default search action
14th SOUPS @ USENIX Security Symposium 2018: Baltimore, MD, USA
- Mary Ellen Zurko, Heather Richter Lipford:
Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018. USENIX Association 2018
User Authentication
- Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. 1-11 - Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
User Behaviors and Attitudes Under Password Expiration Policies. 13-30 - Elham Al Qahtani, Mohamed Shehab, Abrar Aljohani:
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. 31-46 - Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent E. Seamons, Daniel Zappala:
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal. 47-62
Behaviors and Practices
- Norbert Nthala, Ivan Flechais:
Informal Support Networks: an investigation into Home Data Security Practices. 63-82 - Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason I. Hong:
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. 83-102 - Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty:
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. 103-116 - Sonam Samat, Eyal Péer, Alessandro Acquisti:
Can Digital Face-Morphs Influence Attitudes and Online Behaviors? 117-125
Online Privacy
- Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, Elizabeth F. Churchill:
"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. 127-142 - Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su:
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. 143-157 - Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor:
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. 159-175 - Reham Ebada Mohamed, Sonia Chiasson:
Online Privacy and Aging of Digital Artifacts. 177-195
Data Exposure, Compromises, and Access
- Yixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub:
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. 197-216 - Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu:
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. 217-234 - Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster:
User Comfort with Android Background Resource Accesses in Different Contexts. 235-250 - Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. 251-263
Developers
- Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. 265-281 - Hala Assal, Sonia Chiasson:
Security in the Software Development Lifecycle. 281-296 - Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith:
Deception Task Design in Developer Password Studies: Exploring a Student Sample. 297-313 - Daniela Seabra Oliveira, Tian Lin, Muhammad Sajidur Rahman, Rad Akefirad, Donovan M. Ellis, Eliany Perez, Rahul Bobhate, Lois DeLong, Justin Cappos, Yuriy Brun:
API Blindspots: Why Experienced Developers Write Vulnerable Code. 315-328
Understanding and Mindsets
- Ambar Murillo, Andreas Kramm, Sebastian Schnorf, Alexander De Luca:
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration. 329-339 - Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. 341-356 - Julie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman:
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products. 357-373 - Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
A Comparative Usability Study of Key Management in Secure Email. 375-394
Models, Beliefs, and Perceptions
- Justin Wu, Daniel Zappala:
When is a Tree Really a Truck? Exploring Mental Models of Encryption. 395-409 - Julie M. Haney, Wayne G. Lutters:
"It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security. 411-425 - Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, Elissa M. Redmiles:
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality. 427-442 - James Nicholson, Lynne M. Coventry, Pam Briggs:
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. 443-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.