SOUPS2019 2019 Aug. 11, 2019 to Aug. 13, 2019, Santa Clara, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Investigative Journalism in the Digital Age: Privacy, Security and the Media Jennifer Valentino-devries The ability to effectively interrogate our society’s power structure — a key function of a ...
Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies Jordan Hayes , Smirity Kaushik , Charlotte Wang To better inform privacy/security designs for people with disabilities, we “shadowed” people with visual impairments ...
Privacy and Security Threat Models and Mitigation Strategies of Older Adults Serge Egelman , Florian Schaub , Alisa Frik , Leysan Nurgalieva , Julia Bernd , Joyce Lee Older adults (65+) are becoming primary users of emerging smart systems, especially in health care. ...
Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects Oshrat Toch System design has a crucial effect on users’ privacy, but privacy-by-design processes in organizations rarely ...
A Self-Report Measure of End-User Security Attitudes (SA-6) Laura Dabbish , Cori Faklaris , And Hong We present SA-6, a six-item scale for assessing people’s security attitudes that we developed by ...
The Effect of Entertainment Media on Mental Models of Computer Security Kelsey R. Fulton , Rebecca Gelles , Alexandra Mckay , Richard Roberts , Yasmin Abdi , And Mazurek When people inevitably need to make decisions about their computer-security posture, they rely on their ...
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors Sauvik Das , Laura Hong What triggers end-user security and privacy (S&P) behaviors? How do those triggers vary across individuals? ...
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice Matthew Smith , Karoline Busse , Julia Schäfer A 2015 study by Iulia Ion, Rob Reeder, and Sunny Consolvo examined the self-reported security ...
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal Elham Vaziripour , Justin Wu , Kent Zappala , Cyrus Gattrell , Devon Howard , Jake Tyler Security designs that presume enacting secure behaviors to be beneficial in all circumstances discount the ...
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware Joseph Bonneau , Christopher S. Gates , Camelia Simoiu , Sharad Goel Ransomware has received considerable news coverage in recent years, in part due to several cases ...
Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage Hye-chung Kum , Eric D. Ragan , Gurudev Ilangovan , Mahin Ramezani , Qinbo Li , And Cason Schmit Achieving the benefits of data science in cases involving personal data requires the use of ...
From Usability to Secure Computing and Back Again Mayank Varia , Lucy Qin , Andrei Lapets , Frederick Jansen , Peter Flockhart , Kinan Dak Albab , And Ira Globus-harris , Shannon Roberts Secure multi-party computation (MPC) allows multiple parties to jointly compute the output of a function ...
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites Vincent Meyer The share of phishing websites using HTTPS has been constantly increasing over the last years. ...
Everything You Need to Know About Secured Usable Design can be explained with Star Wars Ann-marie Horcher N/A
Preliminary Findings on Behavioral Aspects of Socially Engineered Payment Diversion Fraud Alana Maurushat N/A
On the Road to Digital Inclusion: Designing Inclusive Security and Privacy Alerts Pavithren V.s. Pakianathan N/A
An Early UDS Evaluation of the Android Security Key Scheme Robbie Macgregor N/A
"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks Yixin Zou , Abraham H. Mhaidli , And Florian Schaub Mobile ads pose privacy and security risks to consumers, including behavior tracking, malware, and inappropriate ...
Usability Smells: An Analysis of Developers’ Struggle With Crypto Libraries Joseph Hallett , Nikhil Patnaik , And Awais Rashid Green and Smith propose ten principles to make cryptography libraries more usable, but to what ...
System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces Leonardo A. Martucci , Artem Voronkov , And Stefan Lindskog A graphical user interface (GUI) represents the most common option for interacting with computer systems. ...
Machines Frank h. Li , Nathan Malkin , Arunesh Mathur , Marshini Chetty , Lisa Rogers Keeping machines updated is crucial for maintaining system security. While recent studies have investigated the ...
Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices Lukas Mecke , Sarah Delgado Rodriguez , Daniel Buschek , Sarah Prange , Florian Alt Continuous implicit authentication mechanisms verify users over time. In case the device's confidence level (DCL) ...
Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices Lukas Mecke , Daniel Buschek , Sarah Prange , Mathias Kiermeier , Lorian Alt Behavioural biometric systems are based on the premise that human behaviour is hard to intentionally ...
Why people (don’t) use password managers effectively Lujo Bauer , Nicolas Christin , Sarah Pearman , Shikun Aerin Zhang , And Cranor Security experts often recommend using password-management tools that both store passwords and generate random passwords. ...
Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling Paul Dunphy , Simon Parkin , Stéphane Ciolino Security keys are phishing-resistant two-factor authentication (2FA) tokens based upon the FIDO Universal 2nd Factor ...
A Usability Study of Five Two-Factor Authentication Methods Ken Reese , Trevor Smith , Jonathan Dutson , Jonathan Armknecht , Jacob Cameron , And Kent Seamons Two-factor authentication (2FA) defends against account compromise. An account secured with 2FA typically requires an ...
Personal Information Leakage by Abusing the GDPR 'Right of Access Pieter Robyns , Peter Quax , Wim Lamotte , Mariano Di Martino , Winnie Weyts , Ken Andries The General Data Protection Regulation (GDPR) 'Right of Access' grants (European) natural persons the right ...
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites Alessandro Acquisti , Lorrie Faith Cranor , Florian Schaub , Norman Sadeh , Hana Habib , Chelse Swoopes , Yixin Zou , Aditi Jannu , Neha Sridhar Many websites offer visitors privacy controls and opt-out choices, either to comply with legal requirements ...
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings And Nick Anderson , Anthony Vance , David Eargle , Jeffrey L. Jenkins , C. Brock Kirwan Adherence to security warnings continues to be an important problem in information security. Although users ...
Warrants are the new black: location data and the Fourth Amendment Naomi Shiffman N/A
A privacy- and security-focused notification system Jim Fenton N/A
Growing a UX Team in a Privacy & Security Organization Jim Lane N/A
Social interventions to reduce the privacy paradox Isha Ghosh N/A
“There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness Data Abdulmajeed Lipford There has been increasing use of commercial wearable devices for tracking fitness-related activities in the ...
"I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks Heather richter Lipford , Madiha Tabassum , Tomasz Kosinski Smart homes are more connected than ever before, with a variety of commercial devices available. ...
More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants Noura Abdi , Kopo M. Ramokapane , Jose M. Such Smart Home Personal Assistants (SPA) such as Amazon Echo/Alexa and Google Home/Assistant have made our ...
Respect for Norms and Expectations: A Privacy Paradigm for IT Businesses Amin Rabinia N/A
Wait, that site supports 2FA?! Helping average internet users enable 2FA on sites they visit Conor Gilsenan N/A
Improving usability of password authentication using keystroke dynamics Walter Berggren N/A
Against Trust (in Technology) Maggie Oates N/A