USP論文読破会
ユーザブルセキュリティ・プライバシ(USP)論文読破会
ユーザブルセキュリティ・プライバシに関するトップ論文を読んで得られた知見を発表・共有する会。
開催:年1~2回
場所:オンサイトもしくはハイブリッド
各読破会のプログラム情報(折り畳みページ)
USP論文読破会7
ユーザブルセキュリティ・プライバシー(USP)論文読破会7
更新日:2023年11月23日
プログラムを一部更新
ユーザブルセキュリティ・プライバシー研究とは、セキュリティとプライバシーのユーザビリティに特化した研究領域であり、主にヒューマンファクタに焦点を当ててセキュリティ・プライバシーを議論します。 ユーザブルセキュリティ・プライバシーの研究は世界的な発展を見せており、本分野を専門的に扱う国際会議 Symposium on Usable Privacy and Security (SOUPS) への投稿数と採録数も増加が続いています。 加えて、SOUPSに限らずセキュリティ・プライバシーの難関国際会議で本分野の論文が多く発表されるようになり、本分野の裾野は確実に広がっています。 ユーザブルセキュリティ・プライバシー論文読破会は、このような発展を考慮し、当初開催されていたSOUPS論文読破会をもとに、SOUPS以外の国際会議も広く対象会議とすることで発展させたイベントです。 本読破会では、参加者同士で協力して本分野の最先端の論文を紹介し合い、参加者が最先端研究を広く把握することを目指します。 また最先端研究の把握を通して、SPT研究会が対象とする分野の国内研究の底上げを図ります。
第7回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3、2020年11月に開催されたUSP読破会4、2021年7月に開催されたUSP読破会5、2022年11月に開催されたUSP読破会6に続く開催です。
開催要項
日時: 2023年11月24日(金) 10:00~18:00(予定)
開催形式: ハイブリット開催
現地会場: NICTイノベーションセンター(東京都中央区日本橋2-7-1 東京日本橋タワー 15階) (予定)[交通のご案内(PDF)]
オンライン: Zoom
会場の収容人数に限りがございます。現地参加を希望の方は、早めの申込をお願いします。なお、発表者や学生参加者の現地参加を優先させていただく可能性があり、必ずしも先着順とはならないこと予めご了承願います。現地参加の可否については申込受付後に開催担当より個別にご連絡します。
参加費: 無料
発表者募集(締め切りました)
本読破会で論文を紹介していただける方を募集します。 1論文につき15 or 20分程度(質疑込み、発表時間は発表者人数をみて後日連絡させていただきます)でご紹介ください。 紹介のスライドを事前にお送りいただき、当日の参加者と共有します。
発表申込は、定員に達し次第締め切ります。
紹介いただく論文は、前回の読破会発表申込以降(2022年09月〜2023年11月)に発表された、ユーザブルセキュリティ・プライバシーに関わると考えられる論文からお好きにお選びください。
参考までに、ユーザブルセキュリティ・プライバシー論文が発表されている代表的な国際会議を、本ウェブページの下部にリストアップしました。 ただし、それらの国際会議に限定せず、ヒューマンファクタとセキュリティ・プライバシーを扱った論文を広く受け付けます。
発表希望の方は以下のフォームより申込をお願いします。
USP論文読破会7 発表申込フォーム(Googleフォーム)
ご入力いただく内容:
氏名
所属(会社名・学校名等)
メールアドレス
発表を希望する論文
希望の発表方法(現地 or オンライン)※円滑な進行のため可能であれば現地参加頂けると幸いです
フォームによる発表申込受付後、紹介いただく論文の確定の連絡を開催担当より差し上げます。
参加者募集(締め切りました)
参加希望の方は以下のフォームより申込をお願いします。発表申込者の参加申込は不要です。
USP論文読破会7 参加申込フォーム(Googleフォーム)
ご入力いただく内容:
氏名
所属(会社名・学校名等)
メールアドレス
希望の参加方法(現地 or オンライン)
お知らせ
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 情報処理学会の学会員の方の登録費は3,600円(税抜)です。
情報処理学会に入会するためには、別途入会金と年会費が必要です。 非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
懇親会
読破会終了後に懇親会を行います。
場所
時間
18:30-
会費
6,000円 (予定)
SPT研究会から懇親会費の領収書は発行されません。どうしても領収書が必要な方は会場店舗からの発行となります。
参考:ユーザブルセキュリティ・プライバシー論文が発表される代表的な国際会議
ユーザブルセキュリティ・プライバシーに特化した国際会議
SOUPS(SOUPS'23)
EuroUSEC(EuroUSEC'22, EuroUSEC'23)
USEC(USEC'23)
セキュリティ・プライバシー全般を取り扱う国際会議
S&P(S&P'23)
USENIX Security(USENIX Security'23)
NDSS(NDSS'23)
PETS(PETS'23)
ACSAC(ACSAC'22)
AsiaCCS(AsiaCCS'23)
EuroS&P( EuroS&P'23)
ESORICS(ESORICS'23)
HCI分野の国際会議(セキュリティ・プライバシーに関するセッション有)
注意:本ページ公開時点(2023年8月)で、プログラム等が未公開の会議も含みます
運営
お問い合わせ先: uspread 【アットマーク】spt.ipsj.or.jp
開催担当:山岸 伶(日立)
運営メンバ:
長谷川 彩子(NICT)
金森 祥子(NICT)
畑島 隆(NTT)
坂本 一仁(DataSign)
USP論文読破会6
ユーザブルセキュリティ・プライバシー(USP)論文読破会6
更新日:2022年11月15日
ユーザブルセキュリティ・プライバシー研究とは、セキュリティとプライバシーのユーザビリティに特化した研究領域であり、主にヒューマンファクタに焦点を当ててセキュリティ・プライバシーを議論します。 ユーザブルセキュリティ・プライバシーの研究は世界的な発展を見せており、本分野を専門的に扱う国際会議 Symposium on Usable Privacy and Security (SOUPS) への投稿数と採録数も増加が続いています。 加えて、SOUPSに限らずセキュリティ・プライバシーの難関国際会議で本分野の論文が多く発表されるようになり、本分野の裾野は確実に広がっています。 ユーザブルセキュリティ・プライバシー論文読破会は、このような発展を考慮し、当初開催されていたSOUPS論文読破会をもとに、SOUPS以外の国際会議も広く対象会議とすることで発展させたイベントです。 本読破会では、参加者同士で協力して本分野の最先端の論文を紹介し合い、参加者が最先端研究を広く把握することを目指します。 また最先端研究の把握を通して、SPT研究会が対象とする分野の国内研究の底上げを図ります。
第6回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3、2020年11月に開催されたUSP読破会4、2021年7月に開催されたUSP読破会5に続く開催です。
開催要項
日時: 2022年11月18日(金) 10:30~17:00
開催形式: ハイブリット開催
現地会場: 千代田区大手町1-8-1 KDDI大手町ビル16階(NICTイノベーションセンター)[交通のご案内(PDF)]
オンライン: Zoom
会場の収容人数に限りがございます。現地参加を希望の方は、早めの申込をお願いします。なお、発表者や学生参加者の現地参加を優先させていただく可能性があり、必ずしも先着順とはならないこと予めご了承願います。現地参加の可否については申込受付後に開催担当より個別にご連絡します。
参加費: 無料
発表者募集(締め切りました)
本読破会で論文を紹介していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただき、当日の参加者と共有します。
発表申込は、定員に達し次第締め切ります。
紹介いただく論文は、前回の読破会以降(2021年8月~2022年11月)に発表された、ユーザブルセキュリティ・プライバシーに関わると考えられる論文からお好きにお選びください。
参考までに、ユーザブルセキュリティ・プライバシー論文が発表されている代表的な国際会議を、本ウェブページの下部にリストアップしました。 ただし、それらの国際会議に限定せず、ヒューマンファクタとセキュリティ・プライバシーを扱った論文を広く受け付けます。
発表希望の方は以下のフォームより申込をお願いします。
USP論文読破会6 発表申込フォーム(Googleフォーム)
ご入力いただく内容:
氏名
所属(会社名・学校名等)
メールアドレス
発表を希望する論文
希望の発表方法(現地 or オンライン)
フォームによる発表申込受付後、紹介いただく論文の確定の連絡を開催担当より差し上げます。
参加者募集 11/17(木) 12:00まで(現地参加は締め切りました)
参加希望の方は以下のフォームより申込をお願いします。発表申込者の参加申込は不要です。
USP論文読破会6 参加申込フォーム(Googleフォーム)
ご入力いただく内容:
氏名
所属(会社名・学校名等)
メールアドレス
希望の参加方法(現地 or オンライン)
お知らせ
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 情報処理学会の学会員の方の登録費は3,600円(税抜)です。
情報処理学会に入会するためには、別途入会金と年会費が必要です。 非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
参考:ユーザブルセキュリティ・プライバシー論文が発表される代表的な国際会議
ユーザブルセキュリティ・プライバシーに特化した国際会議
EuroUSEC(EuroUSEC'21)
USEC(USEC'22)
セキュリティ・プライバシー全般を取り扱う国際会議
S&P(S&P'22)
USENIX Security(USENIX Security'21, USENIX Security'22)
NDSS(NDSS'22)
PETS(PETS'22)
ACSAC(ACSAC'21)
AsiaCCS(AsiaCCS'22)
EuroS&P(EuroS&P'21, EuroS&P'22)
ESORICS(ESORICS'21, ESORICS'22)
HCI分野の国際会議(セキュリティ・プライバシーに関するセッション有)
運営
お問い合わせ先: uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
運営メンバ:
長谷川 彩子(NICT)
畑島 隆(NTT)
金森 祥子(NICT)
坂本 一仁(DataSign)
金岡 晃(東邦大学)
USP論文読破会5
ユーザブルセキュリティ・プライバシー(USP)論文読破会5
更新日:2021年7月21日
ユーザブルセキュリティ・プライバシー研究とは、セキュリティとプライバシーのユーザビリティに特化した研究領域であり、主にヒューマンファクタに焦点を当ててセキュリティ・プライバシーを議論します。 ユーザブルセキュリティ・プライバシーの研究は世界的な発展を見せており、本分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、SOUPSに限らずセキュリティ・プライバシーの難関国際会議で本分野の論文が多く発表されるようになり、本分野の裾野は確実に広がっています。 ユーザブルセキュリティ・プライバシー論文読破会は、このような発展を考慮し、当初開催されていたSOUPS論文読破会をもとに、SOUPS以外の国際会議も広く対象会議とすることで発展させたイベントです。 本読破会では、参加者同士で協力して本分野の最先端の論文を紹介し合い、参加者が最先端研究を広く把握することを目指します。 また最先端研究の把握を通して、SPT研究会が対象とする分野の国内研究の底上げを図ります。
第5回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3、2020年11月に開催されたUSP読破会4に続く開催です。
開催要項
日時:2021年7月21日(水)13:00~18:15
会場:オンライン(Zoom)
参加費
無料
発表者募集(締め切りました)
本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者と共有いたします。
発表申し込みは、定員に達し次第締め切ります。
論文はこの1年(2020年8月~2021年7月)に発表されたユーザブルセキュリティ・プライバシーに関わると考えられる論文からお好きにお選びください。
発表を希望する論文が前回の論文読破会(USP読破会4)にて既に発表されていないことをご確認の上、お申し込みください。また、
参考までに、ユーザブルセキュリティ・プライバシーの論文が複数発表されている代表的な国際会議を、本ウェブページの下部に「参考:ユーザブルセキュリティ・プライバシーの論文が発表される代表的な国際会議」としてリストアップいたしました。 ただし、それらの国際会議に限定せず、ヒューマンファクタとセキュリティ・プライバシーを扱った論文を広く受け付けます。
発表ご希望の方は、次のフォームより入力してください。
https://docs.google.com/forms/d/1wo-IambiBlUurliGdgQ1aYY88CE6ujUGe_swUak65qg/
入力いただく内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文
担当論文の決定方法について
フォームによる受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、開催担当より発表者にご連絡し本ページ上でアナウンスいたします。
参加申込
参加ご希望の方は、次のフォームより入力してください。発表者の方は入力不要です。
https://docs.google.com/forms/d/1pM7ZeeTHZeVIpT6DNN7Z91m6Pt669_wa5DAoMOdmwzA/
入力いただく内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
参加者区別(研究会登録会員、情報処理学会学生会員、一般(非会員))
お知らせ
その他
当日は論文データは共有しませんので、各自でご準備ください。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
参考:ユーザブルセキュリティ・プライバシーの論文が発表される代表的な国際会議
ユーザブルセキュリティ・プライバシーを専門的に扱う国際会議
SOUPS(SOUPS'20)
EuroUSEC(EuroUSEC'20)
USEC(USEC'21)
セキュリティ・プライバシー全般を取り扱う国際会議
S&P(S&P'21)
USENIX Security(USENIX Security'20)
CCS(CCS'20)
NDSS(NDSS'21)
PETS(PETS'21)
ACSAC(ACSAC'20)
AsiaCCS(AsiaCCS'20)
EuroS&P(EuroS&P'20)
ESORICS(ESORICS'20)
ユーザブルセキュリティ・プライバシーを一部含む、HCI分野の国際会議
運営について
お問い合わせ先
uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
長谷川 彩子(NTT研究所)
USP論文読破会4
ユーザブルセキュリティ・プライバシー(USP)論文読破会4
更新日:2020年11月16日
ユーザブルセキュリティ・プライバシーの分野は世界的な発展を見せ、当該分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会が開始されました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。
第3回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3に続く開催です。
開催要項
日時:2020年11月27日(金)10:00~18:00(予定)
会場:オンライン(Zoom)
参加費
無料
発表者募集(締め切りました)
本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者と共有いたします。
発表申し込みは、定員に達し次第締め切ります。
論文はこの1年(2019年11月~2020年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。
参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文4」としてリストアップいたしました。ご参考ください。
発表ご希望の方は、次のフォームより入力してください。
https://forms.gle/nmii55Ch8n2VKdL88
入力いただく内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文
担当論文の決定方法について
フォームによる受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。
論文担当情報
Célestin Matte (Inria, France), Nataliia Bielova (Inria, France), Cristiana Santos (Inria, France) : "Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework" , S&P 2020
担当:坂本一仁(株式会社DataSign)
Joshua Reynolds, University of Illinois at Urbana-Champaign and University of California, Berkeley and International Computer Science Institute; Nikita Samarin, University of California, Berkeley and International Computer Science Institute; Joseph Barnes, Taylor Judd, Joshua Mason, and Michael Bailey, University of Illinois at Urbana-Champaign; Serge Egelman, University of California, Berkeley and International Computer Science Institute : "Empirical Measurement of Systemic 2FA Usability" , USENIX Security '20
担当:藤田真浩(三菱電機株式会社)
Anastasia Danilova, Alena Naiakshina, and Johanna Deuter, University of Bonn; Matthew Smith, University of Bonn and Fraunhofer FKIE : "Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers" , SOUPS 2020
担当:秋山満昭(NTTセキュアプラットフォーム研究所)
Martin Ukrop, Masaryk University; Lydia Kraus, Masaryk University; Vashek Matyas, Masaryk University; Heider Ahmad Mutleq Wahsheh, Ca' Foscari University of Venice : "Will You Trust This TLS Certificate? Perceptions of People Working in IT" , ACSAC 2019
担当:Yuji Suga(Internet Initiative Japan Inc.)
Philipp Markert (Ruhr University Bochum), Daniel Bailey (Ruhr University Bochum), Maximilian Golla (Max Planck Institute for Security and Privacy), Markus Dürmuth (Ruhr University Bochum), Adam Aviv (The George Washington University) : "This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs" , S&P 2020
担当:江原知志(電気通信大学)
Endsley, M.R : "Toward a Theory of Situation Awareness in Dynamic" , Systems. Human Factors Journal 37(1), 32-64 (1995)
担当:村山優子(津田塾大学)
Agnieszka Kitkowska, Karlstad University; Mark Warner, Northumbria University; Yefim Shulman, Tel Aviv University; Erik Wästlund and Leonardo A. Martucci, Karlstad University : "Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect" , SOUPS 2020
担当:金森祥子(国立研究開発法人情報通信研究機構)
Rebecca Jeong and Sonia Chiasson : "'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings" , CHI 2020
担当:坪根 恵(早稲田大学)
Sara Albakry, Kami Vaniea, and Maria K. Wolters : "What is this URL's Destination? Empirical Evaluation of Users' URL Reading" , CHI 2020
担当:長谷川彩子(NTTセキュアプラットフォーム研究所)
Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani : "Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats" , CHI 2020
担当:横山 佳紀(電気通信大学)
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Michael Hicks, University of Maryland : "Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It" , USENIX Security '20
担当:ももいやすなり(株式会社インターネットイニシアティブ)
Benjamin Zi Hao Zhao (University of New South Wales and Data61 CSIRO), Hassan Jameel Asghar (Macquarie University and Data61 CSIRO), Mohamed Ali Kaafar (Macquarie University and Data61 CSIRO) : "On the Resilience of Biometric Authentication Systems against Random Inputs" , NDSS 2020
担当:大木哲史(静岡大学)
Joshua Tan (Carnegie Mellon University); Lujo Bauer (Carnegie Mellon University); Nicolas Christin (Carnegie Mellon University); Lorrie Faith Cranor (Carnegie Mellon University) : "Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements" , CCS 2020
担当:金岡晃(東邦大学)
Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, and Reyhan Duezguen, Karlsruhe Institute of Technology; Bettina Lofthouse, Landesamt für Geoinformation und Landesvermessung Niedersachsen; Tatiana von Landesberger, Technische Universität Darmstadt; Melanie Volkamer, Karlsruhe Institute of Technology : "An investigation of phishing awareness and education over time: When and how to best remind users" , SOUPS 2020
担当:河田真由子(株式会社富士通研究所)
参加申込
参加ご希望の方は、次のフォームより入力してください。発表者の方は入力不要です。
https://forms.gle/2uVhQQsZmQPyoxHv8
入力いただく内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
参加者区別(研究会登録会員、情報処理学会学生会員、一般(非会員))
お知らせ
その他
当日は論文データは共有しませんので、各自でご準備ください。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
参考:代表的な国際会議で発表されたUSP論文4
EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection
Yuma Kurogome, NTT Secure Platform Laboratories; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Syogo Hayashi, NTT Security (Japan) KK; Tatsuya Mori, Waseda University / NICT; Koushik Sen, University of California, Berkeley
Your Hashed IP Address: Ubuntu - Perspectives on Transparency Tools for Online Advertising
Tobias Urban, Institute for Internet Security, Westphalian University of Applied Sciences; Martin Degeling, Ruhr University Bochum; Horst Gortz Institute for IT Security; Thorsten Holz, Ruhr University Bochum; Horst Gortz Institute for IT Security; Norbert Pohlmann, Institute for Internet Security, Westphalian University of Applied Sciences
Will You Trust This TLS Certificate? Perceptions of People Working in IT
Martin Ukrop, Masaryk University; Lydia Kraus, Masaryk University; Vashek Matyas, Masaryk University; Heider Ahmad Mutleq Wahsheh, Ca' Foscari University of Venice
I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders
Ayako Akiyama Hasegawa, NTT Secure Platform Laboratories; Takuya Watanabe, NTT Secure Platform Laboratories; Eitaro Shioji, NTT Secure Platform Laboratories; Mitsuaki Akiyama, NTT Secure Platform Laboratories
Open Market or Ghost Town? The Curious Case of OpenBazaar
James E. Arps (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
Artemij Voskobojnikov (University of British Columbia), Borke Obada-Obieh (University of British Columbia), Yue Huang (University of British Columbia), Konstantin Beznosov (University of British Columbia)
A Tale of Two Browsers: Understanding User’s Web Browser Choices in South Korea -
Simon Woo, Hyoungshick Kim, Ji Won Choi, Soyoon Jeon, Jihye Woo and Joon Han
User-Centered Risk Communication for Safer Browsing
Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe and L. Jean Camp.
Secure Email – A Usability Study
Adrian Reuter, Ahmed Abdelmaksoud, Wadie Lemrazzeq, Karima Boudaoud and Marco Winckler
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails,
George Nasser, Ben Morrison, Piers Bayl-Smith, Ronnie Taib, Michael Gayed, and Mark Wiggins
Cue Utilization, Phishing Feature and Phishing Email Detection
Piers Bayl-Smith, Daniel Sturman and Mark Wiggins
Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences
KovilaP.L.Coopamootoo
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation,
Oksana Kulyk, Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer.
Understanding Perceptions of Smart Devices
Hilda Hadan, Sameer Patil
In Our Employer We Trust: Mental Models of Office Worker’s Privacy Perceptions
Jan Tolsdorf and Florian Dehling
Behaviour of Outsourced Employees as Sources of Information System Security Threats
David Oyebisi and Kennedy Njenga
Exploring Effects of Auditory Stimuli on CAPTCHA Performance
Gene Tsudik, Tyler Kaczmarek, Bruce Berg, Alfred Kobsa
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
Xian Chu, Huiping Sun, Zhong Chen
Empathy as a Response to Frustration in Password Choice
Kovila P.L. Coopamootoo
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage
Harshal Tupsamudre,Monika Sahu,Kumar Vidhani,Sachin Lodha
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach
Jacqui Taylor-Jackson, John McAlaney, Jeff Foster, Abubakar Bello, Alana Maurushat, John Dale
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators
Imani N. Sherman (University of Florida), Jasmine D. Bowers (University of Florida), Keith McNamara Jr. (University of Florida), Juan E. Gilbert (University of Florida), Jaime Ruiz (University of Florida), Patrick Traynor (University of Florida)
OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display
Shiqing Luo (Georgia State University), Anh Nguyen (Georgia State University), Chen Song (San Diego State University), Feng Lin (Zhejiang University), Wenyao Xu (SUNY Buffalo), Zhisheng Yan (Georgia State University)
On the Resilience of Biometric Authentication Systems against Random Inputs
Benjamin Zi Hao Zhao (University of New South Wales and Data61 CSIRO), Hassan Jameel Asghar (Macquarie University and Data61 CSIRO), Mohamed Ali Kaafar (Macquarie University and Data61 CSIRO)
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities
Zhenfeng Zhang (Chinese Academy of Sciences, University of Chinese Academy of Sciences, and The Joint Academy of Blockchain Innovation), Yuchen Wang (Chinese Academy of Sciences and University of Chinese Academy of Sciences), Kang Yang (State Key Laboratory of Cryptology)
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems
Matthew Smith (University of Oxford), Martin Strohmeier (University of Oxford), Jonathan Harman (Vrije Universiteit Amsterdam), Vincent Lenders (armasuisse Science and Technology), Ivan Martinovic (University of Oxford)
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference
Peter Ney (University of Washington), Luis Ceze (University of Washington), Tadayoshi Kohno (University of Washington)
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
Sebastian Roth (CISPA Helmholtz Center for Information Security), Timothy Barron (Stony Brook University), Stefano Calzavara (Università Ca' Foscari Venezia), Nick Nikiforakis (Stony Brook University), Ben Stock (CISPA Helmholtz Center for Information Security)
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
Peng Wang (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), Yue Qin (Indiana University Bloomington), XiaoFeng Wang (Indiana University Bloomington)
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
Rock Stevens (University of Maryland), Josiah Dykstra (Independent Security Researcher), Wendy Knox Everette (Leviathan Security Group), James Chapman (Independent Security Researcher), Garrett Bladow (Dragos), Alexander Farmer (Independent Security Researcher), Kevin Halliday (University of Maryland), Michelle L. Mazurek (University of Maryland)
"Addressing Anonymous Abuses: Measuring the Effects of Technical Mechanisms on Reported User Behaviors "
Wajeeha Ahmad and Ilaria Liccardi
"Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks "
Yue Huang, Borke Obada-Obieh, and Konstantin (Kosta) Beznosov
"Arseing around was Fun!" Humor as a Resource in Design and Making
NettaIivari, Marianne Kinnula, LeenaKuure and TiinaKeisanen
"Bug or Feature? Covert Impairments to Human Computer Interaction "
John V. Monaco
"Building and Validating a Scale for Secure Software Development Self-Efficacy "
Daniel J Votipka, Desiree Abrokwa, and Michelle L. Mazurek
"Circle of Trust: A New Approach to Mobile Online Safety for Families "
Arup Kumar Ghosh, Charles E. Hughes, and Pamela J. Wisniewski
"Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence "
Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal
Does Context in Privacy Communication Really Matter? A Survey on Consumer Concerns and Preferences
Nico Ebert, Kurt Alexander Ackermann and Peter Heinrich
"Effects of Credibility Indicators on Social Media News Sharing Intent "
Waheeb Yaqub, Otari Kakhidze, Morgan L. Brockman, Nasir Memon, and Sameer Patil
"Evaluating 'Prefer not to say' Around Sensitive Disclosures "
Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, and Ann Blandford
"Evaluating the End-User Experience of Private Browsing Mode "
Ruba Abu-Salma and Benjamin Livshits
"Evaluating the Information Security Awareness of Smartphone Users "
Ron Bitton, Kobi Boymgold, Rami Puzis, and Asaf Shabtai
"Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices "
Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, johann roturier, and Florian Schaub
"Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats "
Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani
"How Mandatory Second Factor Affects the Authentication User Experience "
Jacob Abbott and Sameer Patil
"I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios "
Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I. Hong
"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies
Khadija Baig, Reham Mohamed, Anna-Lena Theus, and Sonia Chiasson
"Informing the Design of a Personalized Privacy Assistant for the Internet of Things "
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh
"""It's a scavenger hunt"": Usability of Websites' Opt-Out and Data Deletion Choices "
Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub
"Let's Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences "
Afsaneh Razi, Karla Badillo-Urquiola and Pamela J. Wisniewski
Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings
Rebecca Jeong and Sonia Chiasson
"Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs "
Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl
"Measuring Identity Confusion with Uniform Resource Locators "
Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan C Subramanian, Meishan Wu, Martin Shelton, Joshua Mason, Emily Stark, and Michael Bailey
On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers
Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, and Matthew Smith
"Online Privacy Heuristics that Predict Information Disclosure "
S. Shyam Sundar, Jinyoung Kim, Mary Beth Rosson and Maria D. Molina
Ownership, Privacy, and Control in the Wake of Cambridge Analytica: The Relationship between Attitudes and Awareness
Frank M. Shipman and Catherine C. Marshall
Private Responses for Public Sharing: Understanding Self-Presentation and Relational Maintenance via Stories in Social Media
Penny Triệu and Nancy K. Baym
Robocalling: STIRRED AND SHAKEN! – An Investigation of Calling Displays on Trust and Answer Rates
Gregory W. Edwards, Michael J. Gonzales, and Marc A. Sullivan
Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information
Julia Hanson, Miranda Wei, Sophie Veys, Matthew Kugler, Lior Strahilevitz, and Blase Ur
"The Burden of Ending Online Account Sharing "
Borke Obada-Obieh, Yue Huang, and Konstantin Beznosov
"The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions "
Reham Mohamed, Paulina Chametka, and Sonia Chiasson
"The Politics of Privacy Theories: Moving from Norms to Vulnerabilities "
Nora McDonald and Andrea Forte
"The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions "
Christina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, and Florian Alt
"Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos "
Yifang Li, Nishant Vishwamitra, Hongxin Hu, and Kelly Caine
"Understanding Cybersecurity Practices in Emergency Departments "
Elizabeth Stobert, David Barrera, Valérie Homier, and Daniel Kollek
"Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours "
Sandra Gabriele and Sonia Chiasson
"Understanding Privacy-Related Questions on Stack Overflow "
Mohammad Tahaei, Kami Vaniea, and Naomi Saphra
"User Experiences with Online Status Indicators "
Camille Cobb, Lucy Simko, Tadayoshi Kohno, and Alexis Hiniker
"""We Hold Each Other Accountable"": Unpacking How Social Groups Approach Cybersecurity and Privacy Together "
Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das
"What is this URL's Destination? Empirical Evaluation of Users' URL Reading "
Sara Albakry, Kami Vaniea, and Maria K. Wolters
"Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email "
Jayati Dev, Emilee Rader, and Sameer Patil
"Will Deleting History Make Alexa More Trustworthy? Effects of Privacy and Content Customization on User Experience of Smart Speakers "
Eugene Cho, S. ShyamSundar, Saeed Abdullah and NasimMotalebi
"Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication"
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Germany), Michael Schilling (CISPA Helmholtz Center for Information Security, Germany), Michaela Neumayr (CISPA Helmholtz Center for Information Security, Germany), Michael Backes (CISPA Helmholtz Center for Information Security, Germany), Sven Bugiel (CISPA Helmholtz Center for Information Security, Germany)
"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs"
"Philipp Markert (Ruhr University Bochum), Daniel Bailey (Ruhr University Bochum), Maximilian Golla (Max Planck Institute for Security and Privacy), Markus Dürmuth (Ruhr University Bochum), Adam Aviv (The George Washington University) "
"Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies"
"Eunyong Cheon (UNIST, Republic of Korea), Yonghwan Shin (UNIST, Republic of Korea), Jun Ho Huh (Samsung Research, Republic of Korea), Hyoungshick Kim (Sungkyunkwan University, Republic of Korea), Ian Oakley (UNIST, Republic of Korea) "
Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework
"Célestin Matte (Inria, France), Nataliia Bielova (Inria, France), Cristiana Santos (Inria, France) "
"Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings"
"Mary Jean Amon (University of Colorado Boulder), Rakibul Hasan (Indiana University), Kurt Hugenberg (Indiana University), Bennett Bertenthal (Indiana University), Apu Kapadia (Indiana University) "
Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise
Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, and Sachin Premsukh Lodha, Sankalp Suneel Pandit, TCS Research, Tata Consultancy Services Limited
“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company
Florian M. Farke, Ruhr University Bochum; Lennart Lorenz, tracekey solutions GmbH; Theodor Schnitzler, Philipp Markert, and Markus Dürmuth, Ruhr University Bochum
Knock, Knock. Who’s There? On the Security of LG’s Knock Codes
Raina Samuel, New Jersey Institute of Technology; Philipp Markert, Ruhr University Bochum, Germany; Adam J. Aviv, The George Washington University; Iulian Neamtiu, New Jersey Institute of Technology
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
"Kevin Lee, Benjamin Kaiser, Jonathan Mayer, and Arvind Narayanan, Princeton University "
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations
"Jayati Dev, Indiana University; Pablo Moriano, Oak Ridge National Laboratory; L. Jean Camp, Indiana University "
Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges
Nora McDonald, Alison Larsen, and Allison Battisti, University of Maryland, Baltimore County; Galina Madjaroff, University of Maryland; Aaron Massey and Helena Mentis, University of Maryland, Baltimore County
Blind and Human: Exploring More Usable Audio CAPTCHA Designs
"Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, and Sauvik Das, Georgia Institute of Technology "
Usable Sexurity: Studying People’s Concerns and Strategies When Sexting
"Christine Geeng, Jevan Hutson, and Franziska Roesner, University of Washington "
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault
Borke Obada-Obieh, The University of British Columbia; Lucrezia Spagnolo, Vesta Social Innovation Technologies; Konstantin (Kosta) Beznosov, University of British Columbia
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers
"Anastasia Danilova, Alena Naiakshina, and Johanna Deuter, University of Bonn; Matthew Smith, University of Bonn and Fraunhofer FKIE "
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras
"George Chalhoub and Ivan Flechais, University of Oxford; Norbert Nthala, Michigan State University; Ruba Abu-Salma, University College London (UCL) & Inria "
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development
"Hernan Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, and Xinming Ou, University of South Florida "
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security
"Justin Smith, Lafayette College; Lisa Nguyen Quang Do and Emerson Murphy-Hill, Google "
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
Christian Tiefenau and Maximilian Häring, University of Bonn; Katharina Krombholz, CISPA Helmholtz Center for Information Security; Emanuel von Zezschwitz, University of Bonn and Fraunhofer FKIE
An investigation of phishing awareness and education over time: When and how to best remind users
Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, and Reyhan Duezguen, Karlsruhe Institute of Technology; Bettina Lofthouse, Landesamt für Geoinformation und Landesvermessung Niedersachsen; Tatiana von Landesberger, Technische Universität Darmstadt; Melanie Volkamer, Karlsruhe Institute of Technology
An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes
Steffen Becker, Carina Wiesen, and Nils Albartus, Ruhr University Bochum and Max Planck Institute for Cybersecurity and Privacy; Nikol Rummel, Ruhr University Bochum; Christof Paar, Max Planck Institute for Cybersecurity and Privacy
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures
"Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, and Awais Rashid, University of Bristol "
"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild
Noura Alomar, University of California, Berkeley; Primal Wijesekera, UC Berkeley / ICSI; Edward Qiu, University of California, Berkeley; Serge Egelman, UC Berkeley / ICSI
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
"Alexandra Mai and Katharina Pfeffer, SBA Research; Matthias Gusenbauer, Tokyo Institute of Technology and SBA Research; Edgar Weippl, University of Vienna; Katharina Krombholz, CISPA Helmholtz Center for Information Security "
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
"Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl, Leibniz University Hannover "
From Intent to Action: Nudging Users Towards Secure Mobile Payments
"Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan "
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption
"Natã M. Barbosa, Zhuohao Zhang, and Yang Wang, University of Illinois at Urbana-Champaign "
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect
Agnieszka Kitkowska, Karlstad University; Mark Warner, Northumbria University; Yefim Shulman, Tel Aviv University; Erik Wästlund and Leonardo A. Martucci, Karlstad University
"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions
"Emilee Rader, Samantha Hautea, and Anjali Munasinghe, Michigan State University "
Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories
"Sarah Bird, Ilana Segall, and Martin Lopatka, Mozilla "
How Risky Are Real Users' IFTTT Applets?
Camille Cobb and Milijana Surbatovich, Carnegie Mellon University; Anna Kawakami, Wellesley College; Mahmood Sharif, NortonLifeLock; Lujo Bauer, Carnegie Mellon University; Anupam Das, North Carolina State University; Limin Jia, Carnegie Mellon University
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications
Taslima Akter, Indiana University Bloomington; Bryan Dosono, Syracuse University; Tousif Ahmed and Apu Kapadia, Indiana University Bloomington; Bryan Semaan, Syracuse University
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Michael Hicks, University of Maryland
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
Elissa M. Redmiles, Microsoft Research; Noel Warford, Amritha Jayanti, and Aravind Koneru, University of Maryland; Sean Kross, University of California, San Diego; Miraida Morales, Rutgers University; Rock Stevens and Michelle L. Mazurek, University of Maryland
Empirical Measurement of Systemic 2FA Usability
Joshua Reynolds, University of Illinois at Urbana-Champaign and University of California, Berkeley and International Computer Science Institute; Nikita Samarin, University of California, Berkeley and International Computer Science Institute; Joseph Barnes, Taylor Judd, Joshua Mason, and Michael Bailey, University of Illinois at Urbana-Champaign; Serge Egelman, University of California, Berkeley and International Computer Science Institute
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data
Miranda Wei, University of Washington / University of Chicago; Madison Stamos and Sophie Veys, University of Chicago; Nathan Reitinger and Justin Goodman, University of Maryland; Margot Herman, University of Chicago; Dorota Filipczuk, University of Southampton; Ben Weinshel, University of Chicago; Michelle L. Mazurek, University of Maryland; Blase Ur, University of Chicago
The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment
"Alisa Frik, International Computer Science Institute / UC Berkeley; Amelia Haviland and Alessandro Acquisti, Heinz College, Carnegie Mellon University "
An Observational Investigation of Reverse Engineers’ Processes
Daniel Votipka and Seth Rabin, University of Maryland; Kristopher Micinski, Syracuse University; Jeffrey S. Foster, Tufts University; Michelle L. Mazurek, University of Maryland
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Cornell University; Rosanna Bellini, Open Lab, Newcastle University; Nora McDonald, University of Maryland, Baltimore County; Matan Danos, Weizmann Institute of Science; Rachel Greenstadt and Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists
Kasra Edalatnejad and Wouter Lueks, EPFL; Julien Pierre Martin, unaffiliated; Soline Ledésert, Anne L'Hôte, and Bruno Thomas, ICIJ; Laurent Girod and Carmela Troncoso, EPFL
I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp
"Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, and Brahmnoor Singh Chawla, Princeton University; Marshini Chetty, University of Chicago "
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security
"Charles Weir, Lancaster University; Ben Hermann, Paderborn University; Sascha Fahl, Leibniz University Hannover "
Multi-country Study of Third Party Trackers from Real Browser Histories
X. Hu, G. Suarez-Tangil, N. Sastry
X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies
D. Sempreboni, L. Vigano
"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information
A. Jenkins, P. Kalligeros, M. Wolters, K. Vaniea
User Attitudes On Direct-to-Consumer Genetic Testing
D. Saha, A. Chan, B. Stacy, K. Javkar, S. Patkar, M. Mazurek
A Cross-Platform Evaluation of User Online Privacy
Maryam Mehrnezhad (Newcastle University)
Data Sharing in Mobile Apps — User Privacy Expectations in Europe
Nils Quermann (Ruhr-Universitat Bochum), Martin Degeling (Ruhr-Universitat Bochum
GDPR Reality Check – Claiming and Investigating Personally Identifiable Data from Companies
Fatemeh Alizadeh (University of Siegen); Timo Jakobi (University of Siegen); Alexander Boden (Fraunhofer Institute for Applied Information Technology); Gunnar Stevens (University of Siegen); Jens Boldt (University of Siegen)
Analysis of Publicly Available Anti-Phishing Webpages: Contradicting Information, Lack of Concrete Advice and Very Narrow Attack Vector
Mattia Mossano (Karlsruhe Institute of Technology), Kami Vaniea (University of Edinburgh), Lukas Aldag (Karlsruhe Institute of Technology), Reyhan Duzgun (Karlsruhe Institute of Technology), Peter Mayer (Karlsruhe Institute of Technology), Melanie Volkamer (Karlsruhe Institute of Technology)
Investigating Teenagers' Ability to Detect Phishing Messages
James Nicholson (Northumbria University), Yousra Javed (National University of Sciences and Technology), Matt Dixon (Northumbria University), Lyne Coventry (Northumbria University), Opeyemi Dele Ajayi (Northumbria University), Philip Anderson (Northumbria University)
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan
Elham Al Qahtani (UNC Charlotte), Yousra Javed (National University of Sciences & Technology), Heather Lipford (UNC Charlotte), Mohamed Shehab (UNC Charlotte)
Vision: I Don't Want to Use My Phone! A Cognitive Walkthrough for YubiKeys
Claudia Bischoff (University of Bonn); Eva Gerlitz (FraunhoferKIE); Matthew Smith (University of Bonn /raunhoferKIE)
Vision: Investigating Web APIeveloper Experience in Relation to Terms of Service andrivacyolicies
Aidah Ichario (Heriot-Watt University), Manuel Maarek (Heriot-Watt University)
Vision: Shred If Insecure –ersuasive Messageesign as a Lesson and Alternative torevious Approaches to Usable Secure Email Interface
Jan Tolsdorf (TH Köln - University of Applied Sciences); Luigi Lo Iacono (Hochschule Bonn-Rhein-Sieg
Vision: What If They Allie? Crypto Requirementsor Keyeople
Chan Nam Ngo (University of Trento);anieleriolo (Sapienza University of Rome);abio Massacci (University of Trento);aniele Venturi (Sapienza University of Rome); Ettore Battaiola (Cassa Centrale Banca
Vision: Why Johnny Can't Configure Smart Home? A Behaviouralrameworkor Smart Homerivacy Configuratio
Joseph Shams (King's College London), Nalin A. G. Arachchilage (La Trobe University), Jose M. Such (King's College London)
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance
Magdalene Ng (Newcastle University), Kovila P.L. Coopamootoo (Newcastle University), Ehsan Toreini (Newcastle University), Mhairi Aitken (Newcastle University), Karen Elliot (Newcastle University), Aad van Moorsel (Newcastle University)
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries
Karoline Busse (University of Bonn), Mohammad Tahaei (University of Edinburgh), Katharina Krombholz (CISPA Helmholtz Center for Information Security), Emanuel von Zezschwitz (University of Bonn), Matthew Smith (University of Bonn/Fraunhofer FKIE), Jing Tian (Zhejiang University), Wenyuan Xu (Zhejiang University)
Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study
Wei Bai (University of Maryland), Michael Pearson (University of Maryland), Patrick Gage Kelley (Google), Michelle L. Mazurek (University of Maryland)
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
Verena Distler (University of Luxembourg); Carine Lallemand (University of Luxembourg / Eindhoven University of Technology); Vincent Koenig (University of Luxembourg)
End User and Expert Perceptions of Threats and Potential Countermeasures
Simon Anell (CISPA Helmholtz Center for Information Security), Lea Grober (CISPA Helmholtz Center for Information Security), Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Security Should Be There By Default: Investigating How Journalists Perceive and Respond to Risks From the Internet of Things
Anjuli R. K. Shere (University of Oxford); Jason R. C. Nurse (University of Kent); Ivan Flechais (University of Oxford)
Tech Pains: Characterizations of Lived Cybersecurity Experiences
Huixin Tian (Indiana University Bloomington), Chris Kanich (University of Illinois, Chicago), Jason Polakis (University of Illinois, Chicago), Sameer Patil (Indiana University Bloomington)
Measuring the Impact of the GDPR on Data Sharing in Ad Networks
Tobias Urban (Insitute for Internet Security; Westphalian University of Applied Sciences); Dennis Tatang, Martin Degeling, and Thorsten Holz (Ruhr University Bochum; Horst Görtz Institute for IT Security); Norbert Pohlmann (Insitute for Internet Security; Westphalian University of Applied Sciences)
"Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders "
"Shahryar Baki, Rakesh Verma, and Omprakash Gnawali (University of Houston "
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts
Tingmin Wu and Rongjunchen Zhang (Swinburne University of Technology; CSIRO's Data61); Wanlun Ma (University of Electronic Science and Technology of China); Sheng Wen (Swinburne University of Technology); Xin Xia (Monash University); Cecile Paris and Surya Nepal (CSIRO's Data61); Yang Xiang (Digital Research & Innovation Capability Platform, Swinburne University of Technology)
Be the Phisher - Understanding Users' Perception of Malicious Domains
Florian Quinkert (Ruhr University Bochum); Martin Degeling (Ruhr University Bochum; Horst Görtz Institute for IT Security); Jim Blythe (ISI, University of Southern California); Thorsten Holz (Ruhr-University Bochum)
運営について
お問い合わせ先
uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
USP論文読破会3
ユーザブルセキュリティ・プライバシー(USP)論文読破会3
更新日:2019年11月28日
ユーザブルセキュリティ・プライバシーの分野は世界的な発展を見せ、当該分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会が開始されました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。
第3回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2に続く開催です。
開催要項
日時:2019年11月29日(金)10:00~17:30(予定)
会場:化学会館 6F 大会議室601
〒101-8305 東京都千代田区神田駿河台1-5
交通アクセス
参加費
発表者
無料
研究会登録会員
2,000円
情報処理学会学生会員
1,000円
一般(非会員)
3,000円
懇親会
読破会終了後に懇親会を行います。
場所
時間
18:00-20:00
会費
4,500円
発表者募集(締め切りました)
本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。
発表申し込みは、定員に達し次第締め切ります。
論文はこの1年(2018年11月~2019年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。
参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文3」としてリストアップいたしました。ご参考ください。
発表ご希望の方は、次のアドレスに電子メールをお送りください。 uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )
申込の電子メールについて
メール件名:USP論文読破会3:発表申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文
担当論文の決定方法について
メール受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。
論文担当情報
Hana Habib, Carnegie Mellon University; Yixin Zou, University of Michigan; Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan : "An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites" , SOUPS2019
担当:金森祥子(NICT)
Cori Faklaris, Laura Dabbish, and Jason I. Hong, Carnegie Mellon University : A Self-Report Measure of End-User Security Attitudes (SA-6) , SOUPS2019
担当:畑島隆(NTTセキュアプラットフォーム研究所)
Noura Abdi, King's College London; Kopo M. Ramokapane, University of Bristol; Jose M. Such, King's College London : More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants , SOUPS2019
担当:谷口太郎(長崎県立大学)
Karoline Busse and Julia Schäfer, University of Bonn; Matthew Smith, University of Bonn/Fraunhofer FKIE : Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice , SOUPS2019
担当:村木暢哉(TIS株式会社)
Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne Porter Felt, Google : The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators , USENIX Security 2019
担当:奥田 哲矢(NTTセキュアプラットフォーム研究所)
Mariano Di Martino and Pieter Robyns, Hasselt University/tUL, Expertise Centre For Digital Media; Winnie Weyts, Hasselt University - Law Faculty; Peter Quax, Hasselt University/tUL, Expertise Centre For Digital Media, Flanders Make; Wim Lamotte, Hasselt University/tUL, Expertise Centre For Digital Media; Ken Andries, Hasselt University - Law Faculty, Attorney at the Brussels Bar : Personal Information Leakage by Abusing the GDPR 'Right of Access' , SOUPS2019
担当:森啓華(早稲田大学)
Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft) : Investigating System Operators’ Perspective on Security Misconfigurations , ACM CCS 2018
担当:尾崎敏司(筑波大学/トレンドマイクロ)
Artem Voronkov, Leonardo A. Martucci, and Stefan Lindskog, Karlstad University : System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces , SOUPS2019
担当:山岸伶(日立製作所)
Vincent Drury and Ulrike Meyer, Department of Computer Science, RWTH Aachen University : Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites , SOUPS2019
担当:藤田真浩(三菱電機)
Ana Caraban, Evangelos Karapanos, Daniel Gonçalves, and Pedro Campos : 23 Ways to Nudge: A Review of Technology-Mediated Nudging in Human-Computer Interaction , ACM CHI 2019
担当:篠田詩織(NTTセキュアプラットフォーム研究所)
Il-Youp Kwak, Jun Ho Huh, Seung Taek Han, Iljoo Kim, and Jiwon Yoon : Voice Presentation Attack Detection through Text-Converted Voice Command Analysis , ACM CHI 2019
担当:大木哲史(静岡大学)
Frank Li, University of California, Berkeley; Lisa Rogers, University of Maryland; Arunesh Mathur, Princeton University; Nathan Malkin, University of California, Berkeley; Marshini Chetty, Princeton University : Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines , SOUPS2019
担当:田中啓介(トレンドマイクロ)
Hala Assal and Sonia Chiasson : Think secure from the beginning': A Survey with Software Developers , ACM CHI 2019
担当:ももいやすなり(株式会社インターネットイニシアティブ)
Amber van der Heijden and Luca Allodi, Eindhoven University of Technology : Cognitive Triaging of Phishing Attacks , USENIX Security 201
担当:秋山満昭(NTTセキュアプラットフォーム研究所)
Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, and Matthew Smith : "If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers , ACM CHI 2019
担当:須賀祐治(株式会社インターネットイニシアティブ)
参加申込
件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
申込の電子メールについて
メール件名:USP論文読破会3:参加申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
参加者区別(研究会登録会員、情報処理学会学生会員、一般(非会員))
懇親会の出欠
お知らせ
目玉企画!
2019年6月に開催されたEuroUSECで、早稲田大 森啓華さん主著の論文が採録されました。
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika Mori (Waseda University); Takuya Watanabe (NTT Secure Platform Laboratories); Yunao Zhou (Waseda University); Ayako Akiyama Hasegawa (NTT Secure Platform Laboratories); Mitsuaki Akiyama (NTT Secure Platform Laboratories); Tatsuya Mori (Waseda University / RIKEN AIP / NICT)
USP論文読破会3では、森さんにお越しいただき、その発表内容に加え、採録までの道のりをお話いただく予定です。
その他
当日は論文は配布しませんので、各自でご準備ください。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円です。
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
参考:代表的な国際会議で発表されたUSP論文3
※USP論文読破会、USP読破会2で紹介された論文は除いています
Asking for a Friend: Evaluating Response Biases in Security User Studies
Elissa M. Redmiles (University of Maryland), Ziyun Zhu (University of Maryland), Sean Kross (University of California San Diego), Dhruv Kuchhal (Maharaja Agrasen Institute of Technology), Tudor Dumitras (University of Maryland), Michelle L. Mazurek (University of Maryland)
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses
Mauro Cherubini (UNIL – HEC Lausanne), Alexandre Meylan (UNIL – HEC Lausanne), Bertil Chapuis (UNIL – HEC Lausanne), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Igor Bilogrevic (Google Inc.), Kévin Huguenin (UNIL – HEC Lausanne)
Investigating System Operators’ Perspective on Security Misconfigurations
Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft)
Detecting User Experience Issues of the Tor Browser In The Wild
Kevin Gallagher (New York University), Sameer Patil (Indiana University Bloomington), Brendan Dolan-Gavitt (New York University), Damon McCoy (New York University), Nasir Memon (New York University)
Predicting Impending Exposure to Malicious Content from User Behavior
Mahmood Sharif (Carnegie Mellon University), Jumpei Urakawa (KDDI Research), Nicolas Christin (Carnegie Mellon University), Ayumu Kubota (KDDI Research), Akira Yamada (KDDI Research)
Reinforcing System-Assigned Passphrases Through Implicit Learning
Zeinab Joudaki (University of Ontario Institute of Technology), Julie Thorpe (University of Ontario Institute of Technology), Miguel Vargas Martin (University of Ontario Institute of Technology)
“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications
Maximilian Golla (Ruhr-University Bochum), Miranda Wei (University of Chicago), Juliette Hainline (University of Chicago), Lydia Filipe (University of Chicago), Markus Dürmuth (Ruhr-University Bochum), Elissa M. Redmiles (University of Maryland), Blase Ur (University of Chicago)
On the Accuracy of Password Strength Meters
Maximilian Golla (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum)
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li (University of California, Berkeley), Ting Wang (Lehigh University)
Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers
Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad Fareed Zaffar (LUMS Pakistan), Christo Wilson (Northeastern University)
Total Recall: Persistence of Passwords in Android
Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)
How to End Password Reuse on the Web
Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University), Brandon Ellis (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-Chi Feng (Portland State University)
Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change
Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
Jason Morris, Ingolf Becker, Simon Parkin (University College London)
Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors
Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)
Designing a Mobile App to Support Social Processes for Privacy and Security Decisions
Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)
A First Look at the Usability of OpenVAS Vulnerability Scanner
M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)
Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters
Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)
Stop to Unlock - Improving the Security of Android Unlock Patterns
Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Continuous Smartphone Authentication using Wristbands
Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)
Work in Progress: A Comparative Long-Term Study of Fallback Authentication
Philipp Markert, Maximilian Golla (Ruhr University Bochum); Elizabeth Stobert (National Research Council of Canada); Markus Dürmuth (Ruhr University Bochum)
Case Study – Exploring Children’s Password Knowledge and Practices
Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)
What Happens After Disclosing Stigmatized Experiences on Identified Social Media: Individual, Dyadic, and Social/Network Outcomes
Nazanin Andalibi
Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor
Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads
Peter Mayer, Nina Gerber, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, and Melanie Volkamer
Voice Presentation Attack Detection through Text-Converted Voice Command Analysis
Il-Youp Kwak, Jun Ho Huh, Seung Taek Han, Iljoo Kim, and Jiwon Yoon
An Exploration of Bitcoin Mining Practices: Miners' Trust Challenges and Motivations
Irni Eliana Khairuddin and Corina Sas
Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men
Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, and Ann Blandford
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI
Jacob Abbott, Haley MacLeod, Novia Nurain, Gustave Ekobe, and Sameer Patil
Emotion and Experience in Negotiating HIV-Related Digital Resources: "It's not just a runny nose!"
Aneesha Singh, Jo Gibbs, and Ann Blandford
"This Girl is on Fire": Sensemaking in an Online Health Community for Vulvodynia
Alyson L. Young and Andrew D. Miller
Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment
Helena M. Mentis, Galina Madjaroff, and Aaron K. Massey
Automation Accuracy Is Good, but High Controllability May Be Better
Quentin Roy, Futian Zhang, and Daniel Vogel
AI-Mediated Communication: How the Perception that Profile Text was Written by AI Affects Trustworthiness
Maurice Jakesch, Megan French, Xiao Ma, Jeffrey T. Hancock, and Mor Naaman
Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information
S. Shyam Sundar and Jinyoung Kim
Understanding Trust, Transportation, and Accessibility through Ridesharing
Robin N. Brewer and Vaishnav Kameswaran
23 Ways to Nudge: A Review of Technology-Mediated Nudging in Human-Computer Interaction
Ana Caraban, Evangelos Karapanos, Daniel Gonçalves, and Pedro Campos
REsCUE: A framework for REal-time feedback on behavioral CUEs using multimodal anomaly detection
Riku Arakawa and Hiromu Yakura
Towards an Effective Digital Literacy Intervention to Assist Returning Citizens with Job Search
Ihudiya Finda Ogbonnaya-Ogburu, Kentaro Toyama, and Tawanna R. Dillahunt
Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy
Manya Sleeper, Tara Matthews, Kathleen O'Leary, Anna Turner, Jill Palzkill Woelfer, Martin Shelton, Andrew Oplinger, Andreas Schou, and Sunny Consolvo
What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game
Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, and Erik Andersen
How Do Humans Assess the Credibility on Web Blogs: Qualifying and Verifying Human Factors with Machine Learning
Yonggeol Jo, Minwoo Kim, and Kyungsik Han
"Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
Syed Ishtiaque Ahmed, Md. Romael Haque, Irtaza Haider, Jay Chen, and Nicola Dell
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats
Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, and Nicolas Christin
"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults
James Nicholson, Lynne Coventry, and Pamela Briggs
Security - Visible, Yet Unseen?
Verena Distler, Marie-Laure Zollinger, Carine Lallemand, Peter B. Roenne, Peter Y. A. Ryan, and Vincent Koenig
You `Might' Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications
Yixin Zou, Shawn Danino, Kaiwen Sun, and Florian Schaub
`I make up a silly name': Understanding Children's Perception of Privacy Risks Online
Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, and Nigel Shadbolt
Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online
Karla Badillo-Urquiola, Xinru Page, and Pamela J. Wisniewski
Laughing is Scary, but Farting is Cute: A Conceptual Model of Children's Perspectives of Creepy Technologies
Jason C. Yip, Kiley Sobel, Xin Gao, Allison Marie Hishikawa, Alexis Lim, Laura Meng, Romaine Flor Ofiana, Justin Park, and Alexis Hiniker
Think secure from the beginning': A Survey with Software Developers
Hala Assal and Sonia Chiasson
"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers
Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, and Matthew Smith
Security Managers Are Not The Enemy Either
Lena Reinfelder, Robert Landwirth, and Zinaida Benenson
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers
Nora McDonald, Benjamin Mako Hill, Rachel Greenstadt, and Andrea Forte
Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings
Justin Petelka, Yixin Zou, and Florian Schaub
Let Me Explain: Impact of Personal and Impersonal Explanations on Trust in Recommender Systems
Johannes Kunkel, Tim Donkers, Lisa Michael, Catalin-Mihai Barbu, and Jürgen Ziegler
Towards Understanding the Link Between Age and Smartphone Authentication
Lina Qiu, Alexander De Luca, Ildar Muslukhov, and Konstantin Beznosov
Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones
Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, and Konstantin Beznosov
Passquerade: Improving Error Correction of Text Passwords on Mobile Devices by using Graphic Filters for Password Masking
Mohamed Khamis, Tobias Seitz, Leonhard Mertl, Alice Nguyen, Mario Schneller, and Zhe Li
"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption
Flynn Wolf, Ravi Kuber, and Adam J. Aviv
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility
Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, and Micah Sherr
Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms
Rakibul Hasan, Yifang Li, Eman Hassan, Kelly Caine, David J. Crandall, Roberto Hoyle, and Apu Kapadia
I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging
Elham Vaziripour, Devon Howard, Jake Tyler, Mark O'Neill, Justin Wu, Kent Seamons, and Daniel Zappala
Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content
Abu Saleh Md Noman, Sanchari Das, and Sameer Patil
A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions
Alisa Frik, Nathan Malkin, Marian Harbach, Eyal Peer, and Serge Egelman
Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI
Richmond Y. Wong and Deirdre K. Mulligan
Privacy, Power, and Invisible Labor on Amazon Mechanical Turk
Shruti Sannon and Dan Cosley
On the Usability of HTTPS Deployment
Matthew Bernhard, Jonathan Sharman, Claudia Ziegler Acemyan, Philip Kortum, Dan S. Wallach, and J. Alex Halderman
Hey Google, Can I Ask You Something in Private?
Eugene Cho
Privacy and Security Considerations For Digital Technology Use in Elementary Schools
Priya C. Kumar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak
Why Johnny Fails to Protect his Privacy
Nina Gerber (Karlsruhe Institute of Technology); Verena Zimmermann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)
"Don't punish all of us": Measuring User Attitudes about Two-Factor Authentication
Jonathan Dutson, Danny Allen, Dennis Eggett, and Kent Seamons (Brigham Young University)
A Survey on Developer-Centred Security
Mohammad Tahaei and Kami Vaniea (University of Edinburgh)
How Could Serious Games Support Secure Programming? Designing a Study Replication and Intervention
Manuel Maarek and Léon McGregor (Heriot-Watt University); Sandy Louchart and Ross McMenemy (Glasgow School of Art)
Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users
Verena Zimmermann, Ernestine Dickhaut, Paul Gerber, and Joachim Vogt (Technische Universität Darmstadt)
Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home
Sarah Prange (Bundeswehr University); Emanuel von Zezschwitz (University of Bonn); Florian Alt (Bundeswehr University)
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika Mori (Waseda University); Takuya Watanabe (NTT Secure Platform Laboratories); Yunao Zhou (Waseda University); Ayako Akiyama Hasegawa (NTT Secure Platform Laboratories); Mitsuaki Akiyama (NTT Secure Platform Laboratories); Tatsuya Mori (Waseda University / RIKEN AIP / NICT)
Detecting Misalignments Between System Security and User Perceptions: A Preliminary Socio-Technical Analysis of an E2E Email Encryption System
Borce Stojkovski, Itzel Vazquez Sandoval, and Gabriele Lenzini (University of Luxembourg)
A Review of Human- and Computer-Facing URL Phishing Features
Kholoud Althobaiti (University of Edinburgh / Taif University); Ghaidaa Rummani (Hood College); Kami Vaniea (University of Edinburgh)
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Albesë Demjaha, Tristan Caulfield, M. Angela Sasse, and David Pym (University College London)
Reasoning Analytically About Password-Cracking Software
Alex Liu (University of Chicago), Amanda Nakanishi (University of Chicago), Maximilian Golla (Ruhr-University Bochum), David Cash (University of Chicago), Blase Ur (University of Chicago)
Beyond Credential Stuffing: Password Similarity Models using Neural Networks
Bijeeta Pal (Cornell University), Tal Daniel (Technion), Rahul Chatterjee (Cornell University), Thomas Ristenpart (Cornell Tech)
"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
Elissa M. Redmiles (University of Maryland)
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples
Elissa M. Redmiles (University of Maryland), Sean Kross (University of California San Diego), Michelle L. Mazurek (University of Maryland)
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
Nan Zhang (Indiana University, Bloomington), Xianghang Mi (Indiana University, Bloomington), Xuan Feng (Indiana University, Bloomington; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China), XiaoFeng Wang (Indiana University, Bloomington), Yuan Tian (University of Virginia), Feng Qian (Indiana University, Bloomington)
Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies
Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, and Yang Wang, Syracuse University
Privacy and Security Threat Models and Mitigation Strategies of Older Adults
Alisa Frik, International Computer Science Institute (ICSI) and University of California, Berkeley; Leysan Nurgalieva, University of Trento; Julia Bernd, International Computer Science Institute (ICSI); Joyce Lee, University of California, Berkeley; Florian Schaub, University of Michigan; Serge Egelman, International Computer Science Institute (ICSI) and University of California, Berkeley
Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects
Oshrat Ayalon and Eran Toch, Tel Aviv University
A Self-Report Measure of End-User Security Attitudes (SA-6)
Cori Faklaris, Laura Dabbish, and Jason I. Hong, Carnegie Mellon University
The Effect of Entertainment Media on Mental Models of Computer Security
Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Richard Roberts, Yasmin Abdi, and Michelle L. Mazurek, University of Maryland
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors
Sauvik Das, Georgia Institute of Technology; Laura A. Dabbish and Jason I. Hong, Carnegie Mellon University
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice
Karoline Busse and Julia Schäfer, University of Bonn; Matthew Smith, University of Bonn/Fraunhofer FKIE
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal
Justin Wu, Cyrus Gattrell, Devon Howard, and Jake Tyler, Brigham Young University; Elham Vaziripour, Utah Valley University; Kent Seamons and Daniel Zappala, Brigham Young University
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware
Camelia Simoiu, Stanford University; Christopher Gates, Symantec; Joseph Bonneau, New York University; Sharad Goel, Stanford University
Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage
Hye-Chung Kum, Population Informatics Lab, Texas A&M University; Eric D. Ragan, INDIE Lab, University of Florida; Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, and Cason Schmit, Population Informatics Lab, Texas A&M University
From Usability to Secure Computing and Back Again
Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, and Ira Globus-Harris, Boston University; Shannon Roberts, University of Massachusetts Amherst; Mayank Varia, Boston University
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites
Vincent Drury and Ulrike Meyer, Department of Computer Science, RWTH Aachen University
"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks
Abraham H. Mhaidli, Yixin Zou, and Florian Schaub, University of Michigan School of Information
Usability Smells: An Analysis of Developers’ Struggle With Crypto Libraries
Nikhil Patnaik, Joseph Hallett, and Awais Rashid, University of Bristol
System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces
Artem Voronkov, Leonardo A. Martucci, and Stefan Lindskog, Karlstad University
Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines
Frank Li, University of California, Berkeley; Lisa Rogers, University of Maryland; Arunesh Mathur, Princeton University; Nathan Malkin, University of California, Berkeley; Marshini Chetty, Princeton University
Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices
Lukas Mecke, University of Applied Sciences Munich, Munich, Germany and LMU Munich, Munich, Germany; Sarah Delgado Rodriguez and Daniel Buschek, LMU Munich, Munich, Germany; Sarah Prange, University of Applied Sciences Munich, Munich, Germany and Bundeswehr University Munich, Munich, Germany and LMU Munich, Munich, Germany; Florian Alt, Bundeswehr University Munich, Munich, Germany
Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices
Lukas Mecke, University of Applied Sciences Munich, Munich, Germany and LMU Munich, Munich, Germany; Daniel Buschek and Mathias Kiermeier, LMU Munich, Munich, Germany; Sarah Prange, University of Applied Sciences Munich, Munich, Germany and Bundeswehr University Munich, Munich, Germany and LMU Munich, Munich, Germany; Florian Alt, Bundeswehr University Munich, Munich, Germany
Why people (don’t) use password managers effectively
Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling
Stéphane Ciolino, OneSpan Innovation Centre & University College London; Simon Parkin, University College London; Paul Dunphy, OneSpan Innovation Centre
A Usability Study of Five Two-Factor Authentication Methods
Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons, Brigham Young University
Personal Information Leakage by Abusing the GDPR 'Right of Access'
Mariano Di Martino and Pieter Robyns, Hasselt University/tUL, Expertise Centre For Digital Media; Winnie Weyts, Hasselt University - Law Faculty; Peter Quax, Hasselt University/tUL, Expertise Centre For Digital Media, Flanders Make; Wim Lamotte, Hasselt University/tUL, Expertise Centre For Digital Media; Ken Andries, Hasselt University - Law Faculty, Attorney at the Brussels Bar
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites
Hana Habib, Carnegie Mellon University; Yixin Zou, University of Michigan; Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings
Anthony Vance, Temple University; David Eargle, University of Colorado Boulder; Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson, Brigham Young University
“There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness Data
Abdulmajeed Alqhatani and Heather Richter Lipford, University of North Carolina at Charlotte
"I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks
Madiha Tabassum, University of North Carolina at Charlotte; Tomasz Kosinski, Chalmers University of Technology; Heather Lipford, University of North Carolina at Charlotte
More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants
Noura Abdi, King's College London; Kopo M. Ramokapane, University of Bristol; Jose M. Such, King's College London
Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors
Christine Chen, University of Washington; Nicola Dell, Cornell Tech; Franziska Roesner, University of Washington
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, and Rahul Chatterjee, Cornell Tech; Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech
Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA
Noah Apthorpe, Sarah Varghese, and Nick Feamster, Princeton University
Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study
Eric Zeng and Franziska Roesner, University of Washington
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
Felix Fischer, Technical University of Munich; Huang Xiao, Bosch Center for Artificial Intelligence; Ching-Yu Kao, Fraunhofer AISEC; Yannick Stachelscheid, Benjamin Johnson, and Danial Raza, Technical University of Munich; Paul Fawkesley and Nat Buckley, Projects by IF; Konstantin Böttinger, Fraunhofer AISEC; Paul Muntean and Jens Grossklags, Technical University of Munich
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
Benjamin Andow and Samin Yaseer Mahmud, North Carolina State University; Wenyu Wang, University of Illinois at Urbana-Champaign; Justin Whitaker, William Enck, and Bradley Reaves, North Carolina State University; Kapil Singh, IBM T.J. Watson Research Center; Tao Xie, University of Illinois at Urbana-Champaign
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
Ying Dong, University of Chinese Academy of Sciences and The Pennsylvania State University; Wenbo Guo, Yueqi Chen, and Xinyu Xing, The Pennsylvania State University and JD Security Research Center; Yuqing Zhang, University of Chinese Academy of Sciences; Gang Wang, Virginia Tech
Detecting and Characterizing Lateral Phishing at Scale
Grant Ho, UC Berkeley and Barracuda Networks; Asaf Cidon, Barracuda Networks and Columbia University; Lior Gavish and Marco Schweighauser, Barracuda Networks; Vern Paxson, UC Berkeley and ICSI; Stefan Savage and Geoffrey M. Voelker, UC San Diego; David Wagner, UC Berkeley
Users Really Do Answer Telephone Scams
Huahong Tu, University of Maryland; Adam Doupé, Arizona State University; Ziming Zhao, Rochester Institute of Technology; Gail-Joon Ahn, Arizona State University and Samsung Research
Cognitive Triaging of Phishing Attacks
Amber van der Heijden and Luca Allodi, Eindhoven University of Technology
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users
Ding Wang and Ping Wang, Peking University; Debiao He, Wuhan University; Yuan Tian, University of Virginia
Protecting accounts from credential stuffing with password breach alerting
Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, and Sarvar Patel, Google; Dan Boneh, Stanford; Elie Bursztein, Google
The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators
Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne Porter Felt, Google
運営について
お問い合わせ先
uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
USP論文読破会2
ユーザブルセキュリティ・プライバシー(USP)論文読破会2
更新日:2019年5月8日
これまで、セキュリティ心理学とトラスト(SPT)研究会では、プライバシーとセキュリティのユーザビリティについての国際会議Symposium on Usable Privacy and Security (SOUPS)で発表された論文の発表内容把握のためのイベントとしてSOUPS論文読破会を2011年より開催してきました。 ユーザブルセキュリティ・プライバシーの分野はSOUPSを中心に世界的な発展を見せ、SOUPSへの投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 そこで、本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会を開催することといたしました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。
第2回目となる今回は、5月9-10日に開催される情報処理学会GN研究会・SPT研究会と電子情報通信学会LOIS研究会の合同研究会における企画セッションとして実施します。
開催要項
日時:2019年5月10日(金)14:30~17:30
※5月9-10日に開催される 第108回グループウェアとネットワークサービス(GN)・第33回セキュリティト心理学とトラスト(SPT)合同研究発表会、 ライフインテリジェンスとオフィス情報システム(LOIS)研究会における企画セッションとして実施します。
会場:東京農工大学小金井キャンパス
〒184-8588 東京都小金井市中町2-24-16
交通アクセス
参加費
参加費はそれぞれの研究会の参加費に準じます。以下はSPT研究会の当日参加費です。
研究会登録会員
無料
情報処理学会 正会員
1,500円
情報処理学会 学生会員
500円
一般(非会員)
2,500円
学生(非会員)
1,000円
発表者募集(締め切りました)
本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。
発表申し込みは、定員に達し次第締め切ります。
論文はこの1年(2018年5月~2019年5月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。
参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文2」としてリストアップいたしました。ご参考ください。
発表ご希望の方は、次のアドレスに電子メールをお送りください。 uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )
申込の電子メールについて
メール件名:USP論文読破会2:発表申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文
担当論文の決定方法について
メール受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。
論文担当情報
Oksana Kulyk, Paul Gerber, Karola Marky, Christopher Beckmann, Melanie Volkamer: Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users , USEC 2019
担当:大石雄大(電通大)
Karoline Busse, Dominik Wermke, Sabrina Amft, Sascha Fahl, Emanuel von Zezschwitz, Matthew Smith:Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, USEC 2019
担当:長谷川彩子(NTT)
Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, Kent Seamons:A Tale of Two Studies: The Best and Worst of YubiKey Usability, S&P 2018
担当:森啓華(早稲田大)
Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, Emanuel von Zezschwitz:If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS, S&P 2019
担当:尾崎敏司(筑波大/トレンドマイクロ)
Christina Katsini, Christos Fidas, George Raptis, Marios Belk, George Samaras, Nikolaos Avouris:Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition, CHI 2018
担当:吉田光宏(電通大)
Brenna McNally, Priya Kumar, Chelsea Hordatt, Matthew Louis Mauriello, Shalmali Naik, Leyla Norooz, Alazandra Shorter, Evan Golub, Allison Druin:Co-designing Mobile Online Safety Applications with Children, CHI 2018
担当:大塚亜未(津田塾大)
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy, NDSS 2019
担当:坂本一仁(セコム)
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric ,J. Alex Halderman, Michael Bailey:Tracking Certificate Misissuance in the Wild, S&P 2018
担当:須賀祐治(IIJ)
参加申込
事前の参加申込は不要です。
お知らせ
その他
当日は論文は配布しませんので、各自でご準備ください。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円です。
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
参考:代表的な国際会議で発表されたUSP論文
※USP論文読破会で紹介された論文は除いています
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants
Tamy Guberek (University of Michigan), Allison McDonald (University of Michigan), Sylvia Simoni (University of Michigan), Abraham H. Mhaidli (University of Michigan), Kentaro Toyama (University of Michigan), Florian Schaub (University of Michigan)
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization
Claire Dolin (University of Chicago), Ben Weinshel (University of Chicago), Shawn Shan (University of Chicago), Chang Min Hahn (University of Chicago), Euirim Choi (University of Chicago), Michelle L. Mazurek (University of Maryland), Blase Ur (University of Chicago)
An Experimental Study of Cryptocurrency Market Dynamics
Peter M Krafft (MIT), Nicolas Della Penna (Australian National University), Alex Pentland (Massachusetts Institute of Technology)
Making Sense of Blockchain Applications: A Typology for HCI
Chris Elsden (Northumbria University), Arthi Manohar (Northumbria University), Jo Briggs (Northumbria University), Mike Harding (Lancaster University), Chris Speed (University of Edinburgh), John Vines (Northumbria University)
Breaking! A Typology of Security and Privacy News and How It’s Shared
Sauvik Das (Georgia Institute of Technology), Joanne Lo (Carnegie Mellon University), Laura Dabbish (Carnegie Mellon University), Jason Hong (Carnegie Mellon University)
“We Are the Product”: Public Reactions to Online Data Sharing and Privacy Controversies in the Media
Casey Fiesler (University of Colorado), Blake Hallinan (University of Colorado Boulder)
Not Even Past: Information Aging and Temporal Privacy in Online Social Networks
Oshrat Ayalon (Tel Aviv University), Eran Toch (Tel Aviv University)
The Use of Private Mobile Phones at War: Accounts From the Donbas Conflict
Irina Shklovski (IT University of Copenhagen; University of Siegen), Volker Wulf (University of Siegen)
Co-designing Mobile Online Safety Applications with Children
Brenna McNally (University of Maryland), Priya Kumar (University of Maryland), Chelsea Hordatt (University of Maryland), Matthew Louis Mauriello (University of Maryland; University of Maryland), Shalmali Naik (University of Maryland), Leyla Norooz (University of Maryland), Alazandra Shorter (University of Maryland), Evan Golub (University of Maryland; University of Maryland), Allison Druin (University of Maryland)
Contextualizing Privacy Decisions for Better Prediction (and Protection)
Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Irwin Reyes (International Computer Science Institute), Lynn Tsai (University of California (Berkeley), Jung-Wei Chen (Good Research (Inc), Nathan Good (Good Research (Inc.), David Wagner (Berkeley), Konstantin Beznosov (University of British Columbia), Serge Egelman (Berkeley; International Computer Science Institute)
“This App Would Like to Use Your Current Location to Better Serve You”: Importance of User Assent and System Transparency in Personalized Mobile Services
Tsai-Wei Chen (United Health), S. Shyam Sundar (The Pennsylvania State University)
Improving User Confidence in Concept Maps: Exploring Data Driven Explanations
Pierre Le Bras (Heriot-Watt University), David A. Robb (Heriot-Watt University), Thomas S Methven (Heriot-Watt University), Stefano Padilla (Heriot-Watt University), Mike J Chantler (Heriot-Watt University)
Balancing Privacy and Information Disclosure in Interactive Record Linkage with Visual Masking
Eric D Ragan (Texas A&M University), Hye-Chung Kum (Texas A&M University), Gurudev Ilangovan (Texas A&M University), Han Wang (Texas A&M University)
Increasing User Attention with a Comic-based Policy
Madiha Tabassum (University of North Carolina at Charlotte), Abdulmajeed Alqhatani (University of North Carolina at Charlotte), Marran Aldossari (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
Who Provides Phishing Training? Facts, Stories, and People Like Me
Rick Wash (Michigan State University), Molly M Cooper (Michigan State University; Nova Southeastern University)
X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps
Max G. Van Kleek (University of Oxford), Reuben Binns (University of Oxford), Jun Zhao (University of Oxford), Adam Slack (University of Oxford), Sauyon Lee (University of Oxford), Dean Ottewell (University of Oxford), Nigel Shadbolt (University of Oxford)
Evolving the Ecosystem of Personal Behavioral Data
Jason Wiese (University of Utah), Sauvik Das (Georgia Institute of Technology), Jason Hong (Carnegie Mellon University), John Zimmerman (Carnegie Mellon University)
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes
Ameya Hanamsagar (USC), Simon S Woo (SUNY Korea), Chris Kanich (University of Illinois), Jelena Mirkovic (USC/ISI)
Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition
Christina Katsini (University of Patras), Christos Fidas (University of Patras), George Raptis (University of Patras), Marios Belk (Cognitive UX GmbH; University of Cyprus), George Samaras (University of Cyprus), Nikolaos Avouris (University of Patras)
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing
Hassan Khan (University of Waterloo), Urs Hengartner (University of Waterloo), Daniel Vogel (University of Waterloo)
Security During Application Development: an Application Security Expert Perspective
Tyler W. Thomas (University of North Carolina at Charlotte), Madiha Tabassum (University of North Carolina at Charlotte), Bill Chu (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes
Karola Marky (Technische Universität Darmstadt), Oksana Kulyk (Technische Universität Darmstadt), Karen Renaud (Abertay University; University of South Africa), Melanie Volkamer (Karlsruhe Institute of Technology; Technische Universität Darmstadt)
User Perception and Expectations on Deleting Instant Messages —or— "What Happens If I Press This Button?"
Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer
A Usability Study of Secure Email Deletion
Tyler Monson, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, Kent Seamons
Consolidating Principles and Patterns for Human-centred Usable Security Research and Development
Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren
The Role of Privacy Violations in Privacy Calculu
Maija Poikela, Sebastian Möller
What Can't Data Be Used For? User Privacy Expectations about Smart TVs
Nathan Malkin, Julia Bernd, Maritza Johnson, Serge Egelman
Permission Impossible: Teaching Firewall Configuration in a Game Environment
Sibylle Sehl, Kami Vaniea
The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores
Frederic Raber, David Ziemann, Antonio Krueger
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
Yimin Chen (Arizona State University),Tao Li (Arizona State University),Rui Zhang (University of Delaware),Yanchao Zhang (Arizona State University),Terri Hedgpeth (Arizona State University)
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
Daniel Votipka (University of Maryland),Rock Stevens (University of Maryland),Elissa Redmiles (University of Maryland),Jeremy Hu (University of Maryland),Michelle Mazurek (University of Maryland)
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users
Kiron Lebeck (University of Washington),Kimberly Ruth (University of Washington),Tadayoshi Kohno (University of Washington),Franziska Roesner (University of Washington)
Computer Security and Privacy for Refugees in the United States
Lucy Simko (University of Washington),Ada Lerner (Wellesley College),Samia Ibtasam (University of Washington),Franziska Roesner (University of Washington),Tadayoshi Kohno (University of Washington)
On Enforcing the Digital Immunity of a Large Humanitarian Organization
Stevens Le Blond (École Polytechnique Fédérale de Lausanne),Alejandro Cuevas (École Polytechnique Fédérale de Lausanne),Juan Ramón Troncoso-Pastoriza (École Polytechnique Fédérale de Lausanne),Philipp Jovanovic (École Polytechnique Fédérale de Lausanne),Bryan Ford (École Polytechnique Fédérale de Lausanne),Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
Marten Oltrogge (CISPA, Saarland University),Erik Derr (CISPA, Saarland University),Christian Stransky (CISPA, Saarland University),Yasemin Acar (Leibniz University Hannover),Sascha Fahl (Leibniz University Hannover),Christian Rossow (CISPA, Saarland University),Giancarlo Pellegrino (CISPA, Saarland University, Stanford University),Sven Bugiel (CISPA, Saarland University),Michael Backes (CISPA, Saarland University)
Tracking Certificate Misissuance in the Wild
Deepak Kumar (University of Illinois, Urbana-Champaign),Zhengping Wang (University of Illinois, Urbana-Champaign),Matthew Hyder (University of Illinois, Urbana-Champaign),Joseph Dickinson (University of Illinois, Urbana-Champaign),Gabrielle Beck (University of Michigan),David Adrian (University of Michigan),Joshua Mason (University of Illinois, Urbana-Champaign),Zakir Durumeric (University of Michigan),J. Alex Halderman (University of Michigan),Michael Bailey (University of Illinois, Urbana-Champaign)
On the Economics of Offline Password Cracking
Jeremiah Blocki (Purdue University),Benjamin Harsha (Purdue University),Samson Zhou (Purdue University)
A Tale of Two Studies: The Best and Worst of YubiKey Usability
Joshua Reynolds (University of Illinois at Urbana-Champaign), Trevor Smith (Brigham Young University), Ken Reese (Brigham Young University), Luke Dickinson (Brigham Young University), Scott Ruoti (MIT Lincoln Laboratory), Kent Seamons (Brigham Young University)
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
Melanie Volkamer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt; Andreas Gutmann, OneSpan Innovation Centre and University College London; Karen Renaud, Abertay University, University of South Africa, and University of Glasgow; Paul Gerber, Technische Universität Darmstadt; Peter Mayer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt
User Behaviors and Attitudes Under Password Expiration Policies
Hana Habib and Pardis Emami Naeini, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians
Elham Al Qahtani and Mohamed Shehab, University of North Carolina Charlotte; Abrar Aljohani
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal
Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala, Brigham Young University
Informal Support Networks: an investigation into Home Data Security Practices
Norbert Nthala and Ivan Flechais, University of Oxford
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships
Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong, Carnegie Mellon University
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking
Arunesh Mathur, Princeton University; Jessica Vitak, University of Maryland, College Park; Arvind Narayanan and Marshini Chetty, Princeton University
Can Digital Face-Morphs Influence Attitudes and Online Behaviors?
Eyal Peer, Bar-Ilan University; Sonam Samat and Alessandro Acquisti, Carnegie Mellon University
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su, Indiana University Bloomington
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach
Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub, School of Information, University of Michigan
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu, Google
User Comfort with Android Background Resource Accesses in Different Contexts
Daniel Votipka and Seth M. Rabin, University of Maryland; Kristopher Micinski, Haverford College; Thomas Gilray, Michelle L. Mazurek, and Jeffrey S. Foster, University of Maryland
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
Orçun Çetin, Lisette Altena, Carlos Gañán, and Michel van Eeten, Delft University of Technology
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse
Peter Leo Gorski and Luigi Lo Iacono, Cologne University of Applied Sciences; Dominik Wermke and Christian Stransky, Leibniz University Hannover; Sebastian Möller, Technical University Berlin; Yasemin Acar, Leibniz University Hannover; Sascha Fahl, Ruhr-University Bochum
Security in the Software Development Lifecycle
Hala Assal and Sonia Chiasson, Carleton University
Deception Task Design in Developer Password Studies: Exploring a Student Sample
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith, University of Bonn, Germany
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration
Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De Luca, Google
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Norman Hänsch, Friedrich-Alexander-Universität Erlangen-Nürnberg; Andrea Schankin, Karlsruhe Institute of Technology; Mykolai Protsenko, Fraunhofer Institute for Applied and Integrated Security; Felix Freiling and Zinaida Benenson, Friedrich-Alexander-Universität Erlangen-Nürnberg
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products
Julie M. Haney and Mary F. Theofanos, National Institute of Standards and Technology; Yasemin Acar, Leibniz University Hannover; Sandra Spickard Prettyman, Culture Catalyst
A Comparative Usability Study of Key Management in Secure Email
Scott Ruoti, University of Tennessee; Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons, Brigham Young University
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection
James Nicholson, Lynne Coventry, and Pam Briggs, PaCT Lab, Northumbria University
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality
Devon Adams, Alseny Bah, and Catherine Barwulor, University of Maryland Baltimore County; Nureli Musaby, James Madison University; Kadeem Pitkin, College of Westchester; Elissa M. Redmiles, University of Maryland
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
Sanam Ghorbani Lyastani, CISPA, Saarland University; Michael Schilling, Saarland University; Sascha Fahl, Ruhr-University Bochum; Michael Backes and Sven Bugiel, CISPA Helmholtz Center i.G.
Forgetting of Passwords: Ecological Theory and Data
Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, and Janne Lindqvist, Rutgers University; Antti Oulasvirta, Aalto University
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
Ingolf Becker, Simon Parkin, and M. Angela Sasse, University College London
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
Weijia He, University of Chicago; Maximilian Golla, Ruhr-University Bochum; Roshni Padhi and Jordan Ofek, University of Chicago; Markus Dürmuth, Ruhr-University Bochum; Earlence Fernandes, University of Washington; Blase Ur, University of Chicago
How Do Tor Users Interact With Onion Services?
Philipp Winter, Anne Edmundson, and Laura M. Roberts, Princeton University; Agnieszka Dutkowska-Żuk, Independent; Marshini Chetty and Nick Feamster, Princeton University
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
Rock Stevens, Daniel Votipka, and Elissa M. Redmiles, University of Maryland; Colin Ahern, NYC Cyber Command; Patrick Sweeney, Wake Forest University; Michelle L. Mazurek, University of Maryland
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild
Chaowei Xiao and Armin Sarabi, University of Michigan; Yang Liu, Harvard University / UC Santa Cruz; Bo Li, UIUC; Mingyan Liu, University of Michigan; Tudor Dumitras, University of Maryland, College Park
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Nanjing University; Alejandro Cuevas, The Pennsylvania State University; Limin Yang and Hang Hu, Virginia Tech; Xinyu Xing, The Pennsylvania State University; Bing Mao, Nanjing University; Gang Wang, Virginia Tech
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
Rolf van Wegberg and Samaneh Tajalizadehkhoob, Delft University of Technology; Kyle Soska, Carnegie Mellon University; Ugur Akyazi, Carlos Hernandez Ganan, and Bram Klievink, Delft University of Technology; Nicolas Christin, Carnegie Mellon University; Michel van Eeten, Delft University of Technology
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces
Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington
Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
Mohammad Rezaeirad, George Mason University; Brown Farinholt, University of California, San Diego; Hitesh Dharmdasani, Informant Networks; Paul Pearce, University of California, Berkeley; Kirill Levchenko, University of California, San Diego; Damon McCoy, New York University
The aftermath of a crypto-ransomware attack at a large academic institution
Leah Zhang-Kennedy, University of Waterloo, Stratford Campus; Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson, Carleton University
Asking for a Friend: Evaluating Response Biases in Security User Studies
Elissa M. Redmiles (University of Maryland), Ziyun Zhu (University of Maryland), Sean Kross (University of California San Diego), Dhruv Kuchhal (Maharaja Agrasen Institute of Technology), Tudor Dumitras (University of Maryland), Michelle L. Mazurek (University of Maryland)
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses
Mauro Cherubini (UNIL – HEC Lausanne), Alexandre Meylan (UNIL – HEC Lausanne), Bertil Chapuis (UNIL – HEC Lausanne), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Igor Bilogrevic (Google Inc.), Kévin Huguenin (UNIL – HEC Lausanne)
Investigating System Operators’ Perspective on Security Misconfigurations
Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft)
Detecting User Experience Issues of the Tor Browser In The Wild
Kevin Gallagher (New York University), Sameer Patil (Indiana University Bloomington), Brendan Dolan-Gavitt (New York University), Damon McCoy (New York University), Nasir Memon (New York University)
Predicting Impending Exposure to Malicious Content from User Behavior
Mahmood Sharif (Carnegie Mellon University), Jumpei Urakawa (KDDI Research), Nicolas Christin (Carnegie Mellon University), Ayumu Kubota (KDDI Research), Akira Yamada (KDDI Research)
Reinforcing System-Assigned Passphrases Through Implicit Learning
Zeinab Joudaki (University of Ontario Institute of Technology), Julie Thorpe (University of Ontario Institute of Technology), Miguel Vargas Martin (University of Ontario Institute of Technology)
“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications
Maximilian Golla (Ruhr-University Bochum), Miranda Wei (University of Chicago), Juliette Hainline (University of Chicago), Lydia Filipe (University of Chicago), Markus Dürmuth (Ruhr-University Bochum), Elissa M. Redmiles (University of Maryland), Blase Ur (University of Chicago)
On the Accuracy of Password Strength Meters
Maximilian Golla (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum)
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li (University of California, Berkeley), Ting Wang (Lehigh University)
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy
Martin Degeling (Ruhr-Universität Bochum), Christine Utz (Ruhr-Universität Bochum), Christopher Lentzsch (Ruhr-Universität Bochum), Henry Hosseini (Ruhr-Universität Bochum), Florian Schaub (University of Michigan), Thorsten Holz (Ruhr-Universität Bochum)
Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers
Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad Fareed Zaffar (LUMS Pakistan), Christo Wilson (Northeastern University)
Total Recall: Persistence of Passwords in Android
Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)
How to End Password Reuse on the Web
Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University), Brandon Ellis (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-Chi Feng (Portland State University)
Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies
Karoline Busse (University of Bonn); Dominik Wermke (Leibniz University Hannover); Sabrina Amft (University of Bonn); Sascha Fahl (Leibniz University Hannover); Emanuel von Zezschwitz, Matthew Smith (University of Bonn)
Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change
Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
Jason Morris, Ingolf Becker, Simon Parkin (University College London)
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Oksana Kulyk (Karlsruhe Institute of Technology); Paul Gerber, Karola Marky, Christopher Beckmann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)
Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors
Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)
Designing a Mobile App to Support Social Processes for Privacy and Security Decisions
Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)
A First Look at the Usability of OpenVAS Vulnerability Scanner
M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)
Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters
Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)
Stop to Unlock - Improving the Security of Android Unlock Patterns
Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Continuous Smartphone Authentication using Wristbands
Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)
Work in Progress: A Comparative Long-Term Study of Fallback Authentication
Philipp Markert, Maximilian Golla (Ruhr University Bochum); Elizabeth Stobert (National Research Council of Canada); Markus Dürmuth (Ruhr University Bochum)
Case Study – Exploring Children’s Password Knowledge and Practices
Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)
運営について
お問い合わせ先
uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
USP論文読破会
ユーザブルセキュリティ・プライバシー(USP)論文読破会
更新日:2018年11月20日
これまで、セキュリティ心理学とトラスト(SPT)研究会では、プライバシーとセキュリティのユーザビリティについての国際会議Symposium on Usable Privacy and Security (SOUPS)で発表された論文の発表内容把握のためのイベントとしてSOUPS論文読破会を2011年より開催してきました。 ユーザブルセキュリティ・プライバシーの分野はSOUPSを中心に世界的な発展を見せ、SOUPSへの投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 そこで、本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会を開催することといたしました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。
開催要項
日時:平成30年11月27日(火)10:00~17:30 (受付9:30~)
会場:理化学研究所 革新知能統合研究センター(AIP)
〒103-0027 東京都中央区日本橋1-4-1 日本橋一丁目三井ビルディング 15階
交通アクセス
主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会
参加費
発表者
1,000円
研究会登録会員
2,000円
情報処理学会学生会員
1,000円
一般(非会員)
3,000円
懇親会
読破会終了後に懇親会を行います。
場所
MASTER’S DREAM HOUSE (マスターズドリームハウス)
時間
18:00-20:00
会費
4,500円
発表者募集 (締め切りました)
本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください. 紹介のスライドを事前にお送りいただいて,当日の参加者に配布いたします.
論文はこの1年(2017年12月~2018年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。
参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文」としてリストアップいたしました。ご参考ください。
発表ご希望の方は,次のアドレスに電子メールをお送りください. uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )
申込の電子メールについて
メール件名:USP論文読破会:発表申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文
懇親会の出欠
担当論文の決定方法について
メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.
論文担当情報(2018年11月5日現在)
Reham Ebada Mohamed and Sonia Chiasson: Online Privacy and Aging of Digital Artifacts, SOUPS1028
担当:金森祥子(NICT)
Shruti Sannon (Cornell University), Natalya N Bazarova (Cornell University), Dan Cosley (Cornell University): Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts, ACM CHI 2018
担当:長谷川彩子(NTT)
Elissa M Redmiles (University of Maryland), Neha Chachra (Facebook), Brian Waismeyer(Facebook): Examining the Demand for Spam: Who Clicks?, ACM CHI 2018
担当:鈴木悠(ラック)
Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University: Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing, SOUPS 2018
担当:ALTANGINJ TUMENGEREL(電通大)
A.Papadopoulos, T.Nguyen, E.Durmus, N.Memom: IllusionPIN:Shoulder-Surfing Resistant Authentication Using Hybrid Images, IEEE Transaction on information forensics and security
担当:菊池彩子(宇都宮大)
Flynn Wolf, Adam Aviv and Ravi Kuber: Work-In-Progress: Performance of Eyes-Free Mobile Authentication, USEC 2018
担当:田中雄也(宇都宮大)
Robert W Reeder (Google (Inc.), Adrienne Porter Felt (Google), Sunny Consolvo (Inc.), Nathan Malkin (Berkeley), Christopher Thompson (Berkeley), Serge Egelman (Berkeley; International Computer Science Institute): An Experience Sampling Study of User Reactions to Browser Warnings in the Field, ACM CHI 2018
担当:須賀祐治(IIJ)
Ding Wang (Peking University), Haibo Cheng (Peking University), Ping Wang (Peking University), Jeff Yan (Linkoping University), and Xinyi Huang (Fujian Normal University): A Security Analysis of Honeywords, NDSS 2018
担当:山岸伶(電通大)
Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer: "This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer, EuroUSEC 2018
担当:坂本一仁(セコム)
Daniela Seabra Oliveira, Tian Lin, and Muhammad Sajidur Rahman, University of Florida; Rad Akefirad, Auto1 Inc.; Donovan Ellis, Eliany Perez, and Rahul Bobhate, University of Florida; Lois A. DeLong and Justin Cappos, New York University; Yuriy Brun, University of Massachusetts Amherst; Natalie C. Ebner, University of Florida: API Blindspots: Why Experienced Developers Write Vulnerable Code, SOUPS 2018
担当:渡邊裕治(日本IBM)
Hamza Harkous, École Polytechnique Fédérale de Lausanne (EPFL); Kassem Fawaz, University of Wisconsin-Madison; Rémi Lebret, École Polytechnique Fédérale de Lausanne (EPFL); Florian Schaub and Kang G. Shin, University of Michigan; Karl Aberer, École Polytechnique Fédérale de Lausanne (EPFL): Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning, USENIX Security '18
担当:香川椋平(セコム)
Louise Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith and Sadie Creese: Sonification in Security Operations Centres: What do Security Practitioners Think?, USEC 2018
担当:八木毅(NTTセキュリティ・ジャパン)
Julie M. Haney and Wayne G. Lutters, University of Maryland, Baltimore County: "It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security, SOUPS 2018
担当:寺田剛陽(富士通研)
Justin Wu and Daniel Zappala, Brigham Young University: When is a Tree Really a Truck? Exploring Mental Models of Encryption, SOUPS 2018
担当:尾崎敏司(筑波大)
Mohammad Taha Khan (University of Illinois at Chicago), Maria Hyun (University of Chicago), Chris Kanich (University of Illinois at Chicago), Blase Ur (University of Chicago): Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage, ACM CHI 2018
担当:大木哲史(静岡大)
Jessica Colnago (Carnegie Mellon University), Summer Devlin (UC Berkeley), Maggie Oates (Carnegie Mellon University), Chelse Swoopes (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University): It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University, ACM CHI 2018
担当:田崎来実(長崎県立大)
Nithya Sambasivan and Garen Checkley, Google; Amna Batool, Information Technology University; Nova Ahmed, North South University; David Nemer, University of Kentucky; Laura Sanely Gaytán-Lugo, Universidad de Colima; Tara Matthews, Independent Researcher; Sunny Consolvo and Elizabeth Churchill, Google: Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia, SOUPS 2018
担当:滝澤友里(津田塾大)
Ryan Heartfield, George Loukas: Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework, Computer & Security, Volume 76, July 2018, Pages 101-127
担当:今田寛(電通大)
参加申込
件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
申込の電子メールについて
メール件名:USP論文読破会:参加申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
SPT研究会会員・非会員の別
懇親会の出欠
お知らせ
その他
当日は,論文は配布しませんので,各自でご準備ください.
終了後は懇親会を予定しております.
研究会非会員の方は,この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
参考:代表的な国際会議で発表されたUSP論文
Didn’t You Hear Me? – Towards More Successful Web Vulnerability Notifications
Ben Stock (CISPA, Saarland University), Giancarlo Pellegrino (CISPA, Saarland University and Stanford University), Frank Li (UC Berkeley), Michael Backes (CISPA, Saarland University), and Christian Rossow (CISPA, Saarland University)
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System
Erkam Uzun (Georgia Institute of Technology), Simon Pak Ho Chung (Georgia Institute of Technology), Irfan Essa (Georgia Institute of Technology), and Wenke Lee (Georgia Institute of Technology)
A Security Analysis of Honeywords
Ding Wang (Peking University), Haibo Cheng (Peking University), Ping Wang (Peking University), Jeff Yan (Linkoping University), and Xinyi Huang (Fujian Normal University)
Broken Fingers: On the Usage of the Fingerprint API in Android
Antonio Bianchi (University of California, Santa Barbara), Yanick Fratantonio (University of California, Santa Barbara, EURECOM), Aravind Machiry (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), Simon Pak Ho Chung (Georgia Institute of Technology), and Wenke Lee (Georgia Institute of Technology)
K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All
Parimarjan Negi (Stanford University), Prafull Sharma (Stanford University), Vivek sanjay Jain (Stanford University), and Bahman Bahmani (Stanford University)
ABC: Enabling Smartphone Authentication with Built-in Camera
Zhongjie Ba (University at Buffalo, State University of New York), Sixu Piao (University at Buffalo, State University of New York), Xinwen Fu (University of Central Florida), Dimitrios Koutsonikolas (University at Buffalo, State University of New York), Aziz Mohaisen (University of Central Florida), and Kui Ren (University at Buffalo, State University of New York)
Device Pairing at the Touch of an Electrode
Marc Roeschlin (University of Oxford), Ivan Martinovic (University of Oxford), and Kasper B. Rasmussen (University of Oxford)
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Di Tang (Chinese University of Hong Kong), Zhe Zhou (Fudan University), Yinqian Zhang (Ohio State University), and Kehuan Zhang (Chinese University of Hong Kong)
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Aylin Caliskan (Princeton University), Fabian Yamaguchi (Shiftleft Inc), Edwin Dauber (Drexel University), Richard Harang (Sophos), Konrad Rieck (TU Braunschweig), Rachel Greenstadt (Drexel University), and Arvind Narayanan (Princeton University)
Exploring Website Location as a Security Indicator
Der-Yeuan Yu, Elizabeth Stobert, David Basin and Srdjan Capkun
User Context: An Explanatory Variable in Phishing Susceptibility
Kristen Greene, Michelle Steves, Mary Theofanos and Jennifer Kostick
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith and Sadie Creese
TinPal: An Enhanced Interface for Pattern Locks
Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti and Sachin Lodha
Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication
Adam Aviv and Ravi Kuber
Quantifying Users’ Beliefs about Software Updates
Arunesh Mathur, Nathan Malkin, Marian Harbach, Eyal Peer and Serge Egelman
Work-In-Progress: Performance of Eyes-Free Mobile Authentication
Flynn Wolf, Adam Aviv and Ravi Kuber
Work in Progress: Usable Security vs. Workflow Realities
Jim Blythe, Vijay Kothari, Sean Smith and Ross Koppel
A Survey Of the Privacy Preferences and Practices of Iranian Users of Telegram
Elham Vaziripour, Reza Farahbakhsh, Mark O’Neill, Justin Wu, Kent Seamons and Daniel Zappala
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
Albese Demjaha, Jonathan Spring, Ingolf Becker, Simon Parkin and Angela Sasse
Exploring Parents’ Security and Privacy Concerns and Practices
Abdulmajeed Alqhatani and Heather Lipford
Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants
Tamy Guberek (University of Michigan), Allison McDonald (University of Michigan), Sylvia Simoni (University of Michigan), Abraham H. Mhaidli (University of Michigan), Kentaro Toyama (University of Michigan), Florian Schaub (University of Michigan)
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization
Claire Dolin (University of Chicago), Ben Weinshel (University of Chicago), Shawn Shan (University of Chicago), Chang Min Hahn (University of Chicago), Euirim Choi (University of Chicago), Michelle L. Mazurek (University of Maryland), Blase Ur (University of Chicago)
An Experimental Study of Cryptocurrency Market Dynamics
Peter M Krafft (MIT), Nicolas Della Penna (Australian National University), Alex Pentland (Massachusetts Institute of Technology)
Making Sense of Blockchain Applications: A Typology for HCI
Chris Elsden (Northumbria University), Arthi Manohar (Northumbria University), Jo Briggs (Northumbria University), Mike Harding (Lancaster University), Chris Speed (University of Edinburgh), John Vines (Northumbria University)
Breaking! A Typology of Security and Privacy News and How It’s Shared
Sauvik Das (Georgia Institute of Technology), Joanne Lo (Carnegie Mellon University), Laura Dabbish (Carnegie Mellon University), Jason Hong (Carnegie Mellon University)
“We Are the Product”: Public Reactions to Online Data Sharing and Privacy Controversies in the Media
Casey Fiesler (University of Colorado), Blake Hallinan (University of Colorado Boulder)
Not Even Past: Information Aging and Temporal Privacy in Online Social Networks
Oshrat Ayalon (Tel Aviv University), Eran Toch (Tel Aviv University)
The Use of Private Mobile Phones at War: Accounts From the Donbas Conflict
Irina Shklovski (IT University of Copenhagen; University of Siegen), Volker Wulf (University of Siegen)
Co-designing Mobile Online Safety Applications with Children
Brenna McNally (University of Maryland), Priya Kumar (University of Maryland), Chelsea Hordatt (University of Maryland), Matthew Louis Mauriello (University of Maryland; University of Maryland), Shalmali Naik (University of Maryland), Leyla Norooz (University of Maryland), Alazandra Shorter (University of Maryland), Evan Golub (University of Maryland; University of Maryland), Allison Druin (University of Maryland)
Contextualizing Privacy Decisions for Better Prediction (and Protection)
Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Irwin Reyes (International Computer Science Institute), Lynn Tsai (University of California (Berkeley), Jung-Wei Chen (Good Research (Inc), Nathan Good (Good Research (Inc.), David Wagner (Berkeley), Konstantin Beznosov (University of British Columbia), Serge Egelman (Berkeley; International Computer Science Institute)
Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts
Shruti Sannon (Cornell University), Natalya N Bazarova (Cornell University), Dan Cosley (Cornell University)
“This App Would Like to Use Your Current Location to Better Serve You”: Importance of User Assent and System Transparency in Personalized Mobile Services
Tsai-Wei Chen (United Health), S. Shyam Sundar (The Pennsylvania State University)
Improving User Confidence in Concept Maps: Exploring Data Driven Explanations
Pierre Le Bras (Heriot-Watt University), David A. Robb (Heriot-Watt University), Thomas S Methven (Heriot-Watt University), Stefano Padilla (Heriot-Watt University), Mike J Chantler (Heriot-Watt University)
Balancing Privacy and Information Disclosure in Interactive Record Linkage with Visual Masking
Eric D Ragan (Texas A&M University), Hye-Chung Kum (Texas A&M University), Gurudev Ilangovan (Texas A&M University), Han Wang (Texas A&M University)
Examining the Demand for Spam: Who Clicks?
Elissa M Redmiles (University of Maryland), Neha Chachra (Facebook), Brian Waismeyer (Facebook)
Increasing User Attention with a Comic-based Policy
Madiha Tabassum (University of North Carolina at Charlotte), Abdulmajeed Alqhatani (University of North Carolina at Charlotte), Marran Aldossari (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
Who Provides Phishing Training? Facts, Stories, and People Like Me
Rick Wash (Michigan State University), Molly M Cooper (Michigan State University; Nova Southeastern University)
X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps
Max G. Van Kleek (University of Oxford), Reuben Binns (University of Oxford), Jun Zhao (University of Oxford), Adam Slack (University of Oxford), Sauyon Lee (University of Oxford), Dean Ottewell (University of Oxford), Nigel Shadbolt (University of Oxford)
Evolving the Ecosystem of Personal Behavioral Data
Jason Wiese (University of Utah), Sauvik Das (Georgia Institute of Technology), Jason Hong (Carnegie Mellon University), John Zimmerman (Carnegie Mellon University)
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes
Ameya Hanamsagar (USC), Simon S Woo (SUNY Korea), Chris Kanich (University of Illinois), Jelena Mirkovic (USC/ISI)
Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition
Christina Katsini (University of Patras), Christos Fidas (University of Patras), George Raptis (University of Patras), Marios Belk (Cognitive UX GmbH; University of Cyprus), George Samaras (University of Cyprus), Nikolaos Avouris (University of Patras)
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing
Hassan Khan (University of Waterloo), Urs Hengartner (University of Waterloo), Daniel Vogel (University of Waterloo)
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University
Jessica Colnago (Carnegie Mellon University), Summer Devlin (UC Berkeley), Maggie Oates (Carnegie Mellon University), Chelse Swoopes (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)
Security During Application Development: an Application Security Expert Perspective
Tyler W. Thomas (University of North Carolina at Charlotte), Madiha Tabassum (University of North Carolina at Charlotte), Bill Chu (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage
Mohammad Taha Khan (University of Illinois at Chicago), Maria Hyun (University of Chicago), Chris Kanich (University of Illinois at Chicago), Blase Ur (University of Chicago)
What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes
Karola Marky (Technische Universität Darmstadt), Oksana Kulyk (Technische Universität Darmstadt), Karen Renaud (Abertay University; University of South Africa), Melanie Volkamer (Karlsruhe Institute of Technology; Technische Universität Darmstadt)
An Experience Sampling Study of User Reactions to Browser Warnings in the Field
Robert W Reeder (Google (Inc.), Adrienne Porter Felt (Google), Sunny Consolvo (Inc.), Nathan Malkin (Berkeley), Christopher Thompson (Berkeley), Serge Egelman (Berkeley; International Computer Science Institute)
User Perception and Expectations on Deleting Instant Messages —or— "What Happens If I Press This Button?"
Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer
A Usability Study of Secure Email Deletion
Tyler Monson, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, Kent Seamons
Rethinking Home Network Security
Norbert Nthala, Ivan Flechais
Consolidating Principles and Patterns for Human-centred Usable Security Research and Development
Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren
The Role of Privacy Violations in Privacy Calculu
Maija Poikela, Sebastian Möller
What Can't Data Be Used For? User Privacy Expectations about Smart TVs
Nathan Malkin, Julia Bernd, Maritza Johnson, Serge Egelman
Permission Impossible: Teaching Firewall Configuration in a Game Environment
Sibylle Sehl, Kami Vaniea
The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores
Frederic Raber, David Ziemann, Antonio Krueger
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
Yimin Chen (Arizona State University),Tao Li (Arizona State University),Rui Zhang (University of Delaware),Yanchao Zhang (Arizona State University),Terri Hedgpeth (Arizona State University)
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
Daniel Votipka (University of Maryland),Rock Stevens (University of Maryland),Elissa Redmiles (University of Maryland),Jeremy Hu (University of Maryland),Michelle Mazurek (University of Maryland)
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users
Kiron Lebeck (University of Washington),Kimberly Ruth (University of Washington),Tadayoshi Kohno (University of Washington),Franziska Roesner (University of Washington)
Computer Security and Privacy for Refugees in the United States
Lucy Simko (University of Washington),Ada Lerner (Wellesley College),Samia Ibtasam (University of Washington),Franziska Roesner (University of Washington),Tadayoshi Kohno (University of Washington)
On Enforcing the Digital Immunity of a Large Humanitarian Organization
Stevens Le Blond (École Polytechnique Fédérale de Lausanne),Alejandro Cuevas (École Polytechnique Fédérale de Lausanne),Juan Ramón Troncoso-Pastoriza (École Polytechnique Fédérale de Lausanne),Philipp Jovanovic (École Polytechnique Fédérale de Lausanne),Bryan Ford (École Polytechnique Fédérale de Lausanne),Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
Marten Oltrogge (CISPA, Saarland University),Erik Derr (CISPA, Saarland University),Christian Stransky (CISPA, Saarland University),Yasemin Acar (Leibniz University Hannover),Sascha Fahl (Leibniz University Hannover),Christian Rossow (CISPA, Saarland University),Giancarlo Pellegrino (CISPA, Saarland University, Stanford University),Sven Bugiel (CISPA, Saarland University),Michael Backes (CISPA, Saarland University)
Tracking Certificate Misissuance in the Wild
Deepak Kumar (University of Illinois, Urbana-Champaign),Zhengping Wang (University of Illinois, Urbana-Champaign),Matthew Hyder (University of Illinois, Urbana-Champaign),Joseph Dickinson (University of Illinois, Urbana-Champaign),Gabrielle Beck (University of Michigan),David Adrian (University of Michigan),Joshua Mason (University of Illinois, Urbana-Champaign),Zakir Durumeric (University of Michigan),J. Alex Halderman (University of Michigan),Michael Bailey (University of Illinois, Urbana-Champaign)
On the Economics of Offline Password Cracking
Jeremiah Blocki (Purdue University),Benjamin Harsha (Purdue University),Samson Zhou (Purdue University)
A Tale of Two Studies: The Best and Worst of YubiKey Usability
Joshua Reynolds (University of Illinois at Urbana-Champaign), Trevor Smith (Brigham Young University), Ken Reese (Brigham Young University), Luke Dickinson (Brigham Young University), Scott Ruoti (MIT Lincoln Laboratory), Kent Seamons (Brigham Young University)
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
Melanie Volkamer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt; Andreas Gutmann, OneSpan Innovation Centre and University College London; Karen Renaud, Abertay University, University of South Africa, and University of Glasgow; Paul Gerber, Technische Universität Darmstadt; Peter Mayer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt
User Behaviors and Attitudes Under Password Expiration Policies
Hana Habib and Pardis Emami Naeini, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians
Elham Al Qahtani and Mohamed Shehab, University of North Carolina Charlotte; Abrar Aljohani
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal
Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala, Brigham Young University
Informal Support Networks: an investigation into Home Data Security Practices
Norbert Nthala and Ivan Flechais, University of Oxford
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships
Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong, Carnegie Mellon University
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking
Arunesh Mathur, Princeton University; Jessica Vitak, University of Maryland, College Park; Arvind Narayanan and Marshini Chetty, Princeton University
Can Digital Face-Morphs Influence Attitudes and Online Behaviors?
Eyal Peer, Bar-Ilan University; Sonam Samat and Alessandro Acquisti, Carnegie Mellon University
"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
Nithya Sambasivan and Garen Checkley, Google; Amna Batool, Information Technology University; Nova Ahmed, North South University; David Nemer, University of Kentucky; Laura Sanely Gaytán-Lugo, Universidad de Colima; Tara Matthews, Independent Researcher; Sunny Consolvo and Elizabeth Churchill, Google
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su, Indiana University Bloomington
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing
Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
Online Privacy and Aging of Digital Artifacts
Reham Ebada Mohamed and Sonia Chiasson, Carleton University
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach
Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub, School of Information, University of Michigan
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu, Google
User Comfort with Android Background Resource Accesses in Different Contexts
Daniel Votipka and Seth M. Rabin, University of Maryland; Kristopher Micinski, Haverford College; Thomas Gilray, Michelle L. Mazurek, and Jeffrey S. Foster, University of Maryland
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
Orçun Çetin, Lisette Altena, Carlos Gañán, and Michel van Eeten, Delft University of Technology
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse
Peter Leo Gorski and Luigi Lo Iacono, Cologne University of Applied Sciences; Dominik Wermke and Christian Stransky, Leibniz University Hannover; Sebastian Möller, Technical University Berlin; Yasemin Acar, Leibniz University Hannover; Sascha Fahl, Ruhr-University Bochum
Security in the Software Development Lifecycle
Hala Assal and Sonia Chiasson, Carleton University
Deception Task Design in Developer Password Studies: Exploring a Student Sample
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith, University of Bonn, Germany
API Blindspots: Why Experienced Developers Write Vulnerable Code
Daniela Seabra Oliveira, Tian Lin, and Muhammad Sajidur Rahman, University of Florida; Rad Akefirad, Auto1 Inc.; Donovan Ellis, Eliany Perez, and Rahul Bobhate, University of Florida; Lois A. DeLong and Justin Cappos, New York University; Yuriy Brun, University of Massachusetts Amherst; Natalie C. Ebner, University of Florida
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration
Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De Luca, Google
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Norman Hänsch, Friedrich-Alexander-Universität Erlangen-Nürnberg; Andrea Schankin, Karlsruhe Institute of Technology; Mykolai Protsenko, Fraunhofer Institute for Applied and Integrated Security; Felix Freiling and Zinaida Benenson, Friedrich-Alexander-Universität Erlangen-Nürnberg
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products
Julie M. Haney and Mary F. Theofanos, National Institute of Standards and Technology; Yasemin Acar, Leibniz University Hannover; Sandra Spickard Prettyman, Culture Catalyst
A Comparative Usability Study of Key Management in Secure Email
Scott Ruoti, University of Tennessee; Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons, Brigham Young University
When is a Tree Really a Truck? Exploring Mental Models of Encryption
Justin Wu and Daniel Zappala, Brigham Young University
"It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security
Julie M. Haney and Wayne G. Lutters, University of Maryland, Baltimore County
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection
James Nicholson, Lynne Coventry, and Pam Briggs, PaCT Lab, Northumbria University
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality
Devon Adams, Alseny Bah, and Catherine Barwulor, University of Maryland Baltimore County; Nureli Musaby, James Madison University; Kadeem Pitkin, College of Westchester; Elissa M. Redmiles, University of Maryland
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
Sanam Ghorbani Lyastani, CISPA, Saarland University; Michael Schilling, Saarland University; Sascha Fahl, Ruhr-University Bochum; Michael Backes and Sven Bugiel, CISPA Helmholtz Center i.G.
Forgetting of Passwords: Ecological Theory and Data
Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, and Janne Lindqvist, Rutgers University; Antti Oulasvirta, Aalto University
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
Ingolf Becker, Simon Parkin, and M. Angela Sasse, University College London
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
Weijia He, University of Chicago; Maximilian Golla, Ruhr-University Bochum; Roshni Padhi and Jordan Ofek, University of Chicago; Markus Dürmuth, Ruhr-University Bochum; Earlence Fernandes, University of Washington; Blase Ur, University of Chicago
How Do Tor Users Interact With Onion Services?
Philipp Winter, Anne Edmundson, and Laura M. Roberts, Princeton University; Agnieszka Dutkowska-Żuk, Independent; Marshini Chetty and Nick Feamster, Princeton University
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
Hamza Harkous, École Polytechnique Fédérale de Lausanne (EPFL); Kassem Fawaz, University of Wisconsin-Madison; Rémi Lebret, École Polytechnique Fédérale de Lausanne (EPFL); Florian Schaub and Kang G. Shin, University of Michigan; Karl Aberer, École Polytechnique Fédérale de Lausanne (EPFL)
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
Rock Stevens, Daniel Votipka, and Elissa M. Redmiles, University of Maryland; Colin Ahern, NYC Cyber Command; Patrick Sweeney, Wake Forest University; Michelle L. Mazurek, University of Maryland
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild
Chaowei Xiao and Armin Sarabi, University of Michigan; Yang Liu, Harvard University / UC Santa Cruz; Bo Li, UIUC; Mingyan Liu, University of Michigan; Tudor Dumitras, University of Maryland, College Park
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Nanjing University; Alejandro Cuevas, The Pennsylvania State University; Limin Yang and Hang Hu, Virginia Tech; Xinyu Xing, The Pennsylvania State University; Bing Mao, Nanjing University; Gang Wang, Virginia Tech
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
Rolf van Wegberg and Samaneh Tajalizadehkhoob, Delft University of Technology; Kyle Soska, Carnegie Mellon University; Ugur Akyazi, Carlos Hernandez Ganan, and Bram Klievink, Delft University of Technology; Nicolas Christin, Carnegie Mellon University; Michel van Eeten, Delft University of Technology
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces
Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington
Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
Mohammad Rezaeirad, George Mason University; Brown Farinholt, University of California, San Diego; Hitesh Dharmdasani, Informant Networks; Paul Pearce, University of California, Berkeley; Kirill Levchenko, University of California, San Diego; Damon McCoy, New York University
The aftermath of a crypto-ransomware attack at a large academic institution
Leah Zhang-Kennedy, University of Waterloo, Stratford Campus; Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson, Carleton University
運営について
お問い合わせ先
uspread 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
SOUPS2017論文読破会
SOUPS2017論文読破会
更新日:2017年11月1日
SOUPS2017論文読破会は,7月12日~14日に米国サンタクララで開催された Thirteenth Symposium On Usable Privacy and Security (SOUPS 2017) の発表論文を1日で読破するセキュリティ心理学とトラスト(SPT)研究会の主催イベントです. SOUPS 2017ではパスワードやIoT,モバイル端末での支払い、開発者向けユーザビリティ,ユーザの振る舞い,フィッシングなど多岐にわたる研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します. 本読破会に参加することでSOUPS 2017 で発表された26論文全てを把握できるだけでなく,興味のある論文を確認することができます.
開催要項
日時:平成29年11月2日(木)10:00~ (受付9:30~)
会場:セコム本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分
主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会
参加費
発表者
1,000円
研究会登録会員
2,000円
情報処理学会学生会員
1,000円
一般(非会員)
3,000円
発表者募集 (締め切りました)
本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください. 紹介のスライドを事前にお送りいただいて,当日の参加者に配布いたします.
論文はSOUPS 2017のページ上で公開されていますので,そちらから取得してください.
発表ご希望の方は,次のアドレスに電子メールをお送りください. soups2017read 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )
申込の電子メールについて
メール件名:SOUPS2017論文読破会:発表申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文(第3希望まで)
懇親会の出欠
担当論文の決定方法について
メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.
参加申込
件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) soups2017read 【アットマーク】klab.is.sci.toho-u.ac.jp
申込の電子メールについて
メール件名:SOUPS2017論文読破会:参加申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
SPT研究会会員・非会員の別
懇親会の出欠
お知らせ
その他
当日は,SOUPS 2017で発表された論文は配布しませんので,各自でご準備ください.
終了後は懇親会を予定しております.
研究会非会員の方は,この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
一部資料のダウンロード
一部の資料についてはオンラインでダウンロード可能です。
アクセスにはパスワードが必要です。パスワードは会場でお知らせいたします。また、データ閲覧は11月9日(木)まで可能なように有効期限を設けています。
懇親会
場所
ピッツェリア カンテラ (東京都渋谷区神宮前6-28-6 Q plaza HARAJUKU 9F)
時間
18:30-20:30
会費
4,500円
運営について
お問い合わせ先
soups2017read 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
SOUPS2016論文読破会
SOUPS2016論文読破会
更新日:2016年9月30日
SOUPS2016論文読破会は,6月22日~24日に米国デンバーで開催された Twelfth Symposium On Usable Privacy and Security (SOUPS 2016) の発表論文を1日で読破するセキュリティ心理学とトラスト(SPT)研究会の主催イベントです. SOUPS 2016ではブラウザインターフェースやメッセージングセキュリティ,ユーザの振る舞い,モバイルセキュリティ,パスワードなど多岐にわたる研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します. 本読破会に参加することでSOUPS 2016 で発表された22論文全てを把握できるだけでなく,興味のある論文を確認することができます.
開催要項
日時:平成28年10月17日(月)10:00~ (受付9:30~)
会場:SECOM本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分
主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会
参加費
発表者
1,000円
研究会登録会員
3,000円
情報処理学会学生会員
1,000円
一般(非会員)
5,000円
発表者募集 (締め切りました)
本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください. 紹介のスライドを事前にお送りいただいて,当日の参加者に配布いたします.
論文はSOUPS 2016のページ上で公開されていますので,そちらから取得してください.
発表ご希望の方は,次のアドレスに電子メールをお送りください. soups2016read 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )
申込の電子メールについて
メール件名:SOUPS2016論文読破会:発表申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文(第3希望まで)
担当論文の決定方法について
メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.
参加申込
件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) soups2016read 【アットマーク】klab.is.sci.toho-u.ac.jp
申込の電子メールについて
メール件名:SOUPS2016論文読破会:参加申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
SPT研究会会員・非会員の別
懇親会の出欠
お知らせ
その他
当日は,SOUPS 2016で発表された論文は配布しませんので,各自でご準備ください.
終了後は懇親会を予定しております.
研究会非会員の方は,この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
運営について
お問い合わせ先
soups2016read 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
SOUPS2015論文読破会
SOUPS2015論文読破会
更新日: 2015年10月16日
SOUPS2015論文読破会は,7月22日~24日にカナダのオタワで開催されたThe 2015 Symposium On Usable Privacy and Security (SOUPS2015)の発表論文を1日で読破するセキュリティ心理学とトラスト(SPT)研究会の主催イベントです. SOUPS2015ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプライバシのユーザビリティに関する研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します. 本読破会に参加することでSOUPS2015で発表された22論文全てを把握できるだけでなく,興味のある論文を確認することができます.
開催要項
日時:平成27年10月29日(木)10:00~ (受付9:30~)
会場:SECOM本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分
主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会
参加費
発表者
1,000円
研究会登録会員
3,000円
情報処理学会学生会員
1,000円
一般(非会員)
5,000円
発表者募集 (締切ました)
本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください。紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。
論文はSOUPS2015のページ上で公開されていますので、そちらから取得してください。
発表ご希望の方は,次のアドレスに電子メールをお送りください. soups2015read 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )
申込の電子メールについて
メール件名:SOUPS2015論文読破会:発表申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
希望する論文(第3希望まで)
担当論文の決定方法について
メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.
参加申込
件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので、すぐにはお手元に届きません。) soups2015read 【アットマーク】klab.is.sci.toho-u.ac.jp
申込の電子メールについて
メール件名:SOUPS2015論文読破会:参加申込
記載いただきたい内容:
氏名
所属(会社名等。学生の場合は学校名)
メールアドレス
SPT研究会会員・非会員の別
懇親会の出欠
お知らせ
目玉企画!
今回のSOUPS2015では、日本国内の組織から初めて論文が採録されました。
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps
Takuya Watanabe (Waseda University), Mitsuaki Akiyama (NTT), and Tetsuya Sakai, Hironori Washizaki, and Tatsuya Mori (Waseda University)
SOUPS2015論文読破会では、この著者である早稲田大の森達哉先生と渡邉卓弥さんにお越しいただき、その発表内容に加え、採録までの道のりをお話いただく予定です。
その他
当日は,SOUPS2015で発表された論文は配布しませんので,各自でご準備ください.
終了後は懇親会を予定しております。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.
研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。
運営について
お問い合わせ先
soups2015read 【アットマーク】klab.is.sci.toho-u.ac.jp
開催担当
金岡 晃(東邦大学)
SOUPS2014論文読破会
SOUPS2014論文読破会では,7月9日~11日に米国カリフォルニア州のFacebook本社で開催されますSymposium On Usable Privacy and Security (SOUPS2014)の発表論文を1日で読破するイベントを開催します. SOUPS2014ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプライバシのユーザビリティに関する研究内容が発表されます. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本読破会に参加することで,SOUPS2014で発表された15論文全てを把握できるだけでなく,興味のある論文を確認することができます.
詳しい内容につきましては,別途SPTホームページにてアナウンス致します.
SOUPS2014 ホームページURL:http://cups.cs.cmu.edu/soups/2014/
[開催要項]
日時:平成24年10月31日(金)9:30~ (受付9:00~)
会場:SECOM本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分主催:情報処理学会 セキュリティ心理学とトラスト研究会 (SPT)
参加費:研究会登録会員:2000円,情報処理学会学生会員:0円,その他:5,000円(発表者は参加費無料です)
[発表者募集]
本勉強会で,論文を報告していただける方を募集します.
発表していただける方は,次のアドレスに電子メールをお送りください.
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )
メール件名:SOUPS2014論文読破会:発表申込
内容:
1:氏名
2:メールアドレス
3:所属(会社名等、学生の場合は学校名)
4:希望する論文(第3希望まで)
担当論文の決定方法について:
メール受付後,順次,担当する論文を決定させていただきます.
担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.
[参加申し込みについて]
件名を「参加申込」として,次のアドレスに電子メールをお送りください. (メールは自動返信ではないので、すぐにはお手元に届きません。)
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )
メール件名:SOUPS2014論文読破会:参加申込
送信内容:
1:氏名
2:所属(会社名等、学生の場合は学校名)
3:メールアドレス
4:SPT研究会会員・非会員の別
参加申込み〆切:10月24日(金)
[お知らせ]
・当日は,SOUPS2014で発表された論文は配布しませんので,各自でご準備ください.
・終了後は懇親会を予定しております。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします.
学会員の方の登録費は3,780円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります.
なお,非会員の方でも研究会登録することができます.
その場合の研究会登録費は,4,860円です.
[プログラム]
Opening Remarks(10:00-10:10 )
参加報告
金岡 晃(東邦大学)
Warnings and Decisionsyセッション(10:10-11:30)
Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation
寺田 剛陽(富士通研)
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences
寺田 剛陽(富士通研)
Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It/li>
池邉 拓磨(東邦大学)
Your Reputation Precedes You: Reputation and the Chrome Malware Warning
担荻野 貴大(電通大)
休憩(11:30-11:40)
Mobile/Authenticationセッション(11:40-13:00)
Towards Continuous and PassiveAuthentication via Touch Biometrics: AnExperimental Study on Smartphones
五味 秀仁(ヤフー)
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception
宮尾 隆太郎(電通大)
Applying Psychometrics to Measure User Comfort when Constructing a Strong Password
西岡 大(岩手県立大)
The Password Life Cycle: User Behaviour in Managing Passwords
藤田 真浩(静岡大)
昼食(13:00-14:30)
Perspectives on Privacy / Users and Securityセッション(14:30-15:50)
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World
大山 敬博(東邦大)
Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google
寺田 剛陽(富士通研)
Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It/li>
坂本 一仁(セコム)
Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input
玉井 睦(セコム)
休憩(15:50-16:00)
Social Networks and Access Controlセッション(16:00-17:00)
Understanding and Specifying Social Access Control Lists
町田 史門(総研大)
To Befriend Or Not? Friend Request Acceptance Model on Facebook
Nor Athiyah Binti Abdullah(岩手県立大)
To authorize or not authorize: helping users review access policies in organizations
島岡 政基(セコム)
休憩(17:00-17:10)
未担当論文概要紹介(17:10-18:00)
担当者金岡 晃(東邦大)
Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened thereafter? A study of the Westin categories, behavioral intentions, and consequences
Privacy attitudes of Mechanical Turk workers and the U.S. public
Exploring Internet Security Attitudes and Practices in Urban Ghana
Behavioral Experiments Exploring the Impact of Attack and Attacker on Victims’ Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations
Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings
Applying Psychometrics to Measure User Comfort when Constructing a Strong Password
Crowdsourcing Attacks on Biometric Systems
SOUPS2013論文読破会 (於 第7回SPT研究発表会)
第7回研究会では,去る7月24日~26日に英国ニューカッスルで開催されましたSymposium On Usable Privacy and Security (SOUPS2013)の発表論文を1日で読破するイベントを開催します. SOUPS2013ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプライバシのユーザビリティに関する研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本読破会に参加することで,SOUPS2013で発表された15論文全てを把握できるだけでなく,興味のある論文を確認することができます. 発表は,1件につき15分発表および5分質疑応答を予定しております.SOUPS2013で発表された論文はSOUPS2013ホームページのプログラムから取得することができます.
(SOUPS2013 ホームページURL:http://cups.cs.cmu.edu/soups/2013/ )
詳しい内容につきましては,別途SPTホームページにてアナウンス致します.
(SPTホームページURL:http://www.sig-spt.org/)
[開催要項]
日時:平成25年11月11日(月) 10:00~
会場:SECOM本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分参加費:情報処理学会の規程に準じます.SPT研究会登録会員は参加費無料です.ご登録をお勧めします.
[プログラム]
Opening Remarks
SOUPS2013について (10:00-10:05)
Participation Report (10:05-10:15)
※○は発表者
※1件20分(発表15分+質疑5分)
■(10:15-11:15)
(1)"When It's Better to Ask Forgiveness than Get Permission: Attribution Mechanisms for Smartphone Resources" の報告
○坂下卓弥,小形真平(信州大)
(2)"Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics" の紹介
○葛野弘樹(セコム)
(3)"CASA: Context-Aware Scalable Authentication" の紹介
○望月翔太,高田哲司(電通大)
11:15-12:50 昼休み(95分)
■(12:50-13:50)
(4)"Retrospective Privacy:Managing Longitudinal Privacy in Online Social Networks" の紹介
○銭 亦ハン,長谷川まどか(宇都宮大)
(5)"Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes" の紹介
○宮嵜仁志(名工大),白石善明(神戸大),岩田 彰(名工大)
(6)"Your Attention Please: Designing security-decision UIs to make genuine risks harder to ignore" の紹介
○岩橋敏幸,金岡 晃(東邦大)
13:50-13:55 休憩(5分)
■(13:55-14:55)
(7)Report of "What Matters to Users? Factors that Affect Users' Willingness to Share Information with Online Advertisers"
○Nor Athiyah Binti Abdullah,西岡 大,村山優子(岩手県立大)
(8)"Do Not Embarrass: Re-Examining User Concerns for Online Tracking and Advertising" の紹介
○坂本一仁(セコム)
(9)"Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency" の紹介
○奥村香保里(名工大),白石善明(神戸大),岩田 彰(名工大)
14:55-15:00 休憩(5分)
■(15:00-16:00)
(10)"Modifying Smartphone User Locking Behavior" の紹介
○武井勇樹,長谷川まどか(宇都宮大)
(11)"Exploring the Design Space of Graphical Passwords on Smartphones" の紹介
○高橋雅香,高田哲司(電通大)
(12)"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones の報告
○可児潤也(静岡大)
16:00-16:05 休憩(5分)
■(16:05-17:05)
(13)"On The Ecological Validity of a Password Study" の紹介
○金岡 晃(東邦大)
(14)"Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme" の紹介
○長谷川まどか(宇都宮大)
(15)"Memory Retrieval and Graphical Passwords" の紹介
○金森 祥子, 盛合 志帆(NICT)
運営委員会 17:10-17:40
懇親会 18:00-20:00
[発表者募集] (終了しました)
本勉強会で,論文を報告していただける方を募集します.
発表していただける方は,次のアドレスに電子メールをお送りください.
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )
メール件名:SOUPS読破会発表申込
メール内容:
1:氏名
2:メールアドレス
3:所属(会社名等、学生の場合は学校名)
4:希望する論文(第3希望まで)
担当論文の決定方法について:
メール受付後,順次,担当する論文を決定させていただきます.
担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.
担当論文決定後,IPSJの研究会投稿システム(URLは担当論文決定後に連絡します)の「発表申込」メニューより,発表者名,タイトル等をご登録いただきます.
予稿集と発表スライドについて:
発表者には報告内容の概要をまとめた予稿(1ページ程度)と発表スライドを作成して頂きます.
作成要領の詳細は,担当者よりご連絡差し上げます.
発表申込締切 : 2013年 9月30日(月)23:59締切(終了しました)
最終原稿締切 : 2013年10月21日(月)23:59締切(終了しました)
[お知らせ]
・当日,SOUPS2013発表論文の原著は配布しませんので,各自でご準備ください.
・終了後に懇親会を予定しております.会場予約の都合上,懇親会参加をご希望の方は事前に
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
までご連絡ください.
SOUPS2012論文読破会
去る7月11日~13日に米国ワシントンD.C.で開催されましたSymposium On Usable Privacy and Security(SOUPS2012)の発表論文を,1日で読破するためのイベントを開催いたします.SOUPS2012ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプ ライバシのユーザビリティに関する研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本読破会に参加することで,SOUPS2012で発表された14論文全てを把握できるだけで なく,興味のある論文を確認することがきます.発表につきましては,1件につき15分発表および5分質疑応答を予定しております. SOUPS2012で発表された論文はSOUPS2012ホームページのプログラムから取得する事が出来ます.
(SOUPS2012 ホームページURL:http://cups.cs.cmu.edu/soups/2012/ )
詳しい内容につきましては,別途SPTホームページにてアナウンス致します.
(SPTホームページURL:http://www.sig-spt.org/)
[開催要項]
日時:平成24年10月9日(火)10:00~ (受付9:30~)
会場:SECOM本社 セコムホール
住所: 〒150-0001 東京都渋谷区神宮前1-5-1
場所:SECOM本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分主催:情報処理学会 情報セキュリティ心理学とトラスト研究会 (SPT)
参加費:研究会会員および発表者は無料
研究会非会員:5,000円(資料代含む)
[プログラム]
Opening Remarks
SOUPS2012について (10:00-10:05)
村山優子(岩手県立大学、SPT研究会主査)
Participantion Report (10:05-10:20)
長谷川(宇都宮大)、金岡(筑波大、NICT)
Session: Mobile Privacy and Security (10:20-11:20)
(1)Measuring User Confidence in Smartphone Security and Privacy
Authors:Erika Chin, Adrienne Porter Felt, Vyas Sekar, David Wagner
報告者:可児潤也(静岡大学)
(2)Goldilocks and the Two Mobile Devices: Going Beyond All-Or-Nothing Access to a Device's Applications
Authors:Eiji Hayashi, Oriana Riva, Karin Strauss, A.J. Bernheim Brush, Stuart Schechter
報告者:上松晴信(静岡大学)
(3)Android Permissions: User Attention, Comprehension, and Behavior
Authors:Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner
報告者:高木浩光(産業技術総合研究所)
Sesion: Access Control (11:20-12:20) Session: Online Social Networks (11:20-12:20)
(4)+Your Circles: Sharing Behavior on Google+
Authors:Jason Watson, Andrew Besmer, Heather Richter Lipford
報告者:金岡 晃(筑波大学、NICT)
(4)Facebook and Privacy: It's Complicated
Authors:Maritza Johnson, Serge Egelman, Steven M. Bellovin
報告者:長谷川まどか(宇都宮大学)
(5)The PViz Comprehension Tool for Social Network Privacy Settings
Authors:Alessandra Mazzia, Kristen LeFevre, Eytan Adar
報告者:水戸 和(セコム(株))
(5)Are privacy concerns a turn-off? Engagement and privacy in social networks
Authors:Jessica Staddon, David Huffaker, Larkin Brown, Aaron Sedley
報告者:長谷川まどか(宇都宮大学)
(6)Relating Declarative Semantics and Usability in Access Control
Authors:Vivek Krishnan, Mahesh V. Tripunitara, Kinson Chik, Tony Bergstrom
報告者:尼子雄大(電気通信大学)
(6)Helping Johnny 2.0 to Encrypt His Facebook Conversations
Authors:Sascha Fahl, Marian Harbach, Thomas Muders, Uwe Sander, Matthew Smith
報告者:金岡 晃(筑波大学、NICT)
Session: Authentication (14:00-14:40)
(7)Correct horse battery staple: Exploring the usability of system-assigned passphrases
Authors:Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek,
Blase Ur, Tim Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
報告者:石塚正也(電気通信大学)
(8)Do You See Your Password? Applying Recognition to Textual Passwords
Authors:Nicholas Wright, Andrew S. Patrick, Robert Biddle
報告者:伊藤忠彦(セコム(株))
Session: Online Social Networks (14:40-15:40) Sesion: Access Control (14:40-15:40)
(9)Facebook and Privacy: It's Complicated
Authors:Maritza Johnson, Serge Egelman, Steven M. Bellovin
報告者:長谷川まどか(宇都宮大学)
(9)+Your Circles: Sharing Behavior on Google+
Authors:Jason Watson, Andrew Besmer, Heather Richter Lipford
報告者:金岡 晃(筑波大学、NICT)
(10)Are privacy concerns a turn-off? Engagement and privacy in social networks
Authors:Jessica Staddon, David Huffaker, Larkin Brown, Aaron Sedley
報告者:長谷川まどか(宇都宮大学)
(10)The PViz Comprehension Tool for Social Network Privacy Settings
Authors:Alessandra Mazzia, Kristen LeFevre, Eytan Adar
報告者:水戸 和(セコム(株))
(11)Helping Johnny 2.0 to Encrypt His Facebook Conversations
Authors:Sascha Fahl, Marian Harbach, Thomas Muders, Uwe Sander, Matthew Smith
報告者:金岡 晃(筑波大学、NICT)
(11)Relating Declarative Semantics and Usability in Access Control
Authors:Vivek Krishnan, Mahesh V. Tripunitara, Kinson Chik, Tony Bergstrom
報告者:尼子雄大(電気通信大学)
Session: User Perceptions (16:00-17:00)
(11)Smart, Useful, Scary, Creepy: Perceptions of Behavioral Advertising
Authors:Blase Ur, Pedro G. Leon, Lorrie Faith Cranor, Richard Shay, Yang Wang
報告者:ジェンチャラッサクン ボンコット(東京大学)
(12)Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice
Authors:Sameer Patil, Greg Norcie, Apu Kapadia, Adam J. Lee
報告者:西岡 大(岩手県立大学)
(13)Stories as Informal Lessons about Security
Authors:Emilee Rader, Rick Wash, Brandon Brooks
報告者:磯貝尚明(宇都宮大学)
Discussion and Closing (17:00-17:15)
[発表者募集] (終了しました)
本勉強会で,論文を報告してくれる方を募集します.
発表していただける方は,次のアドレスに電子メールをお送りください.
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )
メール件名:SOUPS読破会発表申込
内容:
1:氏名
2:メールアドレス
3:所属(会社名等、学生の場合は学校名)
4:希望する論文(第3希望まで) 順次,担当する論文を決定させていただきます.
担当が決まった論文は,担当者よりご連絡さしあげ,本ページ上でもアナウンスいたします.
[参加申し込みについて]
件名を「参加申込」として,次のアドレスに電子メールをお送りください. (メールは自動返信ではないので、すぐにはお手元に届きません。)
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )
メール件名:参加申込
送信内容:
1:氏名
2:所属(会社名等、学生の場合は学校名)
3:メールアドレス
4:SPT研究会会員・非会員の別
参加申込み〆切:10月2日(火)
[お知らせ]
・当日は,SOUPS2012で発表された論文は配布しませんので,各自でご準備ください.
・終了後は懇親会を予定しております。
研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします.
学会員の方の登録費は3,150円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります.
なお,非会員の方でも研究会登録することができます.
その場合の研究会登録費は,4,150円です.
10/2までに研究会登録の申込をいただいた方は,今回のイベントの参加費が無料になります.
LAST UPDATE 2012.09.25
SOUPS2011発表論文をものすごい勢いで読破する会
去る7月20日~22日に米国カーネギーメロン大学で開催されましたSymposium On Usable Privacy and Security (SOUPS2011)の発表論文を, 1日で読破するための勉強会を開催いたします.SOUPS2011ではヒューマンコンピュータ
インタラクション, セキュリティ,及びプライバシに関する研究内容が発表されました.
本勉強会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本勉強会に参加することで,
SOUPS2011で発表された15論文全て を把握できるだけでなく,興味のある論文を確認することがきます.
発表につきましては,1件につき15分発表および5分質疑応答を予定しております.
SOUPS2011で発表された論文はSOUPS2011ホームページのプログラムから取得する事が出来ます.
(SOUPS2011 ホームページURL:http://cups.cs.cmu.edu/soups/2011/)
詳しい内容につきましては,別途SPTホームページにてア ナウンス致します.
(SPTホームページURL:http://www.sig-spt.org/)
[開催要項]
日時:平成23年10月12日(水)10:00~
会場:SECOM本社 セコムホール
住所: 〒150-0001 東京都渋谷区神宮前1-5-1
場所:SECOM本社 セコムホール
〒150-0001 東京都渋谷区神宮前1-5-1
JR山手線「原宿」駅(竹下口改札) 徒歩5分
東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分
主催:情報処理学会 情報セキュリティ心理学とトラスト研究会 (SPT)
参加費:研究会会員および発表者は無料
研究会非会員:5,000円(資料代含む)
当日は,SOUPS2011で発表された論文は配布しませんので,各自でご準備ください.
終了後は懇親会を予定しております。
[プログラム]
開会の挨拶 (10:00-10:05)
SOUPS2011について 村山優子(岩手県立大学)
Session 1: Authentication (10:05-11:05)
(1)What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID
Authors:San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey and Konstantin Beznosov
報告者:高田 哲司(電気通信大)
(2)Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior
Authors:Toni Perkovic, Asma Mumtaz, Yusra Javed, Shujun Li, Syed Ali Khayam and Mario Cagalj
報告者:"水戸 和(セコム)
(3)Shoulder Surfing Defence for Recall-based Graphical Passwords
Authors:Nur Haryani Zakaria, David Griffiths, Sacha Brostoff and Jeff Yan
報告者:長谷川 まどか(宇都宮大)
Session 2: SOUPS du jour (11:20-12:20)
(4)Heuristics for Evaluating IT Security Management Tools
Authors:Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas and Konstantin Beznosov
報告者:藤原 康宏(岩手県立大学)
(5)Smartening the Crowds: Computational Techniques for Improving Human Verification to Fight Phishing Scams
Authors:Gang Liu, Guang Xiang, Bryan A. Pendleton, Jason I. Hong and Wenyin Liu
報告者:山本 太朗(NTT)
(6)Reciprocity Attacks
Authors:Feng Zhu, Sandra Carpenter, Ajinkya Kulkarni and Swapna Kolimi
報告者:西垣 正勝(静岡大学)
Session 3: Privacy on Social Network Sites (13:30-14:30)
(7)"I regretted the minute I pressed share": A Qualitative Study of Regrets on Facebook
Authors:Yang Wang, Gregory Norcie, Saranga Komanduri, Pedro Giovanni Leon,
Lorrie Faith Cranor and Alessandro Acquisti
報告者:上松 晴信(静岡大学)
(8)ROAuth: Recommendation Based Open Authorization
Authors:Mohamed Shehab, Said Marouf and Christopher Hudel
報告者:金岡 晃(筑波大学)
(9)Privacy: Is There An App For That?
Authors:Jennifer King, Airi Lampinen and Alex Smolen
報告者:Bongkot Jenjarrussakul(東京大学)
Session 4: Perceptions of Privacy and Security (14:45-15:45)
(10)Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage
Authors:Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru and Srdjan Capkun
報告者:佐古 和恵(NEC)
(11)Eyeing your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy
Authors:Roman Schlegel, Apu Kapadia and Adam J. Lee
報告者:西岡 大(岩手県立大学)
(12)Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It
Authors:Alex Braunstein, Laura Granka and Jessica Staddon
報告者:西岡 大(岩手県立大学)
Sesion 5: Security Warnings (16:00-17:00)
(13)A Brick Wall, a Locked Door, and a Bandit: Promoting A Physical Security Metaphor For Firewall Warnings
Authors:Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang and Konstantin Beznosov
報告者:藤原 康宏(岩手県立大学)
(14)Using Data Type Based Security Alert Dialogs to Raise Online Security Awareness
Authors:Max-Emanuel Maurer, Alexander De Luca and Sylvia Kempe
報告者:名坂 康平(静岡大学)
(15)On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings
Authors:Andreas Sotirakopoulos, Kirstie Hawkey and Konstantin Beznosov
報告者:金岡 晃(筑波大学)
LAST UPDATE 2011.10.11