Proceedings of the second symposium on Usable privacy and security

  • Authors:
  • Lorrie Faith Cranor

  • Affiliations:
  • Carnegie Mellon University

  • Venue:
  • SOUPS '06 Proceedings of the second symposium on Usable privacy and security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Welcome to the Symposium On Usable Privacy and Security! This is the second installment of what we hope will be an annual event for many years to come. SOUPS 2005 was the first refereed technical conference to bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. Attendees reported that they valued both the formal sessions and the informal interactions they had with other participants. Thus we have tried to develop a program for SOUPS 2006 that builds on the success of SOUPS 2005, including a similar mix of sessions.This year's program features 14 technical papers, a workshop, 23 posters, a panel, three discussion sessions, and an invited talk. We received 39 paper submissions. Each paper was refereed by at least three members of the refereed papers committee, and through an online discussion process the committee selected 14 papers for presentation and publication.A panel and follow-up discussion session on security user studies at SOUPS 2005 provoked so much interest and discussion that SOUPS 2006 features a full day workshop on security user studies. The workshop focuses on the design, implementation and challenges of conducting security user studies. The workshop will be an opportunity for researchers to share experiences, materials, and ideas, and for newcomers to learn about problems and best practices.This year's panel addresses the phishing problem, which has been the focus of much discussion in the media and in technical forums. At SOUPS we will discuss the various approaches that have been proposed to stop or blunt phishing attacks and debate which approach or approaches are most worthy of an investment of time, skill, and money. The program also features an invited talk by Austin Hill that will provide insights on usable security from a corporate perspective.Finally, the SOUPS 2006 program includes three parallel "discussion" sessions, featuring moderated discussion on a topic of interest to attendees. Discussion sessions have been organized around the following topics: "Johnny Can Obfuscate: Beyond Mother's Maiden Name," "Teaching Usable Privacy and Security," and "Policy Management: A Central Theme for Usable Privacy and Security Systems." Other discussion sessions may be added depending on interest. We hope the informal, small group format will lead to lively and productive interactions.