Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2016Rethinking Connection Security IndicatorsAdrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, Sunny Consolvo
    SOUPS 2016A Week to Remember: The Impact of Browser Warning Storage PoliciesJoel Weinberger, Adrienne Porter Felt
    SOUPS 2016"They Keep Coming Back Like Zombies": Improving Software Updating InterfacesArunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty
    SOUPS 2016Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security AdviceMichael Fagan, Mohammad Maifi Hasan Khan
    SOUPS 2016Expecting the Unexpected: Understanding Mismatched Privacy Expectations OnlineAshwini Rao, Florian Schaub, Norman Sadeh, Alessandro Acquisti, Ruogu Kang
    SOUPS 2016Addressing Physical Safety, Security, and Privacy for People with Visual ImpairmentsTousif Ahmed, Patrick Shaffer, Kay Connelly, David Crandall, Apu Kapadia
    SOUPS 2016An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption SystemsWei Bai, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek, Doowon Kim
    SOUPS 2016Follow My Recommendations: A Personalized Privacy Assistant for Mobile App PermissionsBin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun (Aerin) Zhang, Norman Sadeh, Yuvraj Agarwal, Alessandro Acquisti
    SOUPS 2016Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American UsersSadegh Torabi, Konstantin Beznosov
    SOUPS 2016Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the USJeffrey Warshaw, Nina Taft, Allison Woodruff
    SOUPS 2016Do or Do Not, There Is No Try: User Engagement May Not Improve Security OutcomesAlain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang
    SOUPS 2016Productive Security: A Scalable Methodology for Analysing Employee Security BehavioursAdam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, Angela Sasse
    SOUPS 2016Expert and Non-Expert Attitudes towards (Secure) Instant MessagingAlexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie
    SOUPS 2016Snooping on Mobile Phones: Prevalence and TrendsDiogo Marques, Ildar Muslukhov, Tiago Guerreiro, Luís Carriço, Konstantin Beznosov
    SOUPS 2016Use the Force: Evaluating Force-Sensitive Authentication for Mobile DevicesKatharina Krombholz, Thomas Hupperich, Thorsten Holz
    SOUPS 2016User Attitudes Toward the Inspection of Encrypted TrafficScott Ruoti, Mark O'Neill, Daniel Zappala, Kent Seamons
    SOUPS 2016Understanding Password Choices: How Frequently Entered Passwords Are Re-used across WebsitesRick Wash, Emilee Rader, Ruthie Berman, Zac Wellmer
    SOUPS 2016A Study of Authentication in Daily LifeShrirang Mare, Mary Baker, Jeremy Gummeson
    SOUPS 2016Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security OperationsSathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan
    SOUPS 2016Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for SmartphonesLalit Agarwal, Hassan Khan, Urs Hengartner
    SOUPS 2016Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared DataMainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate
    SOUPS 2016How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert ViewsCharles Weir, Awais Rashid, James Noble
    SOUPS 2016What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis ToolTyler W. Thomas, Heather Lipford, Bill Chu, Justin Smith, Emerson Murphy-Hill
    SOUPS 2016Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development TeamSven Türpe, Laura Kocksch, Andreas Poller
    SOUPS 2016Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile AuthenticationFlynn Wolf, Ravi Kuber, Adam J. Aviv

Pages