Abstract is missing.
- Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German WebsitesChiara Krisam, Heike Dietmann, Melanie Volkamer, Oksana Kulyk. 1-8 [doi]
- Microsoft Office Macro Warnings: A Design Comedy of Errors with Tragic Security ConsequencesMarco Gutfleisch, Maximilian Peiffer, Selim Erk, Martina Angela Sasse. 9-22 [doi]
- Usable Security and Aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of useFiona Carroll. 23-28 [doi]
- Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data AnalysesFarzaneh Karegar, Simone Fischer-Hübner. 29-35 [doi]
- Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening MethodsTenga Matsuura, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori. 36-47 [doi]
- Plug-and-Play: Framework for Remote Experimentation in Cyber SecurityKlaudia Krawiecka, Jack Sturgess, Alina Petrova, Ivan Martinovic. 48-58 [doi]
- SoK: Human, Organizational, and Technological Dimensions of Developers' Challenges in Engineering Secure SoftwareAzadeh Mokhberi, Konstantin Beznosov. 59-75 [doi]
- Vision: Developing a Broad Usable Security & Privacy QuestionnaireFranziska Herbert, Florian M. Farke, Marvin Kowalewski, Markus Dürmuth. 76-82 [doi]
- Vision: Security-Usability Threat Modeling for Industrial Control SystemsKaren Li, Awais Rashid, Anne Roudaut. 83-88 [doi]
- Comparing the Effectiveness of Text-based and Video-based Delivery in Motivating Users to Adopt a Password ManagerYusuf Albayram, John Liu, Stivi Cangonj. 89-104 [doi]
- Finding Secret Treasure? Improving Memorized Secrets Through GamificationKatrin Hartwig, Atlas Englisch, Jan Pelle Thomson, Christian Reuter 0001. 105-117 [doi]
- Vision: Computing and Authentication Practicesin Global Oil and Gas FieldsMary Rose Martinez, Shriram Krishnamurthi. 118-123 [doi]
- Vision: What Johnny learns about Password Security from Videos posted on YouTubeMathieu Christmann, Peter Mayer, Melanie Volkamer. 124-128 [doi]
- Peeking Into the Black Box: Towards Understanding User Understanding of E2EELeonie Schaewitz, David Lakotta, M. Angela Sasse, Nikol Rummel. 129-140 [doi]
- Nudge or Restraint: How do People Assess Nudging in Cybersecurity - A Representative Study in GermanyKatrin Hartwig, Christian Reuter 0001. 141-150 [doi]
- Replicating a Study of Ransomware in GermanyAnna-Marie Ortloff, Maike Vossen, Christian Tiefenau. 151-164 [doi]
- Replication: Measuring User Perceptions in Smartphone Security and Privacy in GermanyMaxim Schessler, Eva Gerlitz, Maximilian Häring, Matthew Smith 0001. 165-179 [doi]
- What breach? Measuring online awareness of security incidents by studying real-world browsing behaviorSruti Bhagavatula, Lujo Bauer, Apu Kapadia. 180-199 [doi]
- Understanding Young People's Experiences of CybersecurityJames Nicholson, Julia Terry, Helen Beckett, Pardeep Kumar. 200-210 [doi]
- Using a Participatory Toolkit to Elicit Youth's Workplace Privacy PerspectivesWilliam Berkley Easley, S. Nisa Asgarali-Hoffman, Amy Hurst, Helena M. Mentis, Foad Hamidi. 211-222 [doi]
- Examining Power Use and the Privacy Paradox between Intention vs. Actual Use of Mobile ApplicationsMoses Namara, Reza Ghaiumy Anaraky, Pamela J. Wisniewski, Xinru Page, Bart P. Knijnenburg. 223-235 [doi]
- Vision: Stewardship of Smart Devices Security for the Aging PopulationLorenzo De Carli, Indrakshi Ray, Erin Solovey. 236-241 [doi]