Abstract is missing.
- When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resourcesChristopher Thompson, Maritza L. Johnson, Serge Egelman, David Wagner, Jennifer King. 1 [doi]
- Formal definitions for usable access control rule sets from goals to metricsMatthias Beckerle, Leonardo A. Martucci. 2 [doi]
- CASA: context-aware scalable authenticationEiji Hayashi, Sauvik Das, Shahriyar Amini, Jason I. Hong, Ian Oakley. 3 [doi]
- Retrospective privacy: managing longitudinal privacy in online social networksOshrat Ayalon, Eran Toch. 4 [doi]
- Confused Johnny: when automatic encryption leads to confusion and mistakesScott Ruoti, Nathan Kim, Ben Burgon, Timothy W. van der Horst, Kent E. Seamons. 5 [doi]
- Your attention please: designing security-decision UIs to make genuine risks harder to ignoreCristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W. Reeder, Manya Sleeper, Julie S. Downs, Stuart E. Schechter. 6 [doi]
- What matters to users?: factors that affect users' willingness to share information with online advertisersPedro Giovanni Leon, Blase Ur, Yang Wang 0005, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, Lorrie Faith Cranor. 7 [doi]
- Do not embarrass: re-examining user concerns for online tracking and advertisingLalit Agarwal, Nisheeth Shrivastava, Sharad Jaiswal, Saurabh Panjwani. 8 [doi]
- Sleights of privacy: framing, disclosures, and the limits of transparencyIdris Adjerid, Alessandro Acquisti, Laura Brandimarte, George Loewenstein. 9 [doi]
- Modifying smartphone user locking behaviorDirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, Charles R. Crowell, John D'Arcy. 10 [doi]
- Exploring the design space of graphical passwords on smartphonesFlorian Schaub, Marcel Walch, Bastian Könings, Michael Weber 0001. 11 [doi]
- "Little brothers watching you": raising awareness of data leaks on smartphonesRebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, Carolyn Nguyen. 12 [doi]
- On the ecological validity of a password studySascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith. 13 [doi]
- Usability and security evaluation of GeoPass: a geographic location-password schemeJulie Thorpe, Brent MacRae, Amirali Salehi-Abari. 14 [doi]
- Memory retrieval and graphical passwordsElizabeth Stobert, Robert Biddle. 15 [doi]