SOUPS 2017Privacy Expectations and Preferences in an IoT WorldPardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman Sadeh
    SOUPS 2017Security Developer Studies with GitHub Users: Exploring a Convenience SampleYasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl
    SOUPS 2017Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities
    SOUPS 2017Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe
    SOUPS 2017Formal Mental Models for Inclusive Privacy and Security
    SOUPS 2017You Want Me To Do What? A Design Study of Two-Factor Authentication Messages
    SOUPS 2017Smartwatches Locking Methods: A Comparative Study
    SOUPS 2017A Gamified Approach to Improve Users’ Memorability of Fall-back Authentication
    SOUPS 2017On the Design of Distributed Adaptive Authentication Systems
    SOUPS 2017Touchscreen Biometrics Across Multiple Devices
    SOUPS 2017Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques
    SOUPS 2017Augmenting Centralized Password Management with Application-Specific Passwords
    SOUPS 2017"I want my money back!" Limiting Online Password-Guessing Financially
    SOUPS 2017Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk
    SOUPS 2017The Shadow Warriors: In the no man’s land between industrial control systems and enterprise IT systems
    SOUPS 2017Skills and Characteristics of Successful Cybersecurity Advocates
    SOUPS 2017A Proposed Visualization for Vulnerability Scan Data
    SOUPS 2017Ask Me Anything: A Conversational Interface to Augment Information Security Workers
    SOUPS 2017Comparing Educational Approaches to Secure programming: Tool vs. TA
    SOUPS 2016How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy NoticesJoshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal

Pages