CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Proportional Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Lorrie Faith Cranor <[log in to unmask]>
Reply To:
Lorrie Faith Cranor <[log in to unmask]>
Date:
Wed, 13 May 2009 22:41:23 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (84 lines)
Symposium On Usable Privacy and Security
http://cups.cs.cmu.edu/soups/
July 15-17, 2009
Mountain View, CA

Registration is now open (early registration ends June 5)
http://cups.cs.cmu.edu/soups/2009/register.html

Preliminary program is now available
http://cups.cs.cmu.edu/soups/2009/program.html

Tutorials:
Designing and Evaluating Usable Security and Privacy Technology
Think Evil (tm)

Invited talk:
Eric Sachs - Redirects to login pages are bad, or are they?

Panel:
Usability of Security Software - Is Open Source a Positive, Negative,  
or Neutral Factor?

Technical papers:

• Revealing Hidden Context: Improving Mental Models of Personal  
Firewall Users
Fahimeh Raja, Kirstie Hawkey and Konstantin Beznosov

• Social Applications: Exploring A More Secure Framework
Andrew Besmer, Heather Lipford, Mohamed Shehab and Gorrell Cheek
	
• School of Phish: A Real-Word Evaluation of Anti-Phishing Training
Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie  
Cranor, Jason Hong, Mary Ann Blair and Theodore Pham
	
• A "Nutrition Label" for Privacy
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W.  
Reeder
	
• Challenges in Supporting End-User Privacy and Security Management  
with Social Navigation
Jeremy Goecks, W. Keith Edwards and Elizabeth D. Mynatt
	
• Ubiquitous Systems and the Family: Thoughts about the Networked Home
Linda Little, Elizabeth Sillence and Pam Briggs
	
• Look into my Eyes! Can you guess my Password?
Alexander De Luca, Martin Denzel and Heinrich Hussmann
	
• Personal Choice and Challenge Questions: A Security and Usability  
Assessment
Mike Just and David Aspinall
	
• 1 + 1 = You: Measuring the comprehensibility of metaphors for  
configuring backup authentication
Stuart Schechter and Robert Reeder
	
• Serial Hook-Ups: A Comparative Usability Study of Secure Device  
Pairing Methods
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun and Yang Wang
	
• Usability and Security of Out-Of-Band Channels in Secure Device  
Pairing Protocols
Ronald Kainda, Ivan Flechais and Andrew William Roscoe
	
• Games for Extracting Randomness
Ran Halprin and Moni Naor
	
• Sanitization's Slippery Slope: The Design and Study of a Text  
Revision Assistant
Richard Chow, Ian Oberst and Jessica Staddon
	
• Balancing Usability and Security in a Video CAPTCHA
Kurt Kluever and Richard Zanibbi
	
• How Users Use Access Control
Diana Smetters and Nathan Good

    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://sigchi.org/listserv
    ---------------------------------------------------------------

ATOM RSS1 RSS2