HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2014 Symposium on Usable Privacy and Security

Fullname:Tenth Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor; Lujo Bauer; Robert Biddle
Location:Menlo Park, California
Dates:2014-Jul-09 to 2014-Jul-11
Publisher:USENIX
Standard No:ISBN: 978-1-931971-13-3; hcibib: SOUPS14
Papers:21
Pages:320
Links:Conference Website | Online Proceedings
  1. Perspectives on Privacy
  2. Warnings and Decisions
  3. Users and Security
  4. Mobile
  5. Authentication
  6. Social Networks and Access Control

Perspectives on Privacy

Would a Privacy Fundamentalist Sell Their DNA for $1000...If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences BIBAFull-Text 1
  Allison Woodruff; Vasyl Pihur; Sunny Consolvo; Lauren Schmidt; Laura Brandimarte; Alessandro Acquisti
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World BIBAFull-Text 2
  Lorrie Faith Cranor; Adam L. Durity; Abigail Marsh; Blase Ur
Privacy Attitudes of Mechanical Turk Workers and the U.S. Public BIBAFull-Text 3
  Ruogu Kang; Stephanie Brown; Laura Dabbish; Sara Kiesler
Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google BIBAFull-Text 4
  Emilee Rader

Warnings and Decisions

Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation BIBAFull-Text 5
  Stefan Korff; Rainer Böehm
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences BIBAFull-Text 6
  Rick Wash; Emilee Rader; Kami Vaniea; Michelle Rizor
Harder to Ignore? BIBAFull-Text 7
  Cristian Bravo-Lillo; Lorrie Cranor; Saranga Komanduri; Stuart Schechter; Manya Sleeper
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning BIBAFull-Text 8
  Hazim Almuhimedi; Adrienne Porter Felt; Robert W. Reeder; Sunny Consolvo

Users and Security

Exploring Internet Security Perceptions and Practices in Urban Ghana BIBAFull-Text 9
  Jay Chen; Michael Paik; Kelly McCabe
The Effect of Social Influence on Security Sensitivity BIBAFull-Text 10
  Sauvik Das; Tiffany Hyun-Jin Kim; Laura A. Dabbish; Jason I. Hong
Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input BIBAFull-Text 11
  Bo Zhang; Na Wang; Hongxia Jin
Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations BIBAFull-Text 12
  Heather Rosoff; Jinshu Cui; Richard John

Mobile

Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones BIBAFull-Text 13
  Hui Xu; Yangfan Zhou; Michael R. Lyu
Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings BIBAFull-Text 14
  Jialiu Lin; Bin Liu; Norman Sadeh; Jason I. Hong
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception BIBAFull-Text 15
  Marian Harbach; Emanuel von Zezschwitz; Andreas Fichtner; Alexander De Luca; Matthew Smith

Authentication

Applying Psychometrics to Measure User Comfort when Constructing a Strong Password BIBAFull-Text 16
  S. M. Taiabul Haque; Shannon Scielzo; Matthew Wright
The Password Life Cycle: User Behaviour in Managing Passwords BIBAFull-Text 17
  Elizabeth Stobert; Robert Biddle
Crowdsourcing Attacks on Biometric Systems BIBAFull-Text 18
  Saurabh Panjwani; Achintya Prakash

Social Networks and Access Control

Understanding and Specifying Social Access Control Lists BIBAFull-Text 19
  Mainack Mondal; Yabing Liu; Bimal Viswanath; Krishna P. Gummadi; Alan Mislove
To Befriend Or Not? A Model of Friend Request Acceptance on Facebook BIBAFull-Text 20
  Hootan Rashtian; Yazan Boshmaf; Pooya Jaferian; Konstantin Beznosov
To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations BIBAFull-Text 21
  Pooya Jaferian; Hootan Rashtian; Konstantin Beznosov