default search action
18th SOUPS @ USENIX Security Symposium 2022: Boston, MA, USA
- Sonia Chiasson, Apu Kapadia:
Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022. USENIX Association 2022
Expertise and Learning
- Katharina Pfeffer, Alexandra Mai, Edgar R. Weippl, Emilee Rader, Katharina Krombholz:
Replication: Stories as Informal Lessons about Security. 1-18 - Ryo Yoshikawa, Hideya Ochiai, Koji Yatani:
DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety Microlearning. 19-37 - Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama:
Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. 39-56 - Nina Gerber, Karola Marky:
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User's Quest for More Secure and Privacy-Preserving Behavior. 57-76 - Peter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer:
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. 77-96
User Understanding of Security and Privacy Concepts
- Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz:
Industrial practitioners' mental models of adversarial machine learning. 97-116 - Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt:
Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing Attitudes. 117-134 - Matthias Fassl, Simon Anell, Sabine Houy, Martina Lindorfer, Katharina Krombholz:
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality. 135-154 - Yue Huang, Borke Obada-Obieh, Konstantin Beznosov:
Users' Perceptions of Chrome Compromised Credential Notification. 155-174 - Farzaneh Karegar, Ala Sarah Alaqra, Simone Fischer-Hübner:
Exploring User-Suitable Metaphors for Differentially Private Data Analyses. 175-193 - Maina Korir, Simon Parkin, Paul Dunphy:
An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control. 195-211
Privacy and Security Tools
- Siddharth Prakash Rao, Gabriela Limonta, Janne Lindqvist:
Usability and Security of Trusted Platform Module (TPM) Library APIs. 213-232 - Melanie Volkamer, Oksana Kulyk, Jonas Ludwig, Niklas Fuhrberg:
Increasing security without decreasing usability: A comparison of various verifiable voting systems. 233-252 - Sarah Y. Zheng, Ingolf Becker:
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. 253-271 - Hana Habib, Lorrie Faith Cranor:
Evaluating the Usability of Privacy Choice Mechanisms. 273-289 - Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Faith Cranor:
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. 291-312
Methods
- Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl:
If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. 313-330 - Jessica Colnago, Lorrie Faith Cranor, Alessandro Acquisti, Kate Hazel Stanton:
Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs. 331-346 - Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, Nicolas Christin:
On recruiting and retaining users for security-sensitive longitudinal measurement panels. 347-366 - Jenny Tang, Eleanor Birrell, Ada Lerner:
Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys. 367-385
Understanding Specific User Populations and Behaviors
- Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, Florian Schaub:
Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. 387-406 - Markus Langer, Rudolf Siegel, Michael Schilling, Tim Hunsicker, Cornelius J. König:
An open door may tempt a saint: Examining situational and individual determinants of privacy-invading behavior. 407-426 - K. J. Kevin Feng, Kevin Song, Kejing Li, Oishee Chakrabarti, Marshini Chetty:
Investigating How University Students in the United States Encounter and Deal With Misinformation in Private WhatsApp Chats During COVID-19. 427-446 - Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. 447-462 - Franziska Herbert, Marvin Kowalewski, Theodor Schnitzler, Leona Lassak, Markus Dürmuth:
"Fast, Easy, Convenient." Studying Adoption and Perception of Digital Covid Certificates. 463-482 - Philipp Markert, Theodor Schnitzler, Maximilian Golla, Markus Dürmuth:
"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication. 483-501
Passwords and Authentication
- Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina:
Let's Hash: Helping Developers with Password Security. 503-522 - Florian M. Farke, Leona Lassak, Jannis Pinter, Markus Dürmuth:
Exploring User Authentication with Windows Hello in a Small Business Environment. 523-540 - Anuj Gautam, Shan Lalani, Scott Ruoti:
Improving Password Generation Through the Design of a Password Composition Policy Description Language. 541-560 - Kevin Lee, Sten Sjöberg, Arvind Narayanan:
Password policies of most top websites fail to follow best practices. 561-580 - Samira Zibaei, Dinah Rinoa Malapaya, Benjamin Mercier, Amirali Salehi-Abari, Julie Thorpe:
Do Password Managers Nudge Secure (Random) Passwords? 581-597 - Tara Whalen, Thibault Meunier, Mrudula Kodali, Alex Davidson, Marwan Fayed, Armando Faz-Hernández, Watson Ladd, Deepak Maram, Nick Sullivan, Benedikt Wolters, Maxime Guerreiro, Andrew Galloni:
Let The Right One In: Attestation as a Usable CAPTCHA Alternative. 599-612
IoT and Ubiquitous Computing
- Asreen Rostami, Minna Vigren, Shahid Raza, Barry Brown:
Being Hacked: Understanding Victims' Experiences of IoT Hacking. 613-631 - Nathan Malkin, David A. Wagner, Serge Egelman:
Runtime Permissions for Privacy in Proactive Intelligent Assistants. 633-651 - Emilee Rader:
Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy Management. 653-670 - Jiayi Chen, Urs Hengartner, Hassan Khan:
Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. 671-685 - Julia Bernd, Ruba Abu-Salma, Junghyun Choy, Alisa Frik:
Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships. 687-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.