All Stories

  1. Notice and Choice Cannot Stand Alone
  2. A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile
  3. Identifying User Needs for Advertising Controls on Facebook
  4. A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research
  5. Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts
  6. “You Gotta Watch What You Say”: Surveillance of Communication with Incarcerated People
  7. HCI Ethics, Privacy, Accessibility, and the Environment: A Town Hall Forum on Global Policy Issues
  8. "It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices
  9. Informing the Design of a Personalized Privacy Assistant for the Internet of Things
  10. Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
  11. The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios
  12. Nudges for Privacy and Security
  13. Exploring Topic-Based Sharing Mechanisms
  14. Design and Evaluation of a Data-Driven Password Meter
  15. A Large-Scale Evaluation of U.S. Financial Institutions’ Standardized Privacy Notices
  16. Do Users' Perceptions of Password Security Match Reality?
  17. Supporting Privacy-Conscious App Update Decisions with User Reviews
  18. I Would Like To..., I Shouldn't..., I Wish I...
  19. Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
  20. Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
  21. Better Together: Usability and Security Go Hand in Hand
  22. General Requirements of a Hybrid-Modeling Framework for Cyber Security
  23. Improving App Privacy: Nudging App Developers to Protect User Privacy
  24. A field trial of privacy nudges for facebook
  25. Can long passwords be secure and usable?
  26. Electronic privacy and surveillance
  27. The Privacy and Security Behaviors of Smartphone App Developers
  28. Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy
  29. The post anachronism
  30. Privacy Engineering Emerges as a Hot New Career
  31. Privacy manipulation and acclimation in a location sharing application
  32. "i read my Twitter the next morning and was astonished"
  33. Privacy as part of the app decision-making process
  34. A Shortage of Privacy Engineers
  35. "Little brothers watching you"
  36. Measuring password guessability for an entire university
  37. QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks
  38. The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs
  39. The post that wasn't
  40. What matters to users?
  41. Your attention please
  42. Out of sight, out of mind: Effects of displaying access-control information near the item it controls
  43. Tag, you can see it!
  44. Why Johnny can't opt out
  45. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
  46. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
  47. Can Users Control Online Behavioral Advertising Effectively?
  48. A Conundrum of Permissions: Installing Applications on an Android Smartphone
  49. Correct horse battery staple
  50. Operating system framed in case of mistaken identity
  51. Smart, useful, scary, creepy
  52. Studying access-control usability in the lab
  53. What do online behavioral advertising privacy disclosures communicate to users?
  54. {Privacy, privacidad, Приватност} policies in social media
  55. CANTINA+
  56. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
  57. Exploring reactive access control
  58. More than skin deep
  59. Of passwords and people
  60. When are users comfortable sharing locations with advertisers?
  61. Usability of Forensics Tools: A User Study
  62. Bridging the Gap in Computer Security Warnings: A Mental Model Approach
  63. "I regretted the minute I pressed share"
  64. Adapt-a-ride
  65. An Investigation into Facebook Friend Grouping
  66. Are you close with me? are you nearby?
  67. I know where you live
  68. Improving Computer Security Dialogs
  69. Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
  70. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
  71. Empirical models of privacy in location sharing
  72. CS expertise for institutional review boards
  73. Institutional review boards and your research
  74. Teaching Johnny not to fall for phish
  75. Access control for home data sharing
  76. Americans' attitudes about internet behavioral advertising practices
  77. Are your participants gaming the system?
  78. Encountering stronger password requirements
  79. Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
  80. Locaccino
  81. Standardizing privacy notices
  82. Token attempt
  83. Who falls for phish?
  84. Improving phishing countermeasures: An analysis of expert interviews
  85. Real life challenges in access-control management
  86. Timing is everything?
  87. Who's viewed you?
  88. A "nutrition label" for privacy
  89. A Comparative Study of Online Privacy Policies and Formats
  90. A user study of the expandable grid applied to P3P privacy policy visualization
  91. Analyzing use of privacy policy attributes in a location sharing application
  92. Engineering Privacy
  93. School of phish
  94. The impact of privacy indicators on search engine browsing patterns
  95. Who's viewed you?
  96. A Survey to Guide Group Key Protocol Development
  97. Understanding and capturing people’s privacy policies in a mobile social networking application
  98. Lessons from a real world evaluation of anti-phishing training
  99. P3P deployment on websites
  100. A user study of policy creation in a flexible access-control system
  101. Expandable grids for visualizing and authoring computer security policies
  102. You've been warned
  103. A user study of the expandable grid applied to P3P privacy policy visualization
  104. User-controllable learning of security and privacy policies
  105. Forum
  106. Protecting people from phishing
  107. User-Controllable Security and Privacy for Pervasive Computing
  108. Anti-Phishing Phil
  109. Behavioral response to phishing risk
  110. Cantina
  111. Getting users to pay attention to anti-phishing education
  112. Lessons learned from the deployment of a smartphone-based access-control system
  113. User interfaces for privacy agents
  114. What do they "indicate?"
  115. An analysis of P3P-enabled web sites among top-20 search results
  116. Decision strategies and susceptibility to phishing
  117. Human selection of mnemonic phrase-based passwords
  118. Power strips, prophylactics, and privacy, oh my!
  119. Privacy in India: Attitudes and Awareness
  120. Privacy patterns for online interactions
  121. Vicarious infringement creates a privacy ceiling
  122. Giving notice: why privacy policies and security breach notifications aren't enough
  123. Peripheral privacy notifications for wireless networks
  124. Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
  125. Guest Editors' Introduction: Secure or Usable?
  126. An analysis of security vulnerabilities in the movie production and distribution process
  127. I Didn’t buy It for Myself
  128. P3P: making privacy policies more useful
  129. Analysis of security vulnerabilities in the movie production and distribution process
  130. Automated analysis of P3P-enabled Web sites
  131. In Search of the Perfect Voting Technology: No Easy Answers
  132. Letter from the Special Section Editor
  133. The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences
  134. Use of a P3P user agent by early adopters
  135. The architecture of robust publishing systems
  136. Internet voting for public officials: introduction
  137. Voting after Florida
  138. Influencing software usage
  139. Internet privacy
  140. Privacy critics
  141. Privacy in e-commerce
  142. Putting it together
  143. Laws, self-relf-regulation, and P3P: will W3C's privacy platform help make the Web safe for privacy?
  144. Research posters 101