skip to main content
10.1145/2335356acmotherconferencesBook PagePublication PagessoupsConference Proceedingsconference-collections
SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SOUPS '12: Symposium On Usable Privacy and Security Washington, D.C. July 11 - 13, 2012
ISBN:
978-1-4503-1532-6
Published:
11 July 2012
Sponsors:
Carnegie Mellon University
In-Cooperation:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Eighth Symposium On Usable Privacy and Security! This year's program features 14 technical papers, one workshop, one tutorial, 14 posters, 13 posters published in the past year at other conferences, a panel, lightning talks and demo session, and an invited talk. On Thursday evening SOUPS 2012 attendees will enjoy a dinner at the Microsoft DC office.

This year we received 67 technical paper submissions. The program committee provided two rounds of reviews. In the first round papers received an average of three reviews. In the second round, papers that had received one or more reviews better than "weak reject" in the first round received additional reviews. The goal of the second round was to ensure that a consistent standard of acceptance could be applied across all papers and, to this end, papers received as many as six reviews. We held an in-person program committee meeting on May 11. Fourteen papers were selected for presentation and publication.

Skip Table Of Content Section
SESSION: Mobile privacy and security
research-article
Measuring user confidence in smartphone security and privacy

In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' ...

research-article
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications

Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and ...

research-article
Android permissions: user attention, comprehension, and behavior

Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the ...

SESSION: User perceptions
research-article
Smart, useful, scary, creepy: perceptions of online behavioral advertising

We report results of 48 semi-structured interviews about online behavioral advertising (OBA). We investigated non-technical users' attitudes about and understanding of OBA, using participants' expectations and beliefs to explain their attitudes. ...

research-article
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice

Rapid growth in the usage of location-aware mobile phones has enabled mainstream adoption of location-sharing services (LSS). Integration with social-networking services (SNS) has further accelerated this trend. To uncover how these developments have ...

research-article
Stories as informal lessons about security

Non-expert computer users regularly need to make security-relevant decisions; however, these decisions tend not to be particularly good or sophisticated. Nevertheless, their choices are not random. Where does the information come from that these non-...

SESSION: Authentication
research-article
Correct horse battery staple: exploring the usability of system-assigned passphrases

Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be hard to remember. Passphrases, space-delimited sets of natural language words, have been suggested as both secure and usable for decades. In a 1,476-...

research-article
Do you see your password?: applying recognition to textual passwords

Text-based password systems are the authentication mechanism most commonly used on computer systems. Graphical passwords have recently been proposed because the pictorial-superiority effect suggests that people have better memory for images. The most ...

SESSION: Online social networks
research-article
Facebook and privacy: it's complicated

We measure users' attitudes toward interpersonal privacy concerns on Facebook and measure users' strategies for reconciling their concerns with their desire to share content online. To do this, we recruited 260 Facebook users to install a Facebook ...

research-article
Are privacy concerns a turn-off?: engagement and privacy in social networks
Article No.: 10, pp 1–13https://doi.org/10.1145/2335356.2335370

We describe survey results from a representative sample of 1,075 U. S. social network users who use Facebook as their primary network. Our results show a strong association between low engagement and privacy concern. Specifically, users who report ...

research-article
Helping Johnny 2.0 to encrypt his Facebook conversations
Article No.: 11, pp 1–17https://doi.org/10.1145/2335356.2335371

Several billion Facebook messages are sent every day. While there are many solutions to email security whose usability has been extensively studied, little work has been done in the area of message security for Facebook and even less on the usability ...

SESSION: Access control
research-article
+Your circles: sharing behavior on Google+

Users are sharing and consuming enormous amounts of information through online social network interaction every day. Yet, many users struggle to control what they share to their overlapping social spheres. Google+ introduces circles, a mechanism that ...

research-article
The PViz comprehension tool for social network privacy settings
Article No.: 13, pp 1–12https://doi.org/10.1145/2335356.2335374

Users' mental models of privacy and visibility in social networks often involve subgroups within their local networks of friends. Many social networking sites have begun building interfaces to support grouping, like Facebook's lists and "Smart Lists," ...

research-article
Relating declarative semantics and usability in access control
Article No.: 14, pp 1–13https://doi.org/10.1145/2335356.2335375

Usability is widely recognized as a problem in the context of the administration of access control systems. We seek to relate the notion of declarative semantics, a recurring theme in research in access control, with usability. We adopt the concrete ...

Contributors
  • Carnegie Mellon University

Recommendations

Acceptance Rates

Overall Acceptance Rate15of49submissions,31%
YearSubmittedAcceptedRate
SOUPS '09491531%
Overall491531%