HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2015 Symposium on Usable Privacy and Security

Fullname:Eleventh Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor; Robert Biddle; Sunny Consolvo
Location:Ottawa, Canada
Dates:2015-Jul-22 to 2015-Jul-24
Standard No:ISBN: 978-1-931971-249; hcibib: SOUPS15
Links:Conference Website | Online Proceedings
  1. Privacy Attitudes and Comprehension
  2. Design and Compliance
  3. Authentication Experience
  4. Authentication Methods
  5. Mobile Privacy and Security
  6. Security Experience

Privacy Attitudes and Comprehension

A Design Space for Effective Privacy Notices BIBAFull-TextPDF 1-17
  Florian Schaub; Rebecca Balebako; Adam L. Durity; Lorrie Faith Cranor
"WTH..!?!" Experiences, Reactions, and Expectations Related to Online Privacy Panic Situations BIBAFull-TextPDF 19-38
  Julio Angulo; Martin Ortlieb
"My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security BIBAFull-TextPDF 39-52
  Ruogu Kang; Laura Dabbish; Nathaniel Fruchter; Sara Kiesler
User Perceptions of Sharing, Advertising, and Tracking BIBAFull-TextPDF 53-67
  Farah Chanchary; Sonia Chiasson

Design and Compliance

Leading Johnny to Water: Designing for Usability and Trust BIBAFull-TextPDF 69-88
  Erinn Atwater; Cecylia Bocovich; Urs Hengartner; Ed Lank; Ian Goldberg
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices BIBAFull-TextPDF 89-102
  Sarah J. Andrabi; Michael K. Reiter; Cynthia Sturton
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors BIBAFull-TextPDF 103-122
  John M. Blythe; Lynne Coventry; Linda Little

Authentication Experience

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab BIBAFull-TextPDF 123-140
  Blase Ur; Fumiko Noma; Jonathan Bees; Sean M. Segreti; Richard Shay; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor
Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets BIBAFull-TextPDF 141-150
  Paul Dunphy; Vasilis Vlachokyriakos; Anja Thieme; James Nicholson; John McCarthy; Patrick Olivier
"I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication BIBAFull-TextPDF 151-168
  Bryan Dosono; Jordan Hayes; Yang Wang

Authentication Methods

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication BIBAFull-TextPDF 169-183
  Alina Hang; Alexander De Luca; Matthew Smith; Michael Richter; Heinrich Hussmann
The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords BIBAFull-TextPDF 185-196
  Mahdi Nasrullah Al-Ameen; Kanis Fatema; Matthew Wright; Shannon Scielzo
On the Memorability of System-generated PINs: Can Chunking Help? BIBAFull-TextPDF 197-209
  Jun Ho Huh; Hyoungshick Kim; Rakesh B. Bobba; Masooda N. Bashir; Konstantin Beznosov
Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study BIBAFull-TextPDF 211-224
  Yusuf Albayram; Mohammad Maifi Hasan Khan

Mobile Privacy and Security

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying BIBAFull-TextPDF 225-239
  Hassan Khan; Urs Hengartner; Daniel Vogel
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps BIBAFull-TextPDF 241-255
  Takuya Watanabe; Mitsuaki Akiyama; Tetsuya Sakai; Hironori Washizaki; Tatsuya Mori
On the Impact of Touch ID on iPhone Passcodes BIBAFull-TextPDF 257-276
  Ivan Cherapau; Ildar Muslukhov; Nalin Asanka; Konstantin Beznosov
Learning Assigned Secrets for Unlocking Mobile Devices BIBAFull-TextPDF 277-295
  Stuart Schechter; Joseph Bonneau

Security Experience

Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia BIBAFull-TextPDF 297-308
  Deena Alghamdi; Ivan Flechais; Marina Jirotka
Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users BIBAFull-TextPDF 309-325
  Rick Wash; Emilee Rader
"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices BIBAFull-TextPDF 327-346
  Iulia Ion; Rob Reeder; Sunny Consolvo
A Human Capital Model for Mitigating Security Analyst Burnout BIBAFull-TextPDF 347-359
  Sathya Chandran Sundaramurthy; Alexandru G. Bardas; Jacob Case; Xinming Ou; Michael Wesch; John McHugh; S. Raj Rajagopalan