Login / Signup
SOUPS
2005
2011
2017
2023
2005
2023
Keyphrases
Publications
2023
Sabrina Amft
,
Sandra Höltervennhoff
,
Nicolas Huaman
,
Yasemin Acar
,
Sascha Fahl
"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup.
SOUPS
(2023)
Smirity Kaushik
,
Natã M. Barbosa
,
Yaman Yu
,
Tanusree Sharma
,
Zachary Kilhoffer
,
Jooyoung Seo
,
Sauvik Das
,
Yang Wang
GuardLens: Supporting Safer Online Browsing for People with Visual Impairments.
SOUPS
(2023)
Joram Amador
,
Yiran Ma
,
Summer Hasama
,
Eshaan Lumba
,
Gloria Lee
,
Eleanor Birrell
Prospects for Improving Password Selection.
SOUPS
(2023)
McKenna McCall
,
Eric Zeng
,
Faysal Hossain Shezan
,
Mitchell Yang
,
Lujo Bauer
,
Abhishek Bichhawat
,
Camille Cobb
,
Limin Jia
,
Yuan Tian
Towards Usable Security Analysis Tools for Trigger-Action Programming.
SOUPS
(2023)
Sunyup Park
,
Anna Lenhart
,
Michael Zimmer
,
Jessica Vitak
"Nobody's Happy": Design Insights from Privacy-Conscious Smart Home Power Users on Enhancing Data Transparency, Visibility, and Control.
SOUPS
(2023)
Elmira Deldari
,
Diana Freed
,
Julio Poveda
,
Yaxing Yao
An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers', Parents', and Bystanders' Perspectives.
SOUPS
(2023)
Lorenzo Neil
,
Harshini Sri Ramulu
,
Yasemin Acar
,
Bradley Reaves
Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice.
SOUPS
(2023)
Filipo Sharevski
,
Benjamin Kessell
Fight Fire with Fire: Hacktivists' Take on Social Media Misinformation.
SOUPS
(2023)
Svetlana Abramova
,
Rainer Böhme
,
Helmut Elsinger
,
Helmut Stix
,
Martin Summer
What can central bank digital currency designers learn from asking potential users?
SOUPS
(2023)
Eva Gerlitz
,
Maximilian Häring
,
Charlotte Theresa Mädler
,
Matthew Smith
,
Christian Tiefenau
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost.
SOUPS
(2023)
Mamtaj Akter
,
Madiha Tabassum
,
Md. Nazmus Sakib Miazi
,
Leena Alghamdi
,
Jess Kropczynski
,
Pamela J. Wisniewski
,
Heather Lipford
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.
SOUPS
(2023)
Jonas Hielscher
,
Markus Schöps
,
Uta Menges
,
Marco Gutfleisch
,
Mirko Helbling
,
M. Angela Sasse
Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers.
SOUPS
(2023)
Olivia Williams
,
Yee-Yin Choong
,
Kerrianne Buchanan
Youth understandings of online privacy and security: A dyadic study of children and their parents.
SOUPS
(2023)
Zhixuan Zhou
,
Tanusree Sharma
,
Luke Emano
,
Sauvik Das
,
Yang Wang
Iterative Design of An Accessible Crypto Wallet for Blind Users.
SOUPS
(2023)
Enze Liu
,
Lu Sun
,
Alex Bellon
,
Grant Ho
,
Geoffrey M. Voelker
,
Stefan Savage
,
Imani N. S. Munyaka
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.
SOUPS
(2023)
Maximiliane Windl
,
Anna Scheidle
,
Ceenu George
,
Sven Mayer
Investigating Security Indicators for Hyperlinking Within the Metaverse.
SOUPS
(2023)
Anna-Marie Ortloff
,
Christian Tiefenau
,
Matthew Smith
SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security.
SOUPS
(2023)
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
,
Christian Tiefenau
Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security.
SOUPS
(2023)
Stefanos Evripidou
,
Uchenna Daniel Ani
,
Stephen Hailes
,
Jeremy D. McK. Watson
Exploring the Security Culture of Operational Technology (OT) Organisations: the Role of External Consultancy in Overcoming Organisational Barriers.
SOUPS
(2023)
Afaq Ashraf
,
Afaq Taha
,
Nida ul Habib Bajwa
,
Cornelius J. König
,
Mobin Javed
,
Maryam Mustafa
"Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan.
SOUPS
(2023)
Warda Usman
,
Jackie Hu
,
McKynlee Wilson
,
Daniel Zappala
Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email.
SOUPS
(2023)
Hsiao-Ying Huang
,
Soteris Demetriou
,
Muhammad Hassan
,
Güliz Seray Tuncay
,
Carl A. Gunter
,
Masooda N. Bashir
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective.
SOUPS
(2023)
Hussein Hazazi
,
Mohamed Shehab
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User.
SOUPS
(2023)
Leon Kersten
,
Tom Mulders
,
Emmanuele Zambon
,
Chris Snijders
,
Luca Allodi
'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center.
SOUPS
(2023)
Rebecca Panskus
,
Max Ninow
,
Sascha Fahl
,
Karola Marky
Privacy Mental Models of Electronic Health Records: A German Case Study.
SOUPS
(2023)
Patrick Gage Kelley
,
Celestina Cornejo
,
Lisa Hayes
,
Ellie Shuo Jin
,
Aaron Sedley
,
Kurt Thomas
,
Yongwei Yang
,
Allison Woodruff
"There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the future.
SOUPS
(2023)
Mark Turner
,
Martin Schmitz
,
Morgan Masichi Bierey
,
Mohamed Khamis
,
Karola Marky
Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor Authentication.
SOUPS
(2023)
Samira Zibaei
,
Amirali Salehi-Abari
,
Julie Thorpe
Dissecting Nudges in Password Managers: Simple Defaults are Powerful.
SOUPS
(2023)
Leijie Wang
,
Ruotong Wang
,
Sterling Williams-Ceci
,
Sanketh Menda
,
Amy X. Zhang
"Is Reporting Worth the Sacrifice of Revealing What I've Sent?": Privacy Considerations When Reporting on End-to-End Encrypted Platforms.
SOUPS
(2023)
Raphael Serafini
,
Marco Gutfleisch
,
Stefan Horstmann
,
Alena Naiakshina
On the Recruitment of Company Developers for Security Studies: Results from a Qualitative Interview Study.
SOUPS
(2023)
Sarah Y. Zheng
,
Ingolf Becker
Checking, nudging or scoring? Evaluating e-mail user security tools.
SOUPS
(2023)
Zhuohao (Jerry) Zhang
,
Smirity Kaushik
,
Jooyoung Seo
,
Haolin Yuan
,
Sauvik Das
,
Leah Findlater
,
Danna Gurari
,
Abigale Stangl
,
Yang Wang
ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content.
SOUPS
(2023)
Emilee Rader
Data Privacy and Pluralistic Ignorance.
SOUPS
(2023)
2017
Andrew M'manga
,
Shamal Faily
,
John McAlaney
,
Christopher Williams
Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk.
SOUPS
(2017)
Scott Ruoti
,
Tyler Monson
,
Justin Wu
,
Daniel Zappala
,
Kent E. Seamons
Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
SOUPS
(2017)
Eunjin Jung
,
Evelyn Y. Ho
Inclusive persuasion for security software adoption.
SOUPS
(2017)
Eric Zeng
,
Shrirang Mare
,
Franziska Roesner
End User Security and Privacy Concerns with Smart Homes.
SOUPS
(2017)
Maximilian Golla
,
Daniel V. Bailey
,
Markus Dürmuth
"I want my money back!" Limiting Online Password-Guessing Financially.
SOUPS
(2017)
Arunesh Mathur
,
Marshini Chetty
Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates.
SOUPS
(2017)
Lynn Tsai
,
Primal Wijesekera
,
Joel Reardon
,
Irwin Reyes
,
Serge Egelman
,
David A. Wagner
,
Nathan Good
,
Jung-Wei Chen
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.
SOUPS
(2017)
Ann-Marie Horcher
Key-bored to Tears: The Usability Cost of Character Authentication on Mobile Devices.
SOUPS
(2017)
Bobby Filar
,
Richard Seymour
,
Matthew Park
Ask Me Anything: A Conversational Interface to Augment Information Security Workers.
SOUPS
(2017)
Sonali Tukaram Marne
,
Mahdi Nasrullah Al-Ameen
,
Matthew K. Wright
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.
SOUPS
(2017)
Cara Bloom
,
Joshua Tan
,
Javed Ramjohn
,
Lujo Bauer
Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles.
SOUPS
(2017)
Tuan Ngyuen
,
Jonathan Voris
Touchscreen Biometrics Across Multiple Devices.
SOUPS
(2017)
Elham Vaziripour
,
Justin Wu
,
Mark O'Neill
,
Jordan Whitehead
,
Scott Heidbrink
,
Kent E. Seamons
,
Daniel Zappala
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
SOUPS
(2017)
Casey Inez Canfield
,
Alex Davis
,
Baruch Fischhoff
,
Alain Forget
,
Sarah Pearman
,
Jeremy Thomas
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics.
SOUPS
(2017)
Sean M. Segreti
,
William Melicher
,
Saranga Komanduri
,
Darya Melicher
,
Richard Shay
,
Blase Ur
,
Lujo Bauer
,
Nicolas Christin
,
Lorrie Faith Cranor
,
Michelle L. Mazurek
Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
SOUPS
(2017)
Kevin Gallagher
,
Sameer Patil
,
Nasir D. Memon
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network.
SOUPS
(2017)
Julie M. Haney
,
Wayne G. Lutters
Skills and Characteristics of Successful Cybersecurity Advocates.
SOUPS
(2017)