Abstract is missing.
- The Ever Changing Threat Model: A Social-Technical PerspectiveJean Everson Martina. 1 [doi]
- Applying the Lost-Letter Technique to Assess IT Risk BehaviourElmer Lastdrager, Lorena Montoya, Pieter H. Hartel, Marianne Junger. 2-9 [doi]
- How Privacy Flaws Affect Consumer PerceptionSadia Afroz, Aylin Caliskan Islam, Jordan Santell, Aaron Chapin, Rachel Greenstadt. 10-17 [doi]
- Transparency Enhancing Tools (TETs): An OverviewMilena Janic, Jan Pieter Wijbenga, Thijs Veugen. 18-25 [doi]
- Toward an Ontology for Insider Threat Research: Varieties of Insider Threat DefinitionsDavid A. Mundie, Sam Perl, Carly L. Huth. 26-36 [doi]
- American and Indian Conceptualizations of PhishingRucha Tembe, Kyung Wha Hong, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Christopher M. Kelley. 37-45 [doi]
- Adopting the CMU/APWG Anti-phishing Landing Page Idea for GermanyMelanie Volkamer, Simon Stockhardt, Steffen Bartsch, Michaela Kauer. 46-52 [doi]