Abstract is missing.
- "My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented TechnologiesMaryam Mehrnezhad, Teresa Almeida. 1-14 [doi]
- "It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring SoftwareKazma Chaudhry, Anna-Lena Theus, Hala Assal, Sonia Chiasson. 15-26 [doi]
- Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk CommunicationEhsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Theodore Jensen. 27-47 [doi]
- A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testingKhadija Baig, Daniela Napoli, Sonia Chiasson. 48-67 [doi]
- Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management PlanEhsan Ul Haque, Mohammad Maifi Hasan Khan. 68-85 [doi]
- Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised AccessMatt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry. 86-96 [doi]
- "It's the one thing that makes my life tick": Security Perspectives of the Smartphone EraMatt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry. 97-111 [doi]
- Analysing the Influence of Loss-Gain Framing on Data Disclosure Behaviour: A Study on the Use Case of App Permission RequestsKerstin Bongard-Blanchy, Jean-Louis Sterckx, Arianna Rossi, Anastasia Sergeeva, Vincent Koenig, Salvador Rivas, Verena Distler. 112-125 [doi]
- Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone MalwareArtur Geers, Aaron Ding, Carlos Hernandez Gañán, Simon Parkin. 126-142 [doi]
- Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment ApplicationsUrvashi Kishnani, Naheem Noah, Sanchari Das, Rinku Dewri. 143-157 [doi]
- "Someone Definitely Used 0000": StrategiesDaniel V. Bailey, Collins W. Munyendo, Hunter A. Dyer, Miles Grant, Philipp Markert, Adam J. Aviv. 158-174 [doi]
- Overcoming Theory: Designing Brainwave Authentication for the Real WorldMarkus Röse, Emiram Kablo, Patricia Arias Cabarcos. 175-191 [doi]
- PinchKey: A Natural and User-Friendly Approach to VR User AuthenticationMei Suzuki, Ryo Iijima, Kazuki Nomoto, Tetsushi Ohki, Tatsuya Mori. 192-204 [doi]
- Usable Security Model for Industrial Control Systems - Authentication and Authorisation WorkflowKaren Li, Awais Rashid, Anne Roudaut. 205-217 [doi]
- Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert MonitoringDaiki Ishii, Akira Kanaoka. 218-223 [doi]
- Encouraging Organisational Information Security Incident ReportingFabian Lucas Ballreich, Melanie Volkamer, Dirk Müllmann, Benjamin Maximilian Berens, Elena Marie Häußler, Karen Vera Renaud. 224-236 [doi]
- Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security ChampionsUta Menges, Jonas Hielscher, Laura Kocksch, Annette Kluge, M. Angela Sasse. 237-252 [doi]
- Vision: Supporting Citizens in Adopting Privacy Enhancing TechnologiesShirin Shams, Delphine Reinhardt. 253-259 [doi]
- Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce EnterpriseMarco Gutfleisch, Markus Schöps, Stefan Albert Horstmann, Daniel Wichmann, M. Angela Sasse. 260-276 [doi]
- But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade RoutersGeorge Chalhoub, Andrew Martin. 277-295 [doi]
- Privacy Strategies for Conversational AI and their Influence on Users' Perceptions and Decision-MakingAnna Leschanowsky, Birgit Popp, Nils Peters. 296-311 [doi]
- Vision: What the hack is going on? A first look at how website owners became aware that their website was hackedAnne Hennig, Nhu Thi Thanh Vuong, Peter Mayer 0001. 312-317 [doi]
- Influence of URL Formatting on Users' Phishing URL DetectionMattia Mossano, Oksana Kulyk, Benjamin Maximillian Berens, Elena Marie Häußler, Melanie Volkamer. 318-333 [doi]
- Phishing to improve detectionSarah Ying Zheng, Ingolf Becker. 334-343 [doi]
- "It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in OrganisationsNeeranjan Chitare, Lynne M. Coventry, James Nicholson. 344-355 [doi]