default search action
20th SOUPS @ USENIX Security Symposium 2024: Philadelphia, PA, USA
- Patrick Gage Kelley, Apu Kapadia:
Twentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024. USENIX Association 2024
Expert Community
- Samantha Katcher, Liana Wang, Caroline Yang, Chloé Messdaghi, Michelle L. Mazurek, Marshini Chetty, Kelsey R. Fulton, Daniel Votipka:
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community. 1-20 - Ivoline C. Ngong, Brad Stenger, Joseph P. Near, Yuanyuan Feng:
Evaluating the Usability of Differential Privacy Tools with Data Practitioners. 21-40 - Neele Roch, Hannah Sievers, Lorin Schöni, Verena Zimmermann:
Navigating Autonomy: Unveiling Security Experts' Perspectives on Augmented Intelligence in Cybersecurity. 41-60 - Miuyin Yong Wong, Matthew Landen, Frank Li, Fabian Monrose, Mustaque Ahamad:
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts. 61-80 - Kelsey R. Fulton, Joseph Lewis, Nathan Malkin, Michelle L. Mazurek:
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies. 81-100 - Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, Sepideh Ghanavati:
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams. 101-120
IoT and Privacy
- Maximiliane Windl, Jan Leusmann, Albrecht Schmidt, Sebastian S. Feger, Sven Mayer:
Privacy Communication Patterns for Domestic Robots. 121-138 - Shikun Zhang, Lily Klucinec, Kyerra Norton, Norman Sadeh, Lorrie Faith Cranor:
Exploring Expandable-Grid Designs to Make iOS App Privacy Labels More Usable. 139-157 - Geetika Gopi, Aadyaa Maddi, Omkhar Arasaratnam, Giulia Fanti:
Privacy Requirements and Realities of Digital Public Goods. 159-177 - Sunyup Park, Weijia He, Elmira Deldari, Pardis Emami Naeini, Danny Yuxing Huang, Jessica Vitak, Yaxing Yao, Michael Zimmer:
Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties. 179-198
Authentication and Authorization
- Maike M. Raphael, Aikaterini Kanta, Rico Seebonn, Markus Dürmuth, Camille Cobb:
Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies. 199-218 - Phoebe Moh, Andrew Yang, Nathan Malkin, Michelle L. Mazurek:
Understanding How People Share Passwords. 219-237 - Thomas Baumer, Tobias Reittinger, Sascha Kern, Günther Pernul:
Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. 239-258 - Maximilian Häring, Julia Angelika Grohs, Eva Tiefenau, Matthew Smith, Christian Tiefenau:
Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario. 259-278
Online Community
- Noel Warford, Nicholas Farber, Michelle L. Mazurek:
How Entertainment Journalists Manage Online Hate and Harassment. 279-295 - Madiha Tabassum, Alana Mackey, Ada Lerner:
'Custodian of Online Communities': How Moderator Mutual Support in Communities Help Fight Hate and Harassment Online. 297-314 - Yanlai Wu, Xinning Gui, Yuhan Luo, Yao Li:
Designing the Informing Process with Streamers and Bystanders in Live Streaming. 315-332 - Elijah Robert Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie Faith Cranor, Nicolas Christin:
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit. 333-352 - Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka:
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts. 353-372 - Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:
"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery. 373-392
Mobile Security
- Sarah Tabassum, Cori Faklaris, Heather Richter Lipford:
What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake. 393-411 - David G. Balash, Mir Masood Ali, Chris Kanich, Adam J. Aviv:
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. 413-432 - Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan A. Hutson, Damon McCoy:
"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications. 433-451 - Sarah Prange, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander De Luca, Florian Alt:
"I do (not) need that Feature!" - Understanding Users' Awareness and Control of Privacy Permissions on Android Smartphones. 453-472
Security in the Workplace
- Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. 473-486 - Xiaowei Chen, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, Vincent Koenig, Verena Distler:
What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. 487-506 - Sarah A. Alromaih, Ivan Flechais, George Chalhoub:
Beyond the Office Walls: Understanding Security and Shadow Security Behaviours in a Remote Work Context. 507-525 - Jan-Philip van Acken, Floris Jansen, Slinger Jansen, Katsiaryna Labunets:
Who is the IT Department Anyway: An Evaluative Case Study of Shadow IT Mindsets Among Corporate Employees. 527-545
Social Aspects of Security
- Nina Gerber, Alina Stöver, Peter Mayer:
Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field. 547-566 - Julie M. Haney, Clyburn Cunningham IV, Susanne M. Furman:
Towards Bridging the Research-Practice Gap: Understanding Researcher-Practitioner Interactions and Challenges in Human-Centered Cybersecurity. 567-586 - Joy McLeod, Leah Zhang-Kennedy, Elizabeth Stobert:
Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy Educational Resources. 587-603 - Lachlan Moore, Tatsuya Mori, Ayako Akiyama Hasegawa:
Negative Effects of Social Triggers on User Security and Privacy Behaviors. 605-622 - Alexandra von Preuschen, Monika C. Schuhmacher, Verena Zimmermann:
Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in Cybersecurity. 623-642
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.