HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2010 Symposium on Usable Privacy and Security

Fullname:Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor
Location:Redmond, Washington
Dates:2010-Jul-14 to 2010-Jul-16
Standard No:ISBN 1-4503-0264-5, 978-1-4503-0264-7; ACM DL: Table of Contents hcibib: SOUPS10
Links:Conference Home Page
  1. Passwords and accounts
  2. Authentication for mobile devices
  3. Privacy
  4. Security models and decision making
  5. SOUPS du Jour

Passwords and accounts

Do windows users follow the principle of least privilege?: investigating user account control practices BIBAKFull-Text 1
  Sara Motiee; Kirstie Hawkey; Konstantin Beznosov
Encountering stronger password requirements: user attitudes and behaviors BIBAKFull-Text 2
  Richard Shay; Saranga Komanduri; Patrick Gage Kelley; Pedro Giovanni Leon; Michelle L. Mazurek; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor
A closer look at recognition-based graphical passwords on mobile devices BIBAKFull-Text 3
  Paul Dunphy; Andreas P. Heiner; N. Asokan

Authentication for mobile devices

Usably secure, low-cost authentication for mobile banking BIBAKFull-Text 4
  Saurabh Panjwani; Edward Cutrell
Two heads are better than one: security and usability of device associations in group scenarios BIBAKFull-Text 5
  Ronald Kainda; Ivan Flechais; A. W. Roscoe
Influence of user perception, security needs, and social factors on device pairing method choices BIBAKFull-Text 6
  Iulia Ion; Marc Langheinrich; Ponnurangam Kumaraguru; Srdjan Capkun


The impact of social navigation on privacy policy configuration BIBAKFull-Text 7
  Andrew Besmer; Jason Watson; Heather Richter Lipford
Optimizing a policy authoring framework for security and privacy policies BIBAKFull-Text 8
  Maritza Johnson; John Karat; Clare-Marie Karat; Keith Grueneberg
Feasibility of structural network clustering for group-based privacy control in social networks BIBAKFull-Text 9
  Simon Jones; Eamonn O'Neill

Security models and decision making

Where do security policies come from? BIBAFull-Text 10
  Dinei Florêncio; Cormac Herley
Folk models of home computer security BIBAKFull-Text 11
  Rick Wash
Improving users' security choices on home wireless networks BIBAKFull-Text 12
  Justin T. Ho; David Dearman; Khai N. Truong
Textured agreements: re-envisioning electronic consent BIBAKFull-Text 13
  Matthew Kay; Michael Terry

SOUPS du Jour

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications BIBAKFull-Text 14
  Lukasz Jedrzejczyk; Blaine A. Price; Arosha K. Bandara; Bashar Nuseibeh
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety BIBAKFull-Text 15
  Alexei Czeskis; Ivayla Dermendjieva; Hussein Yapit; Alan Borning; Batya Friedman; Brian Gill; Tadayoshi Kohno
Towards understanding ATM security: a field study of real world ATM use BIBAKFull-Text 16
  Alexander De Luca; Marc Langheinrich; Heinrich Hussmann