Meeting 1 - Usable Encryption and Secure Messaging #
- Readings covered in lecture
- Alma Whitten and J.D. Tygar. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of USENIX Security 1999]
- Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith. Obstacles to the Adoption of Secure Communication Tools In Proceedings of IEEE SP 2017.
- Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42, 12 (December 1999), 40-46.
- James Mickens. This World of Ours. USENIX ;login:, January 2014.
- Additional Readings (choose one of these for your response)
- Omer Akgul, Ruba Abu-Salma, Wei Bai, Elissa M. Redmiles, Michelle L. Mazurek, and Blase Ur. From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging. In WPES 2021: Workshop on Privacy in the Electronic Society. November 2021.
- Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv and Michelle L. Mazurek. Strategies and Perceived Risks of Sending Sensitive Documents. 30th USENIX Security Symposium (USENIX Security 21) (Sec’21). 2021
- Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons. A Comparative Usability Study of Key Management in Secure Email. In proceedings of 2018 SOUPS (SOUPS’18).
- Ada Lerner, Eric Zeng, and Franziska Roesner. Confidante: Usable encrypted email: A case study with lawyers and journalists. 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017.
- Matthias Fassl and Katharina Krombholz. Why I Can’t Authenticate — Understanding the Low Adoption of Authentication Ceremonies with Autoethnography. In Proceedings of CHI 2023.
Meeting 2 - Methods and Experimental Design #
- Readings Covered in Class
- Lazar et al. Chapter 3: Experimental Design
- Lazer et al. Chapter 4: Statistical Analysis
- Lazer et al. Chapter 5: Surveys
- Lazar et al. Chapter 8: Interviews and Focus Groups
- Lazer et al. Chapter 11: Analyzing Qualitative Data
- There are no additional readings or responses required
Meeting 3 - Privacy Measurement #
- Readings Covered in Class
- S. Warren and L. Brandeis. The Right to Privacy. Harver Law Review. 1890.
- Daniel Solove. I’ve got nothing to hide and other misunderstandings of privacy. San Diego Law Review. 2007.
- Naresh K. Malhotra, Sung S. Kim, James Agarwal. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research. Vol 15. No 4. 2004.
- Additional Readings (choose one of these for your response)
- Oshrat Ayalon and Eran Toch. Evaluating Users’ Perceptions about a System’s Privacy: Differentiating between Social and Institutional Aspects. SOUPS 2019.
- Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Faith Cranor. Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration. PETS 2018.
- Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte and Alessandro Acquisti. Would a Privacy Fundamentalist Sell Their DNA for $1000…If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. SOUPS 2014.
- Rakibul Hasan, Rebecca Weil, Rudolf Siegel, Katharina Krombholz. A Psychometric Scale to Measure Individuals’ Value of Other People’s Privacy (VOPP). CHI 2023.
Meeting 4 - Passwords #
- Topic: Passwords and Password Managers
- Readings Covered in Lecture
- Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. Passwords and the evolution of imperfect authentication. Communications of the ACM 58, 7 (July 2015), 78–87.
- Joseph Bonneau. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In Proceedings of IEEE SP 2012.
- Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur. Measuring Password Guessability for an Entire University. In Proceedings of CCS 2013.
- Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. “I Added ‘!’ at the End to Make It Secure”: Observing Password Creation in the Lab. In the proceedings of SOUPS 2015.
- Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes and Sven Bugiel. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. USENIX 2018.
- Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. Why people (don’t) use password managers effectively. SOUPS 2019.
- Additional Readings (choose one of these for your response)
- Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites. Proceedings of the SOUPS 2016.
Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, and Adam J. Aviv. Why Users (Don’t) Use Password Managers at a Large Educational Institution. USENIX 2022- Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, and Adam J. Aviv. “The Same PIN, Just Longer”: On the (In)Security of Upgrading PINs from 4 to 6 Digits. USENIX 2022.
Adam J. Aviv, Devon Budzitowski, and Ravi Kuber. 2015. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android’s Pattern Unlock. In Proceedings of ACSAC 2015.P. Markert, D. V. Bailey, M. Golla, M. Duermuth, and A. J. Aviv. On the Security of Smartphone Unlock PINs. ACM Transactions on Privacy and Security. Volume 24. Issue 4. September 2021.- Kevin Lee, Sten Sjöberg, and Arvind Narayanan. Password policies of most top websites fail to follow best practices. In SOUPS 2022.
- ~~Suood Alroomi and Frank Li. Measuring Website Password Creation Policies At Scale. In CCS 2023. ~~
Collins W. Munyendo, Peter Mayer and Adam J. Aviv. “I Just Stopped Using One and Started Using the Other”: Motivations, Techniques, and Challenges When Switching Password Managers. CCS 2023.
Meeting 5 - Developers as Users #
- Readings covered in class:
- Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl. Stack Overflow Considered Harmful? The Impact of Copy & Paste on Android Application Security
- Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle Mazurek, Christian Stransky. You Get Where You’re Looking For - The Impact of Information Sources on Code Security
- Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith. Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study . ACM Conference on Computer and Communications Security 2017: 311-328
- Pearce, Hammond, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, and Ramesh Karri. “Asleep at the keyboard? assessing the security of github copilot’s code contributions.” In 2022 IEEE Symposium on Security and Privacy (SP), pp. 754-768. IEEE, 2022.
- Additional Readings (choose one of these for your response)
- Klemmer, Jan H., Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr, Carson Powers, Fabio Massacci et al. “Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.” To appear at CCS 2024.
-
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks. Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security, 2020.
Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, Matthew Smith: “If you want, I can store the encrypted password”: A Password-Storage Field Study with Freelance Developers. CHI 2019Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. SOUPS’18
Meeting 6 - Security Warnings and Permissions #
- Readings Covered in Class
- Rob Reeder, Ellen Cram Kowalczyk, and Adam Shostack. Poster: Helping engineers design NEAT security warnings. SOUPS Poster 2011.
- Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008.
- Adrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, and Sunny Consolv. Rethinking Connection Security Indicators. SOUPS 2016.
- Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner:
Android permissions demystified. ACM Conference on Computer and Communications Security 2011. - Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ‘12).
- Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov: Android Permissions Remystified: A Field Study on Contextual Integrity. In proceedings USENIX Security Symposium 2015
- Additional Readings (choose one of these for your response)
- Prange, Sarah, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander De Luca, and Florian Alt. “I do (not) need that Feature!”–Understanding Users’ Awareness and Control of Privacy Permissions on Android Smartphones. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), pp. 453-472. 2024.
-
Tahaei, Mohammad, Ruba Abu-Salma, and Awais Rashid. “Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications.”. CHI 2023.
Devdatta Akhawe and Adrienne Porter Felt. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In Proceedings of USENIX Security 2013.Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good and Jung-Wei Chen. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. SOUPS 2017.Daniel Smullen*, Yuanyuan Feng, Shikun (Aerin) Zhang, and Norman Sadeh. The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. PoPETS 2020.Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelmanc. 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. In proceedings of USENIX Security 2019.
Meeting 7 - Spam, Phishing, and Ethics #
- Readings Covered in Class
- The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Departmnet of Homeland Security. 2012. (No need to write a report, but MUST read)
- Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxson, V., & Savage, S. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the CCS. 2008.
- Rachna Dhamija, J. D. Tygar, and Marti Hearst. Why phishing works. CHI 2006.
- Rick Wash and Molly M. Cooper. Who Provides Phishing Training? Facts, Stories, and People Like Me. In Proceedings of CHI 2018.
- Additional Readings (choose one of these for your response)
- Daniele Lain, Kari Kostiainen, Srdjan Čapkun. Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. IEEE S&P 2022.
-
Tabassum, Sarah, Cori Faklaris, and Heather Richter Lipford. What Drives {SMiShing} Susceptibility? A {US}. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), pp. 393-411. 2024.
Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage. Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Sec’ 2011.Amber van der Heijden and Luca Allodi. Cognitive Triaging of Phishing Attacks. In proceedings of USENIX Sec’ 2019.Huahong Tu, Adam Doupé, Ziming Zhao,Gail-Joon Ahn. Users Really Do Answer Telephone Scams. In proceedings of USENIX Sec’ 2019.Kholoud Althobaiti, Adam D G Jenkins, and Kami Vaniea. A Case Study of Phishing Incident Response in an Educational Organization. CSCW 2021.
Meeting 8 - Human-centered privacy design and engineering #
- Readings Covered in Class
- We Value Your Privacy … Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy. Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten HolzNDSS 2019: Network and Distributed Systems Security Symposium
- (Un)informed Consent: Studying GDPR Consent Notices in the Field. Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz. CCS 2019: ACM Conference on Computer and Communications Security
- Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches. Peter Mayer, Yixin Zou, Byron M. Lowens, Hunter A. Dyer, Khue Le, Florian Schaub, Adam J. AvivTOCHI: ACM Transactions on Computer-Human Interaction. 2023
- Nudging Users to Change Breached Passwords Using the Protection Motivation Theory. Yixin Zou, Khue Le, Peter Mayer, Alessandro Acquisti, Adam J. Aviv, Florian Schaub. ToCHI: ACM Transactions on Computer-Human Interaction. ACM 2024.
- Designing Effective Privacy Notices and Controls. Florian Schaub, Rebecca Balebako, Lorrie Cranor IEEE Internet Computing 2017
- Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising. Jane Im, Ruiyi Wang, Weikun Lyu, Nick Cook, Hana Habib, Lorrie Faith Cranor, Nikola Banovic, Florian Schaub. CHI 2023: ACM CHI Conference on Human Factors in Computing Systems
- Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer. USENIX Security Symposium 2018
- Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts. Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Joel Reidenberg, Norman Sadeh, Florian Schaub. CHI 2021: ACM Conference on Human Factors in Computing Systems
- Additional Readings (choose one of these for your response)
- Mathur, Arunesh, Mihir Kshirsagar, and Jonathan Mayer. “What makes a dark pattern… dark? Design attributes, normative considerations, and measurement methods.” In Proceedings of the 2021 CHI conference on human factors in computing systems, pp. 1-18. 2021.
- Feng, Yuanyuan, Yaxing Yao, and Norman Sadeh. “A design space for privacy choices: Towards meaningful privacy control in the internet of things.” In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1-16. 2021.
Meeting 9 - Bias in AI #
- Readings Covered in Class
- B. Burgess, A. Ginsberg, E. W. Felten, and S. Cohney. Watching the watchers: bias and vulnerability in remote proctoring software. USENIX Security 22, 2022.
- Deborah R. Yoder-Himes, Alina Asif, Kaelin Kinney, Tiffany J. Brandt, Rhiannon E. Cecil, Paul R. Himes, Cara Cashon, Rachel M. P. Hopp, and Edna Ross. Racial, skin tone, and sex disparities in automated proctoring software. Front. Educ. 7, 2022.
- Nina Grgic-Hlaca, Elissa M. Redmiles, Krishna P. Gummadi, and Adrian Weller. Human Perceptions of Fairness in Algorithmic Decision Making: A Case Study of Criminal Risk Prediction. WWW ’18, 2018.
- M. Jakesch, Z. Buçinca, S. Amershi, and A. Olteanu. How Different Groups Prioritize Ethical Values for Responsible AI. FAccT ’22, 2022.
- Laura Weidinger, Jonathan Uesato, Maribeth Rauh, Conor Griffin, Po-Sen Huang, John Mellor, Amelia Glaese, Myra Cheng, Borja Balle, Atoosa Kasirzadeh, Courtney Biles, Sasha Brown, Zac Kenton, Will Hawkins, Tom Stepleton, Abeba Birhane, Lisa Anne Hendricks, Laura Rimell, William Isaac, Julia Haas, Sean Legassick, Geoffrey Irving, and Iason Gabriel. Taxonomy of Risks posed by Language Models. FAccT ’22, 2022.
- Jakesch, M., Bhat, A., Buschek, D., Zalmanson, L., & Naaman, M.. Co-Writing with Opinionated Language Models Affects Users’ Views. CHI, 2023.
- Morewedge, C.K., Mullainathan, S., Naushan, H.F. et al. Human bias in algorithm design. Nat Hum Behav 7, 2023.
- Additional Readings (choose one of these for your response)
- Vinitha Gadiraju, Shaun Kane, Sunipa Dev, Alex Taylor, Ding Wang, Emily Denton, and Robin Brewer. 2023. “I wouldn’t say offensive but…”: Disability-Centered Perspectives on Large Language Models. In Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency (FAccT ‘23).
- Shivani Kapania, Oliver Siy, Gabe Clapper, Azhagu Meena SP, and Nithya Sambasivan. 2022. ”Because AI is 100% right and safe”: User Attitudes and Sources of AI Authority in India. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (CHI ‘22).
Meeting 10 - Non-Standard and Unique Groups #
- Readings Covered in Class
- Catherine Barwulor, Allison McDonald, Eszter Hargittai, and Elissa M. Redmiles. 2021. “Disadvantaged in the American-dominated Internet”: Sex, Work, and Technology. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (CHI ‘21). Association for Computing Machinery, New York, NY, USA, Article 563, 1–16.
- McDonald, Allison, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, and Elissa M. Redmiles. “It’s stressful having all these phones”: Investigating Sex Workers’ Safety Goals, Risks, and Practices Online.” In 30th USENIX Security Symposium (USENIX Security 21), pp. 375-392. 2021.
- Vaughn Hamilton, Hanna Barakat, and Elissa M. Redmiles. Risk, Resilience and Reward: Impacts of Shifting to Digital Sex Work. Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 537 (November 2022), 37 pages.
- Vaughn Hamilton, Ananta Soneji, Allison Mcdonald, and Elissa M. Redmiles. 2023. “Nudes? Shouldn’t I charge for these?”: Motivations of New Sexual Content Creators on OnlyFans. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI ‘23).
- Soneji, Ananta, Vaughn Hamilton, Adam Doupé, Allison McDonald, and Elissa M. Redmiles. “I feel physically safe but not politically safe”: Understanding the Digital Threats and Safety Practices of OnlyFans Creators.” In 33rd USENIX Security Symposium (USENIX Security 24), pp. 1-18. 2024.
- Additional Readings (choose one of these for your response)
- Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, and Elissa Redmiles. 2022. Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 358 (November 2022), 39 pages.
- Qin, Lucy, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, and Elissa M. Redmiles. “Did They F*** ing Consent to That?”: Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse.” In 33rd USENIX Security Symposium (USENIX Security 24), pp. 55-72. 2024.
Meeting 11 - Dashboards, Labels, and Privacy Policies #
- Readings Covered in Class
- Florian Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, and Adam J. Aviv. Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google’s My Activity. USENIX 2021.
- Florian M. Farke, David G. Balash, Maximilian Golla, Adam J. Aviv. How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?. PoPETS 2024.
- David G. Balash, Mir Masood Ali, Chris Kanich and Adam J. Aviv. “I would not install an app with this label”: Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). Pgs. 413–432. August 2024.
- Additional Readings
- Yanzi Lin, Jaideep Juneja, Eleanor Birrell, Lorrie Faith Cranor. Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels. PoPETS 2024.
- Emilee Rader, Samantha Hautea, and Anjali Munasinghe, Michigan State University. “I Have a Narrow Thought Process”: Constraints on Explanations Connecting Inferences and Self-Perceptions. SOUS 2020.
Meeting 12 - Accessibility #
- Readings Covered in Class
- Feng, Yuanyuan, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, and Rex Chen. [“Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants.”](https://www.usenix.org/system/files/usenixsecurity24-feng-yuanyuan.pdf() In 33rd USENIX Security Symposium (USENIX Security 24), pp. 2065-2082. 2024.
- Zhao, Yuhang, Yaxing Yao, Jiaru Fu, and Nihan Zhou. “If sighted people know, I should be able to {know:”} Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology.” In 32nd USENIX Security Symposium (USENIX Security 23), pp. 4661-4678. 2023.
- Zhang, Kexin, Elmira Deldari, Yaxing Yao, and Yuhang Zhao. “A diary study in social virtual reality: Impact of avatars with disability signifiers on the social experiences of people with disabilities.” In Proceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 1-17. 2023.
- Additional Readings
- Dosono, Bryan, Jordan Hayes, and Yang Wang. []”I’m Stuck!”: A Contextual Inquiry of People with Visual Impairments in Authentication](https://www.usenix.org/system/files/conference/soups2015/soups15-paper-dosono.pdf). In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp. 151-168. 2015.
- Hayes, Jordan, Smirity Kaushik, Charlotte Emily Price, and Yang Wang. “Cooperative privacy and security: Learning from people with visual impairments and their allies.” In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 1-20. 2019.