SOUPS 2017 | Valuating Friends’ Privacy: Does Anonymity of Sharing Personal Data Matter? | Yu Pu, Jens Grossklags |
SOUPS 2017 | Exploring decision making with Android’s runtime permission dialogs using in-context surveys | Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft |
SOUPS 2017 | Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles | Cara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer |
SOUPS 2017 | “...better to use a lock screen than to worry about saving a few seconds of time”: Effect of Fear Appeal in the Context of Smartphone Locking Behavior | Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen |
SOUPS 2017 | Using chatbots against voice spam: Analyzing Lenny’s effectiveness | Merve Sahin, Marc Relieu, Aurélien Francillon |
SOUPS 2017 | Privacy Expectations and Preferences in an IoT World | Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman Sadeh |
SOUPS 2017 | Security Developer Studies with GitHub Users: Exploring a Convenience Sample | Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl |
SOUPS 2017 | Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities | |
SOUPS 2017 | Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe | |
SOUPS 2017 | Formal Mental Models for Inclusive Privacy and Security | |
SOUPS 2017 | You Want Me To Do What? A Design Study of Two-Factor Authentication Messages | |
SOUPS 2017 | Smartwatches Locking Methods: A Comparative Study | |
SOUPS 2017 | A Gamified Approach to Improve Users’ Memorability of Fall-back Authentication | |
SOUPS 2017 | On the Design of Distributed Adaptive Authentication Systems | |
SOUPS 2017 | Touchscreen Biometrics Across Multiple Devices | |
SOUPS 2017 | Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques | |
SOUPS 2017 | Augmenting Centralized Password Management with Application-Specific Passwords | |
SOUPS 2017 | "I want my money back!" Limiting Online Password-Guessing Financially | |
SOUPS 2017 | Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk | |
SOUPS 2017 | The Shadow Warriors: In the no man’s land between industrial control systems and enterprise IT systems | |
SOUPS 2017 | Skills and Characteristics of Successful Cybersecurity Advocates | |
SOUPS 2017 | A Proposed Visualization for Vulnerability Scan Data | |
SOUPS 2017 | Ask Me Anything: A Conversational Interface to Augment Information Security Workers | |
SOUPS 2017 | Comparing Educational Approaches to Secure programming: Tool vs. TA | |
SOUPS 2016 | How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices | Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal |