| 1 | -- | 2 | E. Eugene Schultz. What infosec changes are likely to result from the recent US election? |
| 14 | -- | 25 | Chris Roberts. Biometric attack vectors and defences |
| 31 | -- | 33 | Danny Bradbury. Decoding digital rights management |
| 35 | -- | 0 | Steven Furnell. IFIP workshop - Information security culture |
| 36 | -- | 43 | Lynette Drevin, Hennie A. Kruger, Tjaart Steyn. Value-focused assessment of ICT security awareness in an academic environment |
| 44 | -- | 55 | Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski. Bridging the gap between general management and technicians - A case study on ICT security in a developing country |
| 56 | -- | 62 | A. B. Ruighaver, S. B. Maynard, S. Chang. Organisational security culture: Extending the end-user perspective |
| 63 | -- | 72 | Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen. A video game for cyber security training and awareness |
| 73 | -- | 80 | Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson. Phishing for user security awareness |
| 81 | -- | 93 | Stanley R. M. Oliveira, Osmar R. Zaïane. A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration |
| 94 | -- | 97 | Rongxing Lu, Zhenfu Cao. Simple three-party key exchange protocol |