default search action
SOUPS 2014: Menlo Park, CA, USA
- Lorrie Faith Cranor, Lujo Bauer, Robert Biddle:
Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014. USENIX Association 2014, ISBN 978-1-931971-13-3
Perspectives on Privacy
- Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro Acquisti:
Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. SOUPS 2014: 1-18 - Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, Blase Ur:
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. SOUPS 2014: 19-35 - Ruogu Kang, Stephanie Brown, Laura Dabbish, Sara B. Kiesler:
Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. SOUPS 2014: 37-49 - Emilee J. Rader:
Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google. SOUPS 2014: 51-67
Warnings and Decisions
- Stefan Korff, Rainer Böhme:
Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. SOUPS 2014: 69-87 - Rick Wash, Emilee J. Rader, Kami Vaniea, Michelle Rizor:
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences. SOUPS 2014: 89-104 - Cristian Bravo-Lillo, Lorrie Faith Cranor, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper:
Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. 105-111 - Hazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny Consolvo:
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. SOUPS 2014: 113-128
Users and Security
- Jay Chen, Michael Paik, Kelly McCabe:
Exploring Internet Security Perceptions and Practices in Urban Ghana. SOUPS 2014: 129-142 - Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong:
The Effect of Social Influence on Security Sensitivity. SOUPS 2014: 143-157 - Bo Zhang, Na Wang, Hongxia Jin:
Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input. SOUPS 2014: 159-173 - Heather Rosoff, Jinshu Cui, Richard S. John:
Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations. SOUPS 2014: 175-186
Mobile
- Hui Xu, Yangfan Zhou, Michael R. Lyu:
Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. 187-198 - Jialiu Lin, Bin Liu, Norman M. Sadeh, Jason I. Hong:
Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. 199-212 - Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith:
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. 213-230
Authentication
- S. M. Taiabul Haque, Shannon Scielzo, Matthew K. Wright:
Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. 231-242 - Elizabeth Stobert, Robert Biddle:
The Password Life Cycle: User Behaviour in Managing Passwords. 243-255 - Saurabh Panjwani, Achintya Prakash:
Crowdsourcing Attacks on Biometric Systems. 257-269
Social Networks and Access Control
- Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, Alan Mislove:
Understanding and Specifying Social Access Control Lists. 271-283 - Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, Konstantin Beznosov:
To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. 285-300 - Pooya Jaferian, Hootan Rashtian, Konstantin Beznosov:
To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations. 301-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.