6 - 9 pm: Dinner reception at Microsoft (901 K St. NW, 11th
floor) - a 5-minute walk from AAAS
PANEL
Will No Humans be Harmed? The argument against IRB approval for some human subjects research
The role of the Institutional Review Board is to ensure that human subjects protections are in place in research. The principles and guidelines that guide IRBs in their processes were set forth in the Belmont Report in 1979. As the medium of conducting research has evolved, is the IRB holding back usable privacy and security research and is it still equipped to properly evaluate the risks of our protocols? Are we any further along than the previously troublesome "trust me" model?
This panel will explore the ethics of gathering data online via public postings, working with data (both identifiable and anonymized), and observational research.
- Maritza Johnson, Columbia University, Moderator
- Michael Zimmer, University of Wisconsin-Milwaukee
- Simson Garfinkel, Naval Postgraduate School
- Doug Maughan, DHS Science & Technology Directorate
Michael Zimmer, PhD, is an assistant professor in the School of
Information Studies at the University of Wisconsin-Milwaukee, and
co-director of the Center for Information Policy Research. With a background in new media and Internet studies, the philosophy of technology, and information policy & ethics, Zimmer’s research focuses on the ethical dimensions of new media and information technologies, with particular interest in privacy, social media, internet research ethics, and values-in-design.
Simson L. Garfinkel is an Associate Professor at the Naval Postgraduate School. Based in Arlington VA, Garfinkel's research interests include computer forensics, the emerging field of usability and security, personal information management, privacy, information policy and terrorism. He holds six US patents for his computer-related research and has published dozens of journal and conference papers in security and computer forensics.
Garfinkel is the author or co-author of fourteen books on computing. He is perhaps best known for his book Database Nation: The Death of Privacy in the 21st Century. Garfinkel's most successful book, Practical UNIX and Internet Security (co-authored with Gene Spafford), has sold more than 250,000 copies and been translated into more than a dozen languages since the first edition was published in 1991. Garfinkel received three Bachelor of Science degrees from MIT in 1987, a Master's of Science in Journalism from Columbia University in 1988, and a Ph.D. in Computer Science from MIT in 2005.
Dr. Douglas Maughan is a Program Manager in Homeland Security Advanced Research Projects Agency (HSARPA) within the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). Dr. Maughan is directing the Cyber Security Research and Development activities at HSARPA. Prior to his appointment at DHS, Dr. Maughan was a Program Manager in the Advanced Technology Office (ATO) of the Defense Advanced Research Projects Agency (DARPA) in Arlington, Virginia. His research interests and related programs were in the areas of networking and information assurance. Prior to his appointment at DARPA, Dr. Maughan worked for the National Security Agency (NSA) as a senior computer scientist and led several research teams performing network security research. Dr. Maughan received Bachelor’s Degrees in Computer Science and Applied Statistics from Utah State University, a Masters degree in Computer Science from Johns Hopkins University, and a PhD in Computer Science from the University of Maryland, Baltimore County (UMBC).
POSTERS
Anti-Phishing system using footprint-sharing web site
Eri Otsuka (Kanagawa Institute of Technology Japan)
Ayaka Miyazawa (Kanagawa Institute of Technology Japan
Manabu Okamoto (Kanagawa Institute of Technology Japan)
CommonTerms - Magnifying the Fine Print
Pär Lannerö (Metamatrix AB)
Gregg Bernstein (MailChimp)
Preliminary Investigation of Gesture-Based Password: Integrating Additional User Behavioral Features
Lakshmidevi Sreeramareddy (Towson University)
Jinjuan Feng (Towson University)
Andrew Sears (Rochester Institute of Technology)
Towards Measuring Warning Readability
Marian Harbach (Dept. of Computer Science, Leibniz
Universitaet, Hannover, Germany)
Sascha Fahl (Dept. of Computer Science, Leibniz
Universitaet, Hannover, Germany)
Thomas Muders (Dept. of Computer Science, Leibniz
Universitaet, Hannover, Germany)
Matthew Smith (Dept. of Computer Science, Leibniz
Universitaet, Hannover, Germany)
On Design of Audio Instructions for Multisensory Authentication for
Portable Touchscreen Device
Madoka Hasegawa (Utsunomiya University)
Naoaki Isogai (Utsunomiya University)
Shigeo Kato (Utsunomiya University)
Attitudes to IT-Security When Using a Smartphone
Zinaida Benenson (University of Erlangen-Nuremberg)
Nadina Hintz (University of Erlangen-Nuremberg)
Olaf Kroll-Peters (EnBW AG, Karlsruhe)
Matthias Krupp (P.M. Belz GmbH, Stuttgart)
Friendship in German Online Social Networks
Nadina Hintz (University of Erlangen-Nuremberg)
Zinaida Benenson (University of Erlangen-Nuremberg)
Thorsten Strufe (TU Darmstadt)
Cellphones and Punishment: Encouraging Secure Mobile Behavior Through Morality
Dirk Van Bruggen (University of Notre Dame)
Shu Liu (University of Notre Dame)
Aaron Striegel (University of Notre Dame)
Chuck Crowell (University of Notre Dame)
John D'Arcy (University of Notre Dame)
Is a Picture Worth a Thousand Alerts?
Nicklaus A. Giacobe (The Pennsylvania State University)
User perception of usability and security of a mobile payment system
Hanul Sieger (QU Labs, Telekom Innovation Laboratories, TU Berlin)
Niklas Kirschnick (QU Labs, Telekom Innovation
Laboratories, TU Berlin)
Sebastian Möller (QU Labs, Telekom Innovation
Laboratories, TU Berlin)
Usability Evaluation of Gesture-Based Authentication Using a Mobile Phone
Niklas Kirschnick (Quality and Usability Lab, Telekom
Innovation Laboratories, Technische Universität Berlin)
Benjamin Müller (Quality and Usability Lab, Telekom
Innovation Laboratories, Technische Universität Berlin)
Sebastian Möller (Quality and Usability Lab, Telekom
Innovation Laboratories, Technische Universität Berlin)
Towards improving usability of access certification interfaces
Pooya Jaferian (University of British Columbia)
Hootan Rashtian (University of British Columbia)
Konstantin Beznosov (University of British Columbia)
Examining Confidant Disclosures through Facebook Apps and Tagging
Kim RoSser (UNC Charlotte)
Emmanuel Bello-Ogunu (UNC Charlotte)
Pamela Karr Wisniewski (UNC Charlotte)
Visualization of user’s end-to-end security risks
Takeshi Takahashi (National Institute of Information and
Communications Technology)
Shin’ichiro Matsuo (National Institute of Information and
Communications Technology)
Akira Kanaoka (National Institute of Information and Communications
Technology)
Keita Emura (National Institute of Information and Communications Technology)
Yuuki Takano (National Institute of Information and Communications Technology)
Posters Showcasing Usable Privacy and Security Papers Published in the
Past Year at Other Conferences
PhorceField: A Phish-Proof Password Ceremony (ACSAC 2011)
Michael Hart (Symantec)
Claude Castille (Google)
Manoj Harpalani (Amazon)
Jonathon Toohill (Stony Brook University)
Rob Johnson (Stony Brook University)
Third-Party Apps on Facebook: Privacy and the Illusion of Control (CHIMIT 2011)
Na Wang (The Pennsylvania State University)
Heng Xu (The Pennsylvania State University)
Jens Grossklags (The Pennsylvania State University)
ASIDE: IDE Support for Web Application Security (ACSAC 2011)
Jing Xie (UNC Charlotte)
Bill Chu (UNC Charlotte)
Heather Richter Lipford (UNC Charlotte)
John T. Melton (UNC Charlotte)
Social Authentication: Harder than it Looks (FC 2012)
Hyoungshick Kim (University of British Columbia)
John Tang (University of Cambridge)
Ross Anderson (University of Cambridge)
Tag, you can see it!: using tags for access control in photo sharing (CHI 2012)
Peter F. Klemperer (Carnegie Mellon University)
Yuan Liang (Carnegie Mellon University)
Michelle L. Mazurek (Carnegie Mellon University)
Manya Sleeper (Carnegie Mellon University)
Blase Ur (Carnegie Mellon University)
Lujo Bauer (Carnegie Mellon University)
Lorrie Faith Cranor (Carnegie Mellon University)
Nitin Gupta (Carnegie Mellon University)
Michael K. Reiter (University of North Carolina, Chapel Hill)
The Implications of Offering More Disclosure Choices for Social Location Sharing (CHI 2012)
Karen P. Tang (University of California, Irvine)
Jason I. Hong (Carnegie Mellon University)
Dan P. Siewiorek (Carnegie Mellon University)
Don't bump, shake on it: The exploitation of a popular
accelerometer-based smart phone exchange and its secure replacement (ACSAC 2011)
Ahren Studer (Carnegie Mellon University)
Timothy Passaro (Carnegie Mellon University)
Lujo Bauer (Carnegie Mellon University)
How Does Your Password Measure Up? The Effect of Strength Meters on
Password Creation (USENIX Security 2012)
Blase Ur (Carnegie Mellon University)
Patrick Gage Kelley (Carnegie Mellon University)
Saranga Komanduri (Carnegie Mellon University)
Joel Lee (Carnegie Mellon University)
Michael Maass (Carnegie Mellon University)
Michelle Mazurek (Carnegie Mellon University)
Timothy Passaro (Carnegie Mellon University)
Richard Shay (Carnegie Mellon University)
Timothy Vidas (Carnegie Mellon University)
Lujo Bauer (Carnegie Mellon University)
Nicolas Christin (Carnegie Mellon University)
Lorrie Faith Cranor (Carnegie Mellon University)
On the need for different security methods on mobile phones (MobileHCI 2011)
Noam Ben-Asher (Carnegie Mellon University)
Niklas Kirschnick (TU Berlin)
Hanul Sieger (TU Berlin)
Joachim Meyer (Ben Gurion University)
Sebastian Möller (TU Berlin)
Security and Privacy Considerations in Digital Death (NSPW 2011)
Michael E. Locasto (University of Calgary)
Mike Massimi (University of Toronto)
Peter J. DePasquale (The College of New Jersey)
A Conundrum of Permissions: Installing Applications on an Android Smartphone (USEC 2012)
Patrick Gage Kelley (Carnegie Mellon University)
Sunny Consolvo (University of Washington)
Lorrie Faith Cranor (Carnegie Mellon University)
Jaeyeon Jung (Microsoft Research)
Norman Sadeh (Carnegie Mellon University)
David Wetherall (University of Washington)
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding
Codewords in Motion (USENIX Security 2012)
Yi Xu (University of North Carolina at Chapel Hill)
Gerardo Reynaga (Carleton University)
Sonia Chiasson (Carleton University)
Jan-Micheal Frahm (University of North Carolina at Chapel Hill)
Fabian Monrose (University of North Carolina at Chapel Hill)
P. C. van Oorschot (Carleton University)
Security, Privacy and Usability Requirements for Federated Identity (W2SP 2012)
Michael Hackett (Dalhousie University)
Kirstie Hawkey (Dalhousie University)
SOUPS 2012 is sponsored by Carnegie Mellon CyLab