SOUPS2018 2018 Aug. 12, 2018 to Aug. 14, 2018, Baltimore, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Beyond the Individual: Usability, Utility and Community Susan E. Mcgregor When we conduct usability studies to assess our technologies, we typically work with groups of ...
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios Melanie Volkamer , Karen Renaud , Peter Mayer , Andreas Gutmann , Paul Gerber In this paper, we describe the study we carried out to replicate and extend the ...
User Behaviors and Attitudes Under Password Expiration Policies Lujo Bauer , Hana Habib , Pardis Emami Naeini , Summer Devlin , Maggie Oates , Chelse Swoopes , Nicolas Cranor Policies that require employees to update their passwords regularly have become common at universities and ...
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal Kent Seamons , Elham Vaziripour , Justin Wu , Jordan Whitehead , Mark O'neill , Daniel Metro , Josh Cockrell , Timothy Moffett , Nick Bonner , And Daniel Zappala The security guarantees of secure messaging applications are contingent upon users performing an authentication ceremony, ...
Informal Support Networks: an investigation into Home Data Security Practices Norbert Flechais The widespread and rising adoption of information and communication technology in homes is happening at ...
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships Cheul Young Park , Cori Faklaris , Siyan Zhao , Alex Sciuto , Laura Hong Security design choices often fail to take into account users' social context. Our work is ...
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking Arunesh Mathur , Jessica Vitak , Arvind Chetty Browser-based blocking extensions such as Ad blockers and Tracker blockers have provisions that allow users ...
Can Digital Face-Morphs Influence Attitudes and Online Behaviors? Eyal Peer , Sonam Acquisti Self-images are among the most prevalent forms of content shared on social media streams. Face-morphs ...
The 3rd Wave? Inclusive Privacy and Security Yang Wang N/A
Accessible Authentication for All: An Evaluation Framework for Assessing Usability and Accessibility of Authentication Ronna Ten Brink N/A
Just Say No to 'Just Say No': Youth and Privacy Advocacy in Latin America Mariel García-montes N/A
Reframing Usable Privacy and Security to Design for “Cyber Health” Cori Faklaris N/A
"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia Nithya Sambasivan , Garen Checkley , Amna Batool , Nova Ahmed , David Nemer , Laura Sanely Gaytán-lugo , Tara Matthews , Sunny Churchill Women in South Asian own fewer personal devices like laptops and phones than women elsewhere ...
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography Apu Kapadia , Yasmeen Rashidi , Tousif Ahmed , Felicia Patel , Emily Fath , Christena Su Pervasive photography and the sharing of photos on social media pose a significant challenge to ...
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Alessandro Acquisti , Lorrie Faith Cranor , Nicolas Christin , Sarah Pearman , Jeremy Thomas , Hana Habib , Jessica Colnago , Vidya Gopalakrishnan Previous research has suggested that people use the private browsing mode of their web browsers ...
Online Privacy and Aging of Digital Artifacts Reham Chiasson This paper explores how the user interface can help users invoke the right to be ...
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach Yixin Zou , Abraham H. Mhaidli , Austin Schaub Equifax, one of the three major U.S. credit bureaus, experienced a large-scale data breach in ...
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data Kurt Thomas , Sowmya Karunakaran , Elie Comanescu Data exposed by breaches persist as a security and privacy threat for Internet users. Despite ...
User Comfort with Android Background Resource Accesses in Different Contexts Kristopher Micinski , Daniel Votipka , Seth M. Rabin , Thomas Gilray , Michelle Foster Android apps ask users to allow or deny access to sensitive resources the first time ...
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens Orçun Çetin , Lisette Altena , Carlos Eeten In the fight to clean up malware-infected machines, notifications from Internet Service Providers (ISPs) to ...
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse Sascha Fahl , Sebastian Möller , Yasemin Acar , Christian Stransky , Dominik Wermke , Peter Leo Gorski , Luigi Lo Iacono Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases ...
Security in the Software Development Lifecycle Hala Chiasson We interviewed developers currently employed in industry to explore real-life software security practices during each ...
Deception Task Design in Developer Password Studies: Exploring a Student Sample Alena Naiakshina , Anastasia Danilova , Christian Smith Studying developer behavior is a hot topic for usable security researchers. While the usable security ...
API Blindspots: Why Experienced Developers Write Vulnerable Code Justin Cappos , Daniela Seabra Oliveira , Tian Lin , Muhammad Sajidur Rahman , Rad Akefirad , Donovan Ellis , Eliany Perez , Rahul Bobhate , Lois A. Delong , Yuriy Brun , Natalie C. Ebner Despite the best efforts of the security community, security vulnerabilities in software are still prevalent, ...
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration Ambar Murillo , Andreas Kramm , Sebastian Schnorf , And Luca In this paper, we present the results of an interview study with 22 participants and ...
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently Norman Hänsch , Andrea Schankin , Mykolai Protsenko , Felix Benenson Software obfuscation is a technique to protect programs from malicious reverse engineering by explicitly making ...
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products Yasemin Acar , Julie M. Haney , Mary F. Theofanos , Sandra Spickard Prettyman Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial ...
A Comparative Usability Study of Key Management in Secure Email Scott Ruoti , Tyler Monson , Jeff Andersen , Daniel Seamons We conducted a user study that compares three secure email tools that share a common ...
http://sillystatistics.org Janne Lindqvist N/A
Privacy Goals and Misconceptions Surrounding Privacy Tools Francis Djabri N/A
Getting Involved in Standards—Seeing Your Work Adopted in the Real World Samuel Weiler N/A
User Perceptions of Security and Confidentiality when Performing Tertiary Authentication Hervé Saint-louis N/A
When is a Tree Really a Truck? Exploring Mental Models of Encryption Justin Zappala Mental models are a driving force in the way users interact with systems, and thus ...
"It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security Julie Lutters Cyber attacks are on the rise, but individuals and organizations fail to implement basic security ...
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection Lynne Briggs , James Nicholson Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to ...
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality Elissa M. Redmiles , Devon Adams , Alseny Bah , Catherine Barwulor , Nureli Musaby , Kadeem Pitkin Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing ...