


default search action
18th SOUPS @ USENIX Security Symposium 2022: Boston, MA, USA
- Sonia Chiasson, Apu Kapadia:

Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022. USENIX Association 2022
Expertise and Learning
- Katharina Pfeffer, Alexandra Mai, Edgar R. Weippl, Emilee Rader, Katharina Krombholz:

Replication: Stories as Informal Lessons about Security. 1-18 - Ryo Yoshikawa, Hideya Ochiai, Koji Yatani:

DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety Microlearning. 19-37 - Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama:

Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site. 39-56 - Nina Gerber, Karola Marky:

The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User's Quest for More Secure and Privacy-Preserving Behavior. 57-76 - Peter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer:

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. 77-96
User Understanding of Security and Privacy Concepts
- Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz:

Industrial practitioners' mental models of adversarial machine learning. 97-116 - Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt:

Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing Attitudes. 117-134 - Matthias Fassl, Simon Anell, Sabine Houy, Martina Lindorfer, Katharina Krombholz:

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality. 135-154 - Yue Huang, Borke Obada-Obieh, Konstantin Beznosov:

Users' Perceptions of Chrome Compromised Credential Notification. 155-174 - Farzaneh Karegar, Ala Sarah Alaqra, Simone Fischer-Hübner:

Exploring User-Suitable Metaphors for Differentially Private Data Analyses. 175-193 - Maina Korir, Simon Parkin, Paul Dunphy:

An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control. 195-211
Privacy and Security Tools
- Siddharth Prakash Rao, Gabriela Limonta, Janne Lindqvist:

Usability and Security of Trusted Platform Module (TPM) Library APIs. 213-232 - Melanie Volkamer, Oksana Kulyk, Jonas Ludwig, Niklas Fuhrberg:

Increasing security without decreasing usability: A comparison of various verifiable voting systems. 233-252 - Sarah Y. Zheng, Ingolf Becker:

Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. 253-271 - Hana Habib, Lorrie Faith Cranor:

Evaluating the Usability of Privacy Choice Mechanisms. 273-289 - Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Faith Cranor:

Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. 291-312
Methods
- Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl:

If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. 313-330 - Jessica Colnago, Lorrie Faith Cranor, Alessandro Acquisti, Kate Hazel Stanton:

Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs. 331-346 - Akira Yamada, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, Nicolas Christin:

On recruiting and retaining users for security-sensitive longitudinal measurement panels. 347-366 - Jenny Tang, Eleanor Birrell, Ada Lerner:

Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys. 367-385
Understanding Specific User Populations and Behaviors
- Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, Florian Schaub:

Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. 387-406 - Markus Langer, Rudolf Siegel, Michael Schilling, Tim Hunsicker, Cornelius J. König:

An open door may tempt a saint: Examining situational and individual determinants of privacy-invading behavior. 407-426 - K. J. Kevin Feng, Kevin Song, Kejing Li, Oishee Chakrabarti, Marshini Chetty:

Investigating How University Students in the United States Encounter and Deal With Misinformation in Private WhatsApp Chats During COVID-19. 427-446 - Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:

Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. 447-462 - Franziska Herbert, Marvin Kowalewski, Theodor Schnitzler, Leona Lassak, Markus Dürmuth:

"Fast, Easy, Convenient." Studying Adoption and Perception of Digital Covid Certificates. 463-482 - Philipp Markert, Theodor Schnitzler, Maximilian Golla, Markus Dürmuth:

"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication. 483-501
Passwords and Authentication
- Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina:

Let's Hash: Helping Developers with Password Security. 503-522 - Florian M. Farke, Leona Lassak, Jannis Pinter, Markus Dürmuth:

Exploring User Authentication with Windows Hello in a Small Business Environment. 523-540 - Anuj Gautam, Shan Lalani, Scott Ruoti:

Improving Password Generation Through the Design of a Password Composition Policy Description Language. 541-560 - Kevin Lee, Sten Sjöberg, Arvind Narayanan:

Password policies of most top websites fail to follow best practices. 561-580 - Samira Zibaei, Dinah Rinoa Malapaya, Benjamin Mercier, Amirali Salehi-Abari, Julie Thorpe:

Do Password Managers Nudge Secure (Random) Passwords? 581-597 - Tara Whalen, Thibault Meunier, Mrudula Kodali, Alex Davidson, Marwan Fayed, Armando Faz-Hernández, Watson Ladd, Deepak Maram, Nick Sullivan, Benedikt Wolters, Maxime Guerreiro, Andrew Galloni:

Let The Right One In: Attestation as a Usable CAPTCHA Alternative. 599-612
IoT and Ubiquitous Computing
- Asreen Rostami, Minna Vigren, Shahid Raza, Barry Brown:

Being Hacked: Understanding Victims' Experiences of IoT Hacking. 613-631 - Nathan Malkin, David A. Wagner, Serge Egelman:

Runtime Permissions for Privacy in Proactive Intelligent Assistants. 633-651 - Emilee Rader:

Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy Management. 653-670 - Jiayi Chen, Urs Hengartner, Hassan Khan:

Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. 671-685 - Julia Bernd, Ruba Abu-Salma, Junghyun Choy, Alisa Frik:

Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships. 687-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














