skip to main content
10.1145/2078827acmotherconferencesBook PagePublication PagessoupsConference Proceedingsconference-collections
SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and Security
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SOUPS '11: Symposium On Usable Privacy and Security Pittsburgh Pennsylvania July 20 - 22, 2011
ISBN:
978-1-4503-0911-0
Published:
20 July 2011
Sponsors:
Carnegie Mellon CyLab
In-Cooperation:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Seventh Symposium On Usable Privacy and Security! This year's program features 15 technical papers, two workshops, two tutorials 12 posters, 12 posters published in the past year at other conferences, a panel, a lightning talks session, and an invited talk. On Thursday evening SOUPS 2011 attendees will enjoy a dinner at the Pittsburgh Zoo and Aquarium.

This year we received 45 technical paper submissions. The program committee provided two rounds of reviews. In the first round papers received an average of three reviews. In the second round, papers that had received one or more reviews better than "weak reject" in the first round received additional reviews. The goal of the second round was to ensure that a consistent standard of acceptance could be applied across all papers and, to this end, papers received as many as six reviews. We held an in-person program committee meeting (a SOUPS first) on Friday, the 13th of May. Fifteen papers were selected for presentation and publication.

Skip Table Of Content Section
SESSION: Security warnings
research-article
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings

We used an iterative process to design firewall warnings in which the functionality of a personal firewall is visualized based on a physical security metaphor. We performed a study to determine the degree to which our proposed warnings are ...

research-article
Using data type based security alert dialogs to raise online security awareness

When browsing the Internet, users are likely to be exposed to security and privacy threats -- like fraudulent websites. Automatic browser mechanisms can protect them only to some extent. In other situations it is still important to raise the users' ...

research-article
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings

We replicated and extended a 2008 study conducted at CMU that investigated the effectiveness of SSL warnings. We adjusted the experimental design to mitigate some of the limitations of that prior study; adjustments include allowing participants to use ...

SESSION: Authentication
research-article
What makes users refuse web single sign-on?: an empirical investigation of OpenID

OpenID is an open and promising Web single sign-on (SSO) solution. This work investigates the challenges and concerns web users face when using OpenID for authentication, and identifies what changes in the login flow could improve the users' experience ...

research-article
Breaking undercover: exploiting design flaws and nonuniform human behavior

This paper reports two attacks on Undercover, a human authentication scheme against passive observers proposed at CHI 2008. The first attack exploits nonuniform human behavior in responding to authentication challenges and the second one is based on ...

research-article
Shoulder surfing defence for recall-based graphical passwords

Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can steal a user's password by peeking over his or her shoulder in the authentication process. In this paper, we explore shoulder surfing defence for recall-...

SESSION: SOUPS du jour
research-article
Heuristics for evaluating IT security management tools

The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and ...

research-article
Smartening the crowds: computational techniques for improving human verification to fight phishing scams

Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensitive information. In this paper, we explore novel techniques for combating the phishing problem using computational techniques to improve human effort. ...

research-article
Reciprocity attacks

In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction ...

SESSION: Privacy on social network sites
research-article
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook
Article No.: 10, pp 1–16https://doi.org/10.1145/2078827.2078841

We investigate regrets associated with users' posts on a popular social networking site. Our findings are based on a series of interviews, user diaries, and online surveys involving 569 American Facebook users. Their regrets revolved around sensitive ...

research-article
ROAuth: recommendation based open authorization
Article No.: 11, pp 1–12https://doi.org/10.1145/2078827.2078842

Many major online platforms such as Facebook, Google, and Twitter, provide an open Application Programming Interface which allows third party applications to access user resources. The Open Authorization protocol (OAuth) was introduced as a secure and ...

research-article
Privacy: is there an app for that?
Article No.: 12, pp 1–20https://doi.org/10.1145/2078827.2078843

Users of social networking sites (SNSs) increasingly must learn to negotiate privacy online with multiple service providers. Facebook's third-party applications (apps) add an additional layer of complexity and confusion for users seeking to understand ...

SESSION: Perceptions of privacy and security
research-article
Home is safer than the cloud!: privacy concerns for consumer cloud storage
Article No.: 13, pp 1–20https://doi.org/10.1145/2078827.2078845

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ...

research-article
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Article No.: 14, pp 1–14https://doi.org/10.1145/2078827.2078846

A large body of research has focused on disclosure policies for controlling information release in social sharing (e.g., location-based) applications. However, less work has considered how exposed these policies actually leave users; i.e., to what ...

research-article
Indirect content privacy surveys: measuring privacy without asking about it
Article No.: 15, pp 1–14https://doi.org/10.1145/2078827.2078847

The strong emotional reaction elicited by privacy issues is well documented (e.g., [12, 8]). The emotional aspect of privacy makes it difficult to evaluate privacy concern, and directly asking about a privacy issue may result in an emotional reaction ...

Contributors
  • Carnegie Mellon University

Recommendations

Acceptance Rates

Overall Acceptance Rate15of49submissions,31%
YearSubmittedAcceptedRate
SOUPS '09491531%
Overall491531%