


default search action
SOUPS 2014: Menlo Park, CA, USA
- Lorrie Faith Cranor, Lujo Bauer, Robert Biddle:

Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014. USENIX Association 2014, ISBN 978-1-931971-13-3
Perspectives on Privacy
- Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro Acquisti:

Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. SOUPS 2014: 1-18 - Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, Blase Ur:

Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. SOUPS 2014: 19-35 - Ruogu Kang, Stephanie Brown, Laura Dabbish, Sara B. Kiesler:

Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. SOUPS 2014: 37-49 - Emilee J. Rader:

Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google. SOUPS 2014: 51-67
Warnings and Decisions
- Stefan Korff, Rainer Böhme:

Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. SOUPS 2014: 69-87 - Rick Wash, Emilee J. Rader, Kami Vaniea, Michelle Rizor:

Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences. SOUPS 2014: 89-104 - Cristian Bravo-Lillo, Lorrie Faith Cranor, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper:

Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. 105-111 - Hazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny Consolvo:

Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. SOUPS 2014: 113-128
Users and Security
- Jay Chen, Michael Paik, Kelly McCabe:

Exploring Internet Security Perceptions and Practices in Urban Ghana. SOUPS 2014: 129-142 - Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong:

The Effect of Social Influence on Security Sensitivity. SOUPS 2014: 143-157 - Bo Zhang, Na Wang, Hongxia Jin:

Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input. SOUPS 2014: 159-173 - Heather Rosoff, Jinshu Cui, Richard S. John:

Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations. SOUPS 2014: 175-186
Mobile
- Hui Xu, Yangfan Zhou, Michael R. Lyu:

Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. 187-198 - Jialiu Lin, Bin Liu, Norman M. Sadeh, Jason I. Hong:

Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. 199-212 - Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith

:
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. 213-230
Authentication
- S. M. Taiabul Haque, Shannon Scielzo, Matthew K. Wright:

Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. 231-242 - Elizabeth Stobert, Robert Biddle:

The Password Life Cycle: User Behaviour in Managing Passwords. 243-255 - Saurabh Panjwani, Achintya Prakash:

Crowdsourcing Attacks on Biometric Systems. 257-269
Social Networks and Access Control
- Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi

, Alan Mislove:
Understanding and Specifying Social Access Control Lists. 271-283 - Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, Konstantin Beznosov:

To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. 285-300 - Pooya Jaferian, Hootan Rashtian, Konstantin Beznosov:

To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations. 301-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














