HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2013 Symposium on Usable Privacy and Security

Fullname:Proceedings of the Ninth Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor; Lujo Bauer; Konstantin Beznosov
Location:Newcastle, United Kingdom
Dates:2013-Jul-24 to 2013-Jul-26
Publisher:ACM
Standard No:ISBN: 978-1-4503-2319-2; ACM DL: Table of Contents; hcibib: SOUPS13
Papers:15
Links:Conference Website
  1. Authentication and authorization
  2. SOUPS de jour
  3. Privacy
  4. Mobile devices
  5. Passwords

Authentication and authorization

When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources BIBAFull-Text 1
  Christopher Thompson; Maritza Johnson; Serge Egelman; David Wagner; Jennifer King
Formal definitions for usable access control rule sets from goals to metrics BIBAFull-Text 2
  Matthias Beckerle; Leonardo A. Martucci
CASA: context-aware scalable authentication BIBAFull-Text 3
  Eiji Hayashi; Sauvik Das; Shahriyar Amini; Jason Hong; Ian Oakley

SOUPS de jour

Retrospective privacy: managing longitudinal privacy in online social networks BIBAFull-Text 4
  Oshrat Ayalon; Eran Toch
Confused Johnny: when automatic encryption leads to confusion and mistakes BIBAFull-Text 5
  Scott Ruoti; Nathan Kim; Ben Burgon; Timothy van der Horst; Kent Seamons
Your attention please: designing security-decision UIs to make genuine risks harder to ignore BIBAFull-Text 6
  Cristian Bravo-Lillo; Saranga Komanduri; Lorrie Faith Cranor; Robert W. Reeder; Manya Sleeper; Julie Downs; Stuart Schechter

Privacy

What matters to users?: factors that affect users' willingness to share information with online advertisers BIBAFull-Text 7
  Pedro Giovanni Leon; Blase Ur; Yang Wang; Manya Sleeper; Rebecca Balebako; Richard Shay; Lujo Bauer; Mihai Christodorescu; Lorrie Faith Cranor
Do not embarrass: re-examining user concerns for online tracking and advertising BIBAFull-Text 8
  Lalit Agarwal; Nisheeth Shrivastava; Sharad Jaiswal; Saurabh Panjwani
Sleights of privacy: framing, disclosures, and the limits of transparency BIBAFull-Text 9
  Idris Adjerid; Alessandro Acquisti; Laura Brandimarte; George Loewenstein

Mobile devices

Modifying smartphone user locking behavior BIBAFull-Text 10
  Dirk Van Bruggen; Shu Liu; Mitch Kajzer; Aaron Striegel; Charles R. Crowell; John D'Arcy
Exploring the design space of graphical passwords on smartphones BIBAFull-Text 11
  Florian Schaub; Marcel Walch; Bastian Könings; Michael Weber
"Little brothers watching you": raising awareness of data leaks on smartphones BIBAFull-Text 12
  Rebecca Balebako; Jaeyeon Jung; Wei Lu; Lorrie Faith Cranor; Carolyn Nguyen

Passwords

On the ecological validity of a password study BIBAFull-Text 13
  Sascha Fahl; Marian Harbach; Yasemin Acar; Matthew Smith
Usability and security evaluation of GeoPass: a geographic location-password scheme BIBAFull-Text 14
  Julie Thorpe; Brent MacRae; Amirali Salehi-Abari
Memory retrieval and graphical passwords BIBAFull-Text 15
  Elizabeth Stobert; Robert Biddle