skip to main content
10.1145/2501604acmotherconferencesBook PagePublication PagessoupsConference Proceedingsconference-collections
SOUPS '13: Proceedings of the Ninth Symposium on Usable Privacy and Security
ACM2013 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SOUPS '13: Symposium On Usable Privacy and Security Newcastle United Kingdom July 24 - 26, 2013
ISBN:
978-1-4503-2319-2
Published:
24 July 2013
Sponsors:
Carnegie Mellon University
In-Cooperation:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Ninth Symposium On Usable Privacy and Security! This year's program features 15 technical papers, three workshops, 25 posters, 5 posters/papers published in the past year at other conferences, a panel, two lightning talks and demo sessions, and an invited talk. On Thursday evening SOUPS 2013 attendees will enjoy a dinner at Alnwick Garden.

This year we received 51 technical paper submissions. The program committee provided two rounds of reviews. In the first round papers received at least three reviews. In the second round, papers that had received one or more reviews better than "weak reject" in the first round received additional reviews. The goal of the second round was to ensure that a consistent standard of acceptance could be applied across all papers and, to this end, papers received as many as six reviews. We held an in-person program committee meeting. Fifteen papers were selected for presentation and publication.

Skip Table Of Content Section
SESSION: Authentication and authorization
research-article
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources

Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. We performed a set of experiments to study whether attribution ...

research-article
Formal definitions for usable access control rule sets from goals to metrics

Access control policies describe high level requirements for access control systems. Access control rule sets ideally translate these policies into a coherent and manageable collection of Allow/Deny rules. Designing rule sets that reflect desired ...

research-article
CASA: context-aware scalable authentication

We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form of active authentication (e.g., typing a PIN) based on the combination of multiple ...

SESSION: SOUPS de jour
research-article
Retrospective privacy: managing longitudinal privacy in online social networks

Online social networks provide access to the user's information for long periods of time after the information's initial publication. In this paper, we investigate the relation between information aging and its sharing preferences on Facebook. Our ...

research-article
Confused Johnny: when automatic encryption leads to confusion and mistakes

A common approach to designing usable security is to hide as many security details as possible from the user to reduce the amount of information and actions a user must encounter. This paper gives an overview of Pwm (Private Webmail), our secure webmail ...

research-article
Your attention please: designing security-decision UIs to make genuine risks harder to ignore

We designed and tested attractors for computer security dialogs: user-interface modifications used to draw users' attention to the most important information for making decisions. Some of these modifications were purely visual, while others temporarily ...

SESSION: Privacy
research-article
What matters to users?: factors that affect users' willingness to share information with online advertisers

Much of the debate surrounding online behavioral advertising (OBA) has centered on how to provide users with notice and choice. An important element left unexplored is how advertising companies' privacy practices affect users' attitudes toward data ...

research-article
Do not embarrass: re-examining user concerns for online tracking and advertising

Recent studies have highlighted user concerns with respect to third-party tracking and online behavioral advertising (OBA) and the need for better consumer choice mechanisms to address these phenomena. We re-investigate the question of perceptions of ...

research-article
Sleights of privacy: framing, disclosures, and the limits of transparency

In an effort to address persistent consumer privacy concerns, policy makers and the data industry seem to have found common grounds in proposals that aim at making online privacy more "transparent." Such self-regulatory approaches rely on, among other ...

SESSION: Mobile devices
research-article
Modifying smartphone user locking behavior
Article No.: 10, pp 1–14https://doi.org/10.1145/2501604.2501614

With an increasing number of organizations allowing personal smart phones onto their networks, considerable security risk is introduced. The security risk is exacerbated by the tremendous heterogeneity of the personal mobile devices and their respective ...

research-article
Exploring the design space of graphical passwords on smartphones
Article No.: 11, pp 1–14https://doi.org/10.1145/2501604.2501615

Smartphones have emerged as a likely application area for graphical passwords, because they are easier to input on touchscreens than text passwords. Extensive research on graphical passwords and the capabilities of modern smartphones result in a complex ...

research-article
"Little brothers watching you": raising awareness of data leaks on smartphones
Article No.: 12, pp 1–11https://doi.org/10.1145/2501604.2501616

Today's smartphone applications expect users to make decisions about what information they are willing to share, but fail to provide sufficient feedback about which privacy-sensitive information is leaving the phone, as well as how frequently and with ...

SESSION: Passwords
research-article
On the ecological validity of a password study
Article No.: 13, pp 1–13https://doi.org/10.1145/2501604.2501617

The ecological validity of password studies is a complex topic and difficult to quantify. Most researchers who conduct password user studies try to address the issue in their study design. However, the methods researchers use to try to improve ...

research-article
Usability and security evaluation of GeoPass: a geographic location-password scheme
Article No.: 14, pp 1–14https://doi.org/10.1145/2501604.2501618

We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (i.e., a "location-password"). We conducted a multi-session in-lab/at-home user study to evaluate the ...

research-article
Memory retrieval and graphical passwords
Article No.: 15, pp 1–14https://doi.org/10.1145/2501604.2501619

Graphical passwords are an alternative form of authentication that use images for login, and leverage the picture superiority effect for good usability and memorability. Categories of graphical passwords have been distinguished on the basis of different ...

Contributors
  • Carnegie Mellon University
  • The University of British Columbia
  • Carnegie Mellon University
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate15of49submissions,31%
YearSubmittedAcceptedRate
SOUPS '09491531%
Overall491531%