CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Lorrie Faith Cranor <[log in to unmask]>
Reply To:
Lorrie Faith Cranor <[log in to unmask]>
Date:
Wed, 13 May 2009 22:41:23 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (84 lines)
Symposium On Usable Privacy and Security
http://cups.cs.cmu.edu/soups/
July 15-17, 2009
Mountain View, CA

Registration is now open (early registration ends June 5)
http://cups.cs.cmu.edu/soups/2009/register.html

Preliminary program is now available
http://cups.cs.cmu.edu/soups/2009/program.html

Tutorials:
Designing and Evaluating Usable Security and Privacy Technology
Think Evil (tm)

Invited talk:
Eric Sachs - Redirects to login pages are bad, or are they?

Panel:
Usability of Security Software - Is Open Source a Positive, Negative,  
or Neutral Factor?

Technical papers:

 Revealing Hidden Context: Improving Mental Models of Personal  
Firewall Users
Fahimeh Raja, Kirstie Hawkey and Konstantin Beznosov

 Social Applications: Exploring A More Secure Framework
Andrew Besmer, Heather Lipford, Mohamed Shehab and Gorrell Cheek
	
 School of Phish: A Real-Word Evaluation of Anti-Phishing Training
Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie  
Cranor, Jason Hong, Mary Ann Blair and Theodore Pham
	
 A "Nutrition Label" for Privacy
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W.  
Reeder
	
 Challenges in Supporting End-User Privacy and Security Management  
with Social Navigation
Jeremy Goecks, W. Keith Edwards and Elizabeth D. Mynatt
	
 Ubiquitous Systems and the Family: Thoughts about the Networked Home
Linda Little, Elizabeth Sillence and Pam Briggs
	
 Look into my Eyes! Can you guess my Password?
Alexander De Luca, Martin Denzel and Heinrich Hussmann
	
 Personal Choice and Challenge Questions: A Security and Usability  
Assessment
Mike Just and David Aspinall
	
 1 + 1 = You: Measuring the comprehensibility of metaphors for  
configuring backup authentication
Stuart Schechter and Robert Reeder
	
 Serial Hook-Ups: A Comparative Usability Study of Secure Device  
Pairing Methods
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun and Yang Wang
	
 Usability and Security of Out-Of-Band Channels in Secure Device  
Pairing Protocols
Ronald Kainda, Ivan Flechais and Andrew William Roscoe
	
 Games for Extracting Randomness
Ran Halprin and Moni Naor
	
 Sanitization's Slippery Slope: The Design and Study of a Text  
Revision Assistant
Richard Chow, Ian Oberst and Jessica Staddon
	
 Balancing Usability and Security in a Video CAPTCHA
Kurt Kluever and Richard Zanibbi
	
 How Users Use Access Control
Diana Smetters and Nathan Good

    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://sigchi.org/listserv
    ---------------------------------------------------------------

ATOM RSS1 RSS2