HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2009 Symposium on Usable Privacy and Security

Fullname:Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor
Location:Mountain View, California
Dates:2009-Jul-15 to 2009-Jul-17
Standard No:ISBN 1-60558-736-2, 978-1-60558-736-3; ACM DL: Table of Contents hcibib: SOUPS09
Links:Conference Home Page
  1. Mental models
  2. Community
  3. Passwords and authentication
  4. Small devices
  5. Tools
  6. Tutorials
  7. Posters
  8. Posters showcasing usable privacy and security papers published in the past year at other conferences
  9. Invited talk
  10. Discussion sessions

Mental models

Revealing hidden context: improving mental models of personal firewall users BIBAKFull-Text 1
  Fahimeh Raja; Kirstie Hawkey; Konstantin Beznosov
Social applications: exploring a more secure framework BIBAKFull-Text 2
  Andrew Besmer; Heather Richter Lipford; Mohamed Shehab; Gorrell Cheek
School of phish: a real-word evaluation of anti-phishing training BIBAKFull-Text 3
  Ponnurangam Kumaraguru; Justin Cranshaw; Alessandro Acquisti; Lorrie Cranor; Jason Hong; Mary Ann Blair; Theodore Pham


A "nutrition label" for privacy BIBAKFull-Text 4
  Patrick Gage Kelley; Joanna Bresee; Lorrie Faith Cranor; Robert W. Reeder
Challenges in supporting end-user privacy and security management with social navigation BIBAKFull-Text 5
  Jeremy Goecks; W. Keith Edwards; Elizabeth D. Mynatt
Ubiquitous systems and the family: thoughts about the networked home BIBAKFull-Text 6
  Linda Little; Elizabeth Sillence; Pam Briggs

Passwords and authentication

Look into my eyes!: can you guess my password? BIBAKFull-Text 7
  Alexander De Luca; Martin Denzel; Heinrich Hussmann
Personal choice and challenge questions: a security and usability assessment BIBAKFull-Text 8
  Mike Just; David Aspinall
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication BIBAKFull-Text 9
  Stuart Schechter; Robert W. Reeder

Small devices

Serial hook-ups: a comparative usability study of secure device pairing methods BIBAFull-Text 10
  Alfred Kobsa; Rahim Sonawalla; Gene Tsudik; Ersin Uzun; Yang Wang
Usability and security of out-of-band channels in secure device pairing protocols BIBAKFull-Text 11
  Ronald Kainda; Ivan Flechais; A. W. Roscoe
Games for extracting randomness BIBAFull-Text 12
  Ran Halprin; Moni Naor


Sanitization's slippery slope: the design and study of a text revision assistant BIBAKFull-Text 13
  Richard Chow; Ian Oberst; Jessica Staddon
Balancing usability and security in a video CAPTCHA BIBAKFull-Text 14
  Kurt Alfred Kluever; Richard Zanibbi
How users use access control BIBAKFull-Text 15
  D. K. Smetters; Nathan Good


Designing and evaluating usable security and privacy technology BIBFull-Text 16
  M. Angela Sasse; Clare-Marie Karat; Roy Maxion
Think Evil (tm) BIBFull-Text 17
  Nicholas Weaver


Threshold things that think: usable authorization for resharing BIBFull-Text 18
  Roel Peeters; Markulf Kohlweiss; Bart Preneel; Nicky Sulmon
Not one click for security? BIBFull-Text 19
  Alan Karp; Marc Stiegler; Tyler Close
Privacy stories: confidence in privacy behaviors through end user programming BIBFull-Text 20
  Luke Church; Jonathan Anderson; Joesph Bonneau; Frank Stajano
A new graphical password scheme against spyware by using CAPTCHA BIBFull-Text 21
  Haichang Gao; Xiyang Liu
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing BIBFull-Text 22
  Michael Benisch; Patrick Gage Kelley; Norman Sadeh; Tuomas Sandholm; Janice Tsai; Lorrie Faith Cranor; Paul Hankes Drielsma
Designing for different levels of social inference risk BIBFull-Text 23
  Sara Motahari; Sotirios Ziavras; Quentin Jones
Integrating usability and accessibility in information assurance education BIBFull-Text 24
  Azene Zenebe; Claude Tuner; Jinjuan Feng; Jonathan Lazar; Mike O'Leary
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures BIBFull-Text 25
  Eiji Hayashi; Jason Hong; Nicolas Christin
BayeShield: conversational anti-phishing user interface BIBFull-Text 26
  Peter Likarish; Don Dunbar; Juan Pablo Hourcade; Eunjin Jung
Recall-a-story, a story-telling graphical password system BIBFull-Text 27
  Yves Maetz; Stéphane Onno; Olivier Heen
Escape from the matrix: lessons from a case-study in access-control requirements BIBFull-Text 28
  Kathi Fisler; Shriram Krishnamurthi
The impact of privacy indicators on search engine browsing patterns BIBFull-Text 29
  Janice Tsai; Serge Egelman; Lorrie Cranor; Alessandro Acquisti
Privacy suites: shared privacy for social networks BIBFull-Text 30
  Joseph Bonneau; Jonathan Anderson; Luke Church
Usable deidentification of sensitive patient care data BIBFull-Text 31
  Michael McQuaid; Kai Zheng; Nigel Melville; Lee Green
Analyzing use of privacy policy attributes in a location sharing application BIBFull-Text 32
  Eran Toch; Ramprasad Ravichandran; Lorrie Cranor; Paul Drielsma; Jason Hong; Patrick Kelley; Norman Sadeh; Janice Tsai
Studying location privacy in mobile applications: 'predator vs. prey' probes BIBFull-Text 33
  Keerthi Thomas; Clara Mancini; Lukasz Jedrzejczyk; Arosha K. Bandara; Adam Joinson; Blaine A. Price; Yvonne Rogers; Bashar Nuseibeh
Treat 'em like other devices: user authentication of multiple personal RFID tags BIBFull-Text 34
  Nitesh Saxena; Md. Borhan Uddin; Jonathan Voris
Textured agreements: re-envisioning electronic consent BIBFull-Text 35
  Matthew Kay; Michael Terry
A multi-method approach for user-centered design of identity management systems BIBFull-Text 36
  Pooya Jaferian; David Botta; Kirstie Hawkey; Konstantin Beznosov

Posters showcasing usable privacy and security papers published in the past year at other conferences

flyByNight: mitigating the privacy risks of social networking BIBFull-Text 37
  Matthew Lucas; Nikita Borisov
Conditioned-safe ceremonies and a user study of an application to web authentication BIBFull-Text 38
  Chris Karlof; J. D. Tygar; David Wagner
Graphical passwords as browser extension: implementation and usability study BIBFull-Text 39
  Kemal Bicakci; Mustafa Yuceel; Burak Erdeniz; Hakan Gurbaslar; Nart Bedin Atalay
It's no secret: measuring the security and reliability of authentication via 'secret' questions BIBFull-Text 40
  Stuart Schechter; A. J. Bernheim Brush; Serge Egelman
It's not what you know, but who you know: a social approach to last-resort authentication BIBFull-Text 41
  Stuart Schechter; Serge Egelman; Robert W. Reeder
A user study of the expandable grid applied to P3P privacy policy visualization BIBFull-Text 42
  Robert W. Reeder; Patrick Gage Kelley; Aleecia M. McDonald; Lorrie Faith Cranor
Who's viewed you?: the impact of feedback in a mobile location-sharing application BIBFull-Text 43
  Janice Tsai; Patrick Kelley; Paul Hankes Drielsma; Lorrie Cranor; Jason Hong; Norman Sadeh
New directions in multisensory authentication BIBFull-Text 44
  Madoka Hasegawa; Nicolas Christin; Eiji Hayashi
Machine learning attacks against the Asirra CAPTCHA BIBFull-Text 45
  Philippe Golle
A comparative study of online privacy policies and formats BIBFull-Text 46
  Aleecia M. McDonald; Robert W. Reeder; Patrick Gage Kelley; Lorrie Faith Cranor
Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? BIBFull-Text 47
  Ramprasad Ravichandran; Michael Benisch; Patrick Gauge Kelley; Norman Sadeh

Invited talk

Redirects to login pages are bad, or are they? BIBFull-Text 48
  Eric Sachs

Discussion sessions

Short and long term research suggestions for NSF and NIST BIBFull-Text 49
  Nancy Gillis
Ecological validity in studies of security and human behaviour BIBFull-Text 50
  Andrew Patrick
Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security BIBFull-Text 51
  Simson Garfinkel
Technology transfer of successful usable security research into product BIBFull-Text 52
  Mary Ellen Zurko
The family and communication technologies BIBFull-Text 53
  Linda Little
How does the emergence of reputation mechanisms affect the overall trust formation mechanisms, implicit and explicit, in the online environment? BIBFull-Text 54
  Kristiina Karvonen