HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2007 Symposium on Usable Privacy and Security

Fullname:Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor; Jason Hong; Diana Smetters
Location:Pittsburgh, Pennsylvania
Dates:2007-Jul-18 to 2007-Jul-20
Publisher:ACM
Standard No:ISBN 1-59593-801-X, 978-1-59593-801-5; ACM DL: Table of Contents hcibib: SOUPS07
Papers:29
Pages:174
Links:Conference Home Page
  1. Passwords
  2. Privacy and access control
  3. Training and such
  4. SOUPS du jour
  5. Posters

Passwords

A second look at the usability of click-based graphical passwords BIBAFull-TextPDF 1-12
  Sonia Chiasson; Robert Biddle; P. C. van Oorschot
Reducing shoulder-surfing by using gaze-based password entry BIBAFull-TextPDF 13-19
  Manu Kumar; Tal Garfinkel; Dan Boneh; Terry Winograd
Modeling user choice in the PassPoints graphical password scheme BIBAFull-TextPDF 20-28
  Ahmet Emir Dirik; Nasir Memon; Jean-Camille Birget

Privacy and access control

Tracking website data-collection and privacy practices with the iWatch web crawler BIBAFull-TextPDFSlides 29-40
  Carlos Jensen; Chandan Sarkar; Christian Jensen; Colin Potts
Usability of anonymous web browsing: an examination of Tor interfaces and deployability BIBAFull-TextPDF 41-51
  Jeremy Clark; P. C. van Oorschot; Carlisle Adams
Measuring privacy loss and the impact of privacy protection in web browsing BIBAFull-TextPDF 52-63
  Balachander Krishnamurthy; Delfina Malandrino; Craig E. Wills
Lessons learned from the deployment of a smartphone-based access-control system BIBAFull-TextPDF 64-75
  Lujo Bauer; Lorrie Faith Cranor; Michael K. Reiter; Kami Vaniea

Training and such

Improving security decisions with polymorphic and audited dialogs BIBAFull-TextPDFSlides 76-87
  José Carlos Brustoloni; Ricardo Villamarín-Salomón
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish BIBAFull-TextPDF 88-99
  Steve Sheng; Bryant Magnien; Ponnurangam Kumaraguru; Alessandro Acquisti; Lorrie Faith Cranor; Jason Hong; Elizabeth Nunge
Towards understanding IT security professionals and their tools BIBAFull-TextPDFFull-Text 100-111
  David Botta; Rodrigo Werlinger; André Gagné; Konstantin Beznosov; Lee Iverson; Sidney Fels; Brian Fisher

SOUPS du jour

An honest man has nothing to fear: user perceptions on web-based information disclosure BIBAFull-TextPDF 112-121
  Gregory Conti; Edward Sobiesk
Facemail: showing faces of recipients to prevent misdirected email BIBAFull-TextPDFPPT 122-131
  Eric Lieberman; Robert C. Miller
Bitfrost: the one laptop per child security model BIBAFull-TextPDF 132-142
  Ivan Krstiæ; Simson L. Garfinkel

Posters

A usability evaluation of a home monitoring system BIBAFull-TextPDF 143-144
  Rajah James; Woo Tae Kim; Aleecia M. McDonald; Robert McGuire
Establishing darknet connections: an evaluation of usability and security BIBAFull-TextPDF 145-146
  John Bethencourt; Wai Yong Low; Isaac Simmons; Matthew Williamson
Defeat spyware with anti-screen capture technology using visual persistence BIBAFull-TextPDF 147-148
  Johnny Lim
Detecting, analyzing and responding to security incidents: a qualitative analysis BIBAFull-TextPDF 149-150
  Rodrigo Werlinger; David Botta; Konstantin Beznosov
Helping users create better passwords: is this the right approach? BIBAFull-TextPDF 151-152
  Alain Forget; Sonia Chiasson; Robert Biddle
Perception and acceptance of fingerprint biometric technology BIBAFull-TextPDF 153-154
  Rosa R. Heckle; Andrew S. Patrick; Ant Ozok
Secure software installation in a mobile environment BIBAFull-TextPDF 155-156
  Andreas P. Heiner; N. Asokan
Examining privacy and disclosure in a social networking community BIBAFull-TextPDF 157-158
  Katherine Strater; Heather Richter
A survey of privacy concerns with dynamic collaborator discovery capabilities BIBAFull-TextPDF 159-160
  Robert L. Marchant
Graphical passwords & qualitative spatial relations BIBAFull-TextPDF 161-162
  Di Lin; Paul Dunphy; Patrick Olivier; Jeff Yan
Vidalia: towards a usable Tor GUI BIBAFull-TextPDF 163-164
  Matthew Edman; Justin Hipple
Is FacePIN secure and usable? BIBAFull-TextPDF 165-166
  Paul Dunphy; Jeff Yan
End user concern about security and privacy threats BIBAFull-TextPDF 167-168
  Joshua B. Gross; Mary Beth Rosson
TwoKind authentication: usable authenticators for untrustworthy environments BIBAFull-TextPDF 169-170
  Katelin Bailey; Linden Vongsathorn; Apu Kapadia; Chris Masone; Sean W. Smith
Seven privacy worries in ubiquitous social computing BIBAFull-TextPDF 171-172
  Sara Motahari; Constantine Manikopoulos; Roxanne Hiltz; Quentin Jones
Privacy implications for single sign-on authentication in a hospital environment BIBAFull-TextPDF 173-174
  Rosa R. Heckle; Wayne G. Lutters