Abstract is missing.
- Linguistic Properties of Multi-word PassphrasesJoseph Bonneau, Ekaterina Shutova. 1-12 [doi]
- Understanding the Weaknesses of Human-Protocol InteractionMarcelo Carlomagno Carlos, Geraint Price. 13-26 [doi]
- High Stakes: Designing a Privacy Preserving RegistryAlexei Czeskis, Jacob Appelbaum. 27-43 [doi]
- Protected LoginAlexei Czeskis, Dirk Balfanz. 44-52 [doi]
- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area NetworksZheng Dong. 53-67 [doi]
- A Conundrum of Permissions: Installing Applications on an Android SmartphonePatrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall. 68-79 [doi]
- Methodology for a Field Study of Anti-malware SoftwareFanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez, Sonia Chiasson, Anil Somayaji. 80-85 [doi]
- My Privacy Policy: Exploring End-user Specification of Free-form Location Access RulesSameer Patil, Yann Le Gall, Adam J. Lee, Apu Kapadia. 86-97 [doi]
- Spamming for Science: Active Measurement in Web 2.0 Abuse ResearchAndrew G. West, Pedram Hayati, Vidyasagar Potdar, Insup Lee. 98-111 [doi]
- A Refined Ethical Impact Assessment Tool and a Case Study of Its ApplicationMichael Bailey, Erin Kenneally, David Dittrich. 112-123 [doi]
- It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit OriginSerge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart E. Schechter. 124-132 [doi]
- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?Ross Anderson. 133-135 [doi]
- Ethical and Secure Data Sharing across BordersJosé M. Fernandez, Andrew S. Patrick, Lenore D. Zuck. 136-140 [doi]