default search action
19th SOUPS @ USENIX Security Symposium 2023: Anaheim, CA, USA
- Patrick Gage Kelley, Apu Kapadia:
Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023. USENIX Association 2023
Cybercrimes and Misinformation
- Elmira Deldari, Diana Freed, Julio Poveda, Yaxing Yao:
An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers', Parents', and Bystanders' Perspectives. 1-17 - Afaq Ashraf, Afaq Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa:
"Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan. 37-56 - Sarah Y. Zheng, Ingolf Becker:
Checking, nudging or scoring? Evaluating e-mail user security tools. 57-76 - Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, Imani N. S. Munyaka:
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender. 77-95
Security and Privacy in Organizations
- Leon Kersten, Tom Mulders, Emmanuele Zambon, Chris Snijders, Luca Allodi:
'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center. 97-111 - Stefanos Evripidou, Uchenna Daniel Ani, Stephen Hailes, Jeremy D. McK. Watson:
Exploring the Security Culture of Operational Technology (OT) Organisations: the Role of External Consultancy in Overcoming Organisational Barriers. 113-129 - Jonas Hielscher, Markus Schöps, Uta Menges, Marco Gutfleisch, Mirko Helbling, M. Angela Sasse:
Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers. 131-150 - Svetlana Abramova, Rainer Böhme, Helmut Elsinger, Helmut Stix, Martin Summer:
What can central bank digital currency designers learn from asking potential users? 151-170 - Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl:
"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup. 171-190 - Eva Gerlitz, Maximilian Häring, Matthew Smith, Christian Tiefenau:
Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security. 191-210
Authentication
- Samira Zibaei, Amirali Salehi-Abari, Julie Thorpe:
Dissecting Nudges in Password Managers: Simple Defaults are Powerful. 211-225 - Eva Gerlitz, Maximilian Häring, Charlotte Theresa Mädler, Matthew Smith, Christian Tiefenau:
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost. 227-243 - Mark Turner, Martin Schmitz, Morgan Masichi Bierey, Mohamed Khamis, Karola Marky:
Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor Authentication. 245-261 - Joram Amador, Yiran Ma, Summer Hasama, Eshaan Lumba, Gloria Lee, Eleanor Birrell:
Prospects for Improving Password Selection. 263-282
Beyond End Users/Developers and Experts
- Lorenzo Neil, Harshini Sri Ramulu, Yasemin Acar, Bradley Reaves:
Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. 283-299 - McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia, Yuan Tian:
Towards Usable Security Analysis Tools for Trigger-Action Programming. 301-320 - Raphael Serafini, Marco Gutfleisch, Stefan Horstmann, Alena Naiakshina:
On the Recruitment of Company Developers for Security Studies: Results from a Qualitative Interview Study. 321-340 - Anna-Marie Ortloff, Christian Tiefenau, Matthew Smith:
SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security. 341-359
Accessibility and Allies
- Smirity Kaushik, Natã M. Barbosa, Yaman Yu, Tanusree Sharma, Zachary Kilhoffer, Jooyoung Seo, Sauvik Das, Yang Wang:
GuardLens: Supporting Safer Online Browsing for People with Visual Impairments. 361-380 - Kyrie Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang:
Iterative Design of An Accessible Crypto Wallet for Blind Users. 381-398 - Olivia Williams, Yee-Yin Choong, Kerrianne Buchanan:
Youth understandings of online privacy and security: A dyadic study of children and their parents. 399-416 - Zhuohao (Jerry) Zhang, Smirity Kaushik, Jooyoung Seo, Haolin Yuan, Sauvik Das, Leah Findlater, Danna Gurari, Abigale Stangl, Yang Wang:
ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content. 417-436 - Mamtaj Akter, Madiha Tabassum, Md. Nazmus Sakib Miazi, Leena Alghamdi, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford:
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security. 437-456
Beliefs and Behavior
- Emilee Rader:
Data Privacy and Pluralistic Ignorance. 457-471 - Warda Usman, Jackie Hu, McKynlee Wilson, Daniel Zappala:
Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email. 473-490 - Leijie Wang, Ruotong Wang, Sterling Williams-Ceci, Sanketh Menda, Amy X. Zhang:
"Is Reporting Worth the Sacrifice of Revealing What I've Sent?": Privacy Considerations When Reporting on End-to-End Encrypted Platforms. 491-508 - Hsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. 509-524 - Rebecca Panskus, Max Ninow, Sascha Fahl, Karola Marky:
Privacy Mental Models of Electronic Health Records: A German Case Study. 525-542
Future Internet/Smart Home, the Metaverse, and AI
- Sunyup Park, Anna Lenhart, Michael Zimmer, Jessica Vitak:
"Nobody's Happy": Design Insights from Privacy-Conscious Smart Home Power Users on Enhancing Data Transparency, Visibility, and Control. - Hussein Hazazi, Mohamed Shehab:
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User. 559-577 - Patrick Gage Kelley, Celestina Cornejo, Lisa Hayes, Ellie Shuo Jin, Aaron Sedley, Kurt Thomas, Yongwei Yang, Allison Woodruff:
"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future. 579-603 - Maximiliane Windl, Anna Scheidle, Ceenu George, Sven Mayer:
Investigating Security Indicators for Hyperlinking Within the Metaverse.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.