SOUPS 2016 | Rethinking Connection Security Indicators | Adrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, Sunny Consolvo |
SOUPS 2016 | A Week to Remember: The Impact of Browser Warning Storage Policies | Joel Weinberger, Adrienne Porter Felt |
SOUPS 2016 | "They Keep Coming Back Like Zombies": Improving Software Updating Interfaces | Arunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty |
SOUPS 2016 | Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice | Michael Fagan, Mohammad Maifi Hasan Khan |
SOUPS 2016 | Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online | Ashwini Rao, Florian Schaub, Norman Sadeh, Alessandro Acquisti, Ruogu Kang |
SOUPS 2016 | Addressing Physical Safety, Security, and Privacy for People with Visual Impairments | Tousif Ahmed, Patrick Shaffer, Kay Connelly, David Crandall, Apu Kapadia |
SOUPS 2016 | An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems | Wei Bai, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek, Doowon Kim |
SOUPS 2016 | Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions | Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun (Aerin) Zhang, Norman Sadeh, Yuvraj Agarwal, Alessandro Acquisti |
SOUPS 2016 | Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users | Sadegh Torabi, Konstantin Beznosov |
SOUPS 2016 | Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US | Jeffrey Warshaw, Nina Taft, Allison Woodruff |
SOUPS 2016 | Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes | Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang |
SOUPS 2016 | Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours | Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, Angela Sasse |
SOUPS 2016 | Expert and Non-Expert Attitudes towards (Secure) Instant Messaging | Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie |
SOUPS 2016 | Snooping on Mobile Phones: Prevalence and Trends | Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Luís Carriço, Konstantin Beznosov |
SOUPS 2016 | Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices | Katharina Krombholz, Thomas Hupperich, Thorsten Holz |
SOUPS 2016 | User Attitudes Toward the Inspection of Encrypted Traffic | Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent Seamons |
SOUPS 2016 | Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites | Rick Wash, Emilee Rader, Ruthie Berman, Zac Wellmer |
SOUPS 2016 | A Study of Authentication in Daily Life | Shrirang Mare, Mary Baker, Jeremy Gummeson |
SOUPS 2016 | Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations | Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan |
SOUPS 2016 | Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones | Lalit Agarwal, Hassan Khan, Urs Hengartner |
SOUPS 2016 | Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data | Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate |
SOUPS 2016 | How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views | Charles Weir, Awais Rashid, James Noble |
SOUPS 2016 | What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool | Tyler W. Thomas, Heather Lipford, Bill Chu, Justin Smith, Emerson Murphy-Hill |
SOUPS 2016 | Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team | Sven Türpe, Laura Kocksch, Andreas Poller |
SOUPS 2016 | Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication | Flynn Wolf, Ravi Kuber, Adam J. Aviv |