Abstract is missing.
- Risks of Mobile Ambient Sensors and User Awareness, Concerns, and PreferencesMaryam Mehrnezhad, Christodoula Makarouna, Dante Gray. 1-13 [doi]
- SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature ReviewMaria Lamond, Karen Renaud, Lara Wood, Suzanne Prior. 14-27 [doi]
- What Cookie Consent Notices Do Users Prefer: A Study In The WildAshutosh Kumar Singh, Nisarg Upadhyaya, Arka Seth, Xuehui Hu, Nishanth Sastry, Mainack Mondal. 28-39 [doi]
- "I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemicFiona Westin, Kalpana Hundlani, Sonia Chiasson. 40-52 [doi]
- ENAGRAM: An App to Evaluate Preventative Nudges for InstagramNicolás E. Díaz Ferreyra, Sina Ostendorf, Esma Aïmeur, Maritta Heisel, Matthias Brand. 53-63 [doi]
- Exploring Deceptive Design Patterns in Voice InterfacesKentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner. 64-78 [doi]
- Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate ProblemsCecilia Loureiro-Koechlin, José-Rodrigo Córdoba-Pachón, Lynne M. Coventry, Soteris Demetriou, Charles Weir. 79-84 [doi]
- Shoulder Surfing through the Social Lens: A Longitudinal Investigation & Insights from an Exploratory Diary StudyHabiba Farzand, Karola Marky, Mohamed Khamis. 85-97 [doi]
- Privacy Lessons Learnt from Deploying an IoT Ecosystem in the HomeJacob Abbott, Jayati Dev, DongInn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, L. Jean Camp. 98-110 [doi]
- Vision: Usable Privacy for XR in the Era of the MetaverseChris Warin, Delphine Reinhardt. 111-116 [doi]
- Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow ExplorationMohammad Tahaei, Julia Bernd, Awais Rashid. 117-130 [doi]
- Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation ErrorsMartin Ukrop, Michaela Balázová, Pavol Zácik, Eric Vincent Valcík, Vashek Matyas. 131-144 [doi]
- Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits?Maryam Mehrnezhad, Laura Shipp, Teresa Almeida, Ehsan Toreini. 145-150 [doi]
- Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoptionDawn Branley-Bell, Lynne M. Coventry, Pam Briggs. 151-159 [doi]
- Phishing with Malicious QR CodesFilipo Sharevski, Amy Devine, Emma Pieroni, Peter Jachim. 160-171 [doi]
- "It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 AuthenticatorMarkus Keil, Philipp Markert, Markus Dürmuth. 172-188 [doi]
- Meaningful Context, a Red Flag, or Both? Preferences for Enhanced Misinformation Warnings Among US Twitter UsersFilipo Sharevski, Amy Devine, Peter Jachim, Emma Pieroni. 189-201 [doi]
- Caring About IoT-Security - An Interview Study in the Healthcare SectorMarco Gutfleisch, Markus Schöps, Jonas Hielscher, Mary Cheney, Sibel Sayin, Nathalie Schuhmacher, Ali Mohamad, M. Angela Sasse. 202-215 [doi]
- Investigating the Effectiveness of Personalized Content in the Form of Videos When Promoting a TOR BrowserYusuf Albayram, David Suess, Yassir Yaghzar Elidrissi. 216-232 [doi]