HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2011 Symposium on Usable Privacy and Security

Fullname:Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor
Location:Pittsburgh, Pennsylvania
Dates:2011-Jul-20 to 2011-Jul-22
Publisher:ACM
Standard No:ISBN 1-4503-0911-0, 978-1-4503-0911-0; ACM DL: Table of Contents hcibib: SOUPS11
Papers:15
Pages:253
Links:Conference Home Page
  1. Security warnings
  2. Authentication
  3. SOUPS du jour
  4. Privacy on social network sites
  5. Perceptions of privacy and security

Security warnings

A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings BIBAFull-Text 1
  Fahimeh Raja; Kirstie Hawkey; Steven Hsu; Kai-Le Clement Wang; Konstantin Beznosov
Using data type based security alert dialogs to raise online security awareness BIBAFull-Text 2
  Max-Emanuel Maurer; Alexander De Luca; Sylvia Kempe
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings BIBAFull-Text 3
  Andreas Sotirakopoulos; Kirstie Hawkey; Konstantin Beznosov

Authentication

What makes users refuse web single sign-on?: an empirical investigation of OpenID BIBAFull-Text 4
  San-Tsai Sun; Eric Pospisil; Ildar Muslukhov; Nuray Dindar; Kirstie Hawkey; Konstantin Beznosov
Breaking undercover: exploiting design flaws and nonuniform human behavior BIBAFull-Text 5
  Toni Perkoviæ; Shujun Li; Asma Mumtaz; Syed Ali Khayam; Yousra Javed; Mario Èagalj
Shoulder surfing defence for recall-based graphical passwords BIBAFull-Text 6
  Nur Haryani Zakaria; David Griffiths; Sacha Brostoff; Jeff Yan

SOUPS du jour

Heuristics for evaluating IT security management tools BIBAFull-Text 7
  Pooya Jaferian; Kirstie Hawkey; Andreas Sotirakopoulos; Maria Velez-Rojas; Konstantin Beznosov
Smartening the crowds: computational techniques for improving human verification to fight phishing scams BIBAFull-Text 8
  Gang Liu; Guang Xiang; Bryan A. Pendleton; Jason I. Hong; Wenyin Liu
Reciprocity attacks BIBAFull-Text 9
  Feng Zhu; Sandra Carpenter; Ajinkya Kulkarni; Swapna Kolimi

Privacy on social network sites

"I regretted the minute I pressed share": a qualitative study of regrets on Facebook BIBAFull-Text 10
  Yang Wang; Gregory Norcie; Saranga Komanduri; Alessandro Acquisti; Pedro Giovanni Leon; Lorrie Faith Cranor
ROAuth: recommendation based open authorization BIBAFull-Text 11
  Mohamed Shehab; Said Marouf; Christopher Hudel
Privacy: is there an app for that? BIBAFull-Text 12
  Jennifer King; Airi Lampinen; Alex Smolen

Perceptions of privacy and security

Home is safer than the cloud!: privacy concerns for consumer cloud storage BIBAFull-Text 13
  Iulia Ion; Niharika Sachdeva; Ponnurangam Kumaraguru; Srdjan Èapkun
Eyeing your exposure: quantifying and controlling information sharing for improved privacy BIBAFull-Text 14
  Roman Schlegel; Apu Kapadia; Adam J. Lee
Indirect content privacy surveys: measuring privacy without asking about it BIBAFull-Text 15
  Alex Braunstein; Laura Granka; Jessica Staddon