SOUPS 2013 July 24, 2013 to July 26, 2013, Newcastle,UK

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Towards a Model for Analysing Anti-Phishing Authentication Ceremonies Fred Mtenzi , Edina Hatunic-webster , Brendan O'shea N/A
Visual Password Checker Shujun Li , Kyriakos Kafas , Nouf Aljaffan N/A
Android + Open Wi-Fis = Broken SSL? Matthew Smith , Sascha Fahl , Marian Harbach , Marten Oltrogge N/A
Memorability of Computer Security Posters as Affected by Message Type Charles r. Crowell , Mitchell Kajzer , And Dame) , John Delaware) N/A
Highlighting Disclosure of Sensitive Data on Android Application with Static Analysis Takuya Sakashita , Shinpei Ogata , Haruhiko Kaiya , Kenji Kaijiri N/A
Similarity Assessment Metrics of Hybrid Images for Graphical Password Madoka Hasegawa , Keita Takahashi , Shigeo Kato N/A
SHRT – New method of URL shortening including relative word of target URL Soojin Yoon , Jeongeun Park , Changkuk Choi , Seungjoo Kim N/A
Influence of the knowledge level about information security on Anshin factors Dai Nishioka , Yoshia Saito , Yuko Murayama N/A
Balancing usability and security in the business cloud authentication Joona Kurikka , Marko Nieminen N/A
Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments Stephan Sigg , Dominik Schürmann N/A
Towards an app-driven Mobile Authentication Model Nicholas Micallef , Mike Just , Lynne Baillie , Gunes Kayacik N/A
Hide and seek: On the disparity of browser security settings Nikolaos Tsalis , Dimitris Gritzalis , Alexios Mylonas N/A
Information Disclosure between Different Groups on Social Networking Sites Lili nemec Zlatolas , Tatjana welzer Druzovec N/A
Identity Management Futures: Assessing Privacy and Security Concerns of the Young and Old Lisa Thomas , Pam Briggs N/A
Input Password Only with Arrow Keys Saki Naguchi , Nami Hidaka , Manabu Okamoto N/A
Anti-phishing System Link-back to Login Page from Footprint Saki Naguchi , Nami Hidaka , Manabu Okamoto N/A
UserCSP- User Specified Content Security Policies Zhenkai Liang , Frederik Braun , Kailas Patil , Tanvi Vyas , Mark Goodwin N/A
Privacy is very personal, but for users to control their online privacy they often have to rely on companies and other organizations to provide privacy tools, or governments to set privacy regulations Lorrie Faith Cranor , Ken Klingenstein , Konstantin , Robin Wilton , James Varga N/A
Memory Retrieval and Graphical Passwords Robert Biddle , Elizabeth Stobert N/A
Keynote:Security & safety overlaps Harold Thimbleby Safety is a dual of security: while security is about stopping bad people doing bad ...
Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme Julie Thorpe , Brent Macrae , Amirali Salehi-abari N/A
On The Ecological Validity of a Password Study Matthew Smith , Sascha Fahl , Marian Harbach N/A
"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones Lorrie Faith Cranor , Jaeyeon Jung , Rebecca Balebako , Wei Lu , Carolyn Nguyen N/A
Exploring the Design Space of Graphical Passwords on Smartphones Michael Weber , Florian Schaub , Marcel Walch , Bastian Könings N/A
Modifying Smartphone User Locking Behavior Shu Liu , Mitch Kajzer , Aaron Striegel , Charles r. Crowell , Dirk Van Bruggen , John D'arcy N/A
Mobile Devices Robert Biddle N/A
Security Behavior Observatory Alain Forget N/A
Telepathwords Stuart E. Schechter N/A
Online privacy: a matter of market and publisher’s will Ivan Chardin N/A
Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency Alessandro Acquisti , Idris Adjerid , Laura Brandimarte , George Loewenstein N/A
Do Not Embarrass: Re-Examining User Concerns for Online Tracking and Advertising Lalit Agarwal , Nisheeth Shrivastava , Sharad Jaiswal , Saurabh Panjwani N/A
What Matters to Users? Factors that Affect Users' Willingness to Share Information with Online Advertisers Lorrie Faith Cranor , Mihai Christodorescu , Lujo Bauer , Blase Ur , Pedro g. Leon , Richard Shay , Yang Wang , Manya Sleeper , Rebecca Balebako N/A
Device Dash: An Educational Computer Security Game Era Vuksani N/A
Enhancing Location Disclosure by Distinguishing between Public and Private Spaces Jeremy Wood N/A
Ethics as a Service Stuart E. Schechter N/A
Mimicry as a Security Interaction Design Lens Arne Renkema-padmos N/A
Data leakage from contactless payment cards Martin Emms N/A
Interactive User Requirements Extraction for Security and Privacy Akira Kanaoka N/A
Designing defenses against socio-technical attacks Ana Ferreira N/A
Applying contextual integrity to incentivised location sharing Luke Hutton N/A
Understanding location-based privacy decision making Aristea maria Zafeiropoulou N/A
Why mobile privacy policies suck, and the need to design for trust in an age of complexity Patrick Walshe N/A
Keynote talk Harold Overlaps N/A
Lightning Talks, Alain Forget N/A
Too Smart for Your Own Good: Regulatory Beginnings for Ubiquitous Computing Janice Tsai N/A
Your Attention Please: Designing security-decision UIs to make genuine risks harder to ignore Lorrie Faith Cranor , Stuart E. Schechter , Saranga Komanduri , Cristian Bravo-lillo , Julie Downs , Robert w. Reeder , Manya Sleeper N/A
Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes Scott Ruoti , Nathan Kim , Ben Burgon , Timothy Horst , Kent e. Seamons N/A
Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks Oshrat Ayalon , Eran Toch N/A
SOUPS du jour Serge Egelman N/A
CASA: Context-Aware Scalable Authentication Eiji Hayashi , Sauvik Das , Shahriyar Amini , Jason Hong , Ian Oakley N/A
Formal Definitions for Usable Access Control Rule Sets - From Goals to Metrics Mathias Beckerle , Leonardo augusto Martucci N/A
When It's Better to Ask Forgiveness than Get Permission: Attribution Mechanisms for Smartphone Resources David A. Wagner , Serge Egelman , Maritza Johnson , Christopher Thompson , Jennifer King N/A
Authentication and Authorization Robert Reeder N/A
Ephermality in Social Media Heather richter Lipford , Erik Northrop N/A
Content and Context for Browser Warnings Melanie Volkamer , Erik Northrop , Steffen Bartsch N/A
Understanding and Using Anonymous Credentials Kai Rannenberg , Zinaida Benenson , Ioannis Krontiris , Alexander Schopf , Yannis Stamatiou , Vasia Liagkou , Dominik Schröder N/A
Waiting Makes the Heart Grow Fonder and the Password Grow Stronger: Experiments in Nudging Users to Create Stronger Passwords Nathan Malkin , Shriram Krishnamurthi , David h. Laidlaw N/A
Exploring user perceptions of authentication scheme security Ann Nosseir , Sotirios Terzis N/A
Preliminary Investigation of an NFC-Unlock Mechanism for Android Matthew Smith , Sascha Fahl , Hannes Scharf , Sandra Flügge N/A
On the Usability of Secure GUIs Melanie Volkamer , Atanas Filyanov , Aysegul Nas , Marcel Winandy N/A
Helping users review and make sense of access policies in organizations Konstantin Beznosov , Hootan Rashtian , Pooya Jaferian N/A
The post that wasn’t: exploring self-censorship on Facebook Lorrie Faith Cranor , Sauvik Das , Manya Sleeper , Rebecca Balebako , Amber lynn Mcconahy , Jason Wiese N/A
Secure communication based on ambient audio Stephan Sigg , Dominik Schürmann N/A
Someone To Watch Over Me Mary Ellen Zurko , Heather richter Lipford N/A
To Deceive or Not to Deceive! Ethical Questions in Phishing Research Rasha salah El-din N/A