Welcome to the Seventh Symposium On Usable Privacy and Security! This year's program features 15 technical papers, two workshops, two tutorials 12 posters, 12 posters published in the past year at other conferences, a panel, a lightning talks session, and an invited talk. On Thursday evening SOUPS 2011 attendees will enjoy a dinner at the Pittsburgh Zoo and Aquarium.
This year we received 45 technical paper submissions. The program committee provided two rounds of reviews. In the first round papers received an average of three reviews. In the second round, papers that had received one or more reviews better than "weak reject" in the first round received additional reviews. The goal of the second round was to ensure that a consistent standard of acceptance could be applied across all papers and, to this end, papers received as many as six reviews. We held an in-person program committee meeting (a SOUPS first) on Friday, the 13th of May. Fifteen papers were selected for presentation and publication.
Proceeding Downloads
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
We used an iterative process to design firewall warnings in which the functionality of a personal firewall is visualized based on a physical security metaphor. We performed a study to determine the degree to which our proposed warnings are ...
Using data type based security alert dialogs to raise online security awareness
When browsing the Internet, users are likely to be exposed to security and privacy threats -- like fraudulent websites. Automatic browser mechanisms can protect them only to some extent. In other situations it is still important to raise the users' ...
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings
We replicated and extended a 2008 study conducted at CMU that investigated the effectiveness of SSL warnings. We adjusted the experimental design to mitigate some of the limitations of that prior study; adjustments include allowing participants to use ...
What makes users refuse web single sign-on?: an empirical investigation of OpenID
OpenID is an open and promising Web single sign-on (SSO) solution. This work investigates the challenges and concerns web users face when using OpenID for authentication, and identifies what changes in the login flow could improve the users' experience ...
Breaking undercover: exploiting design flaws and nonuniform human behavior
This paper reports two attacks on Undercover, a human authentication scheme against passive observers proposed at CHI 2008. The first attack exploits nonuniform human behavior in responding to authentication challenges and the second one is based on ...
Shoulder surfing defence for recall-based graphical passwords
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can steal a user's password by peeking over his or her shoulder in the authentication process. In this paper, we explore shoulder surfing defence for recall-...
Heuristics for evaluating IT security management tools
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and ...
Smartening the crowds: computational techniques for improving human verification to fight phishing scams
Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensitive information. In this paper, we explore novel techniques for combating the phishing problem using computational techniques to improve human effort. ...
Reciprocity attacks
In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction ...
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook
- Yang Wang,
- Gregory Norcie,
- Saranga Komanduri,
- Alessandro Acquisti,
- Pedro Giovanni Leon,
- Lorrie Faith Cranor
We investigate regrets associated with users' posts on a popular social networking site. Our findings are based on a series of interviews, user diaries, and online surveys involving 569 American Facebook users. Their regrets revolved around sensitive ...
ROAuth: recommendation based open authorization
Many major online platforms such as Facebook, Google, and Twitter, provide an open Application Programming Interface which allows third party applications to access user resources. The Open Authorization protocol (OAuth) was introduced as a secure and ...
Privacy: is there an app for that?
Users of social networking sites (SNSs) increasingly must learn to negotiate privacy online with multiple service providers. Facebook's third-party applications (apps) add an additional layer of complexity and confusion for users seeking to understand ...
Home is safer than the cloud!: privacy concerns for consumer cloud storage
Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ...
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
A large body of research has focused on disclosure policies for controlling information release in social sharing (e.g., location-based) applications. However, less work has considered how exposed these policies actually leave users; i.e., to what ...
Indirect content privacy surveys: measuring privacy without asking about it
The strong emotional reaction elicited by privacy issues is well documented (e.g., [12, 8]). The emotional aspect of privacy makes it difficult to evaluate privacy concern, and directly asking about a privacy issue may result in an emotional reaction ...
Cited By
-
Kiskola J, Olsson T, Rantasila A, Syrjämäki A, Ilves M, Isokoski P and Surakka V (2022). User-centred quality of UI interventions aiming to influence online news commenting behaviour, Behaviour & Information Technology, 10.1080/0144929X.2022.2108723, 42:12, (2060-2092), Online publication date: 10-Sep-2023.
- Kiskola J, Olsson T, Syrjämäki A, Rantasila A, Ilves M, Isokoski P and Surakka V Online Survey on Novel Designs for Supporting Self-Reflection and Emotion Regulation in Online News Commenting Proceedings of the 25th International Academic Mindtrek Conference, (278-312)
-
Kennedy J, Meese J and van der Nagel E (2016). Regulation and social practice online, Continuum, 10.1080/10304312.2016.1143160, 30:2, (146-157), Online publication date: 3-Mar-2016.
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SOUPS '09 | 49 | 15 | 31% |
Overall | 49 | 15 | 31% |