Abstract is missing.
- Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal SecuritySourav Bhuyan, Joel S. Greenstein, Kevin A. Juang. 3-12 [doi]
- Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication SystemsSoumyadeb Chowdhury, Ron Poet, Lewis Mackenzie. 13-22 [doi]
- Investigating an Intrusion Prevention System for Brain-Computer InterfacesSaul D. Costa, Dale R. Stevens, Jeremy A. Hansen. 23-28 [doi]
- Inconspicuous Personal Computer Protection with Touch-MouseMing-Chun Huang, Wenyao Xu, Jason J. Liu, Yi Su, Lei He, Majid Sarrafzadeh. 29-38 [doi]
- Gamified CAPTCHAJunya Kani, Masakatsu Nishigaki. 39-48 [doi]
- Recognition of Human Identity by Detection of User ActivityGiuseppe Scardino, Ignazio Infantino, Filippo Vella. 49-58 [doi]
- Learning a Policy for Gesture-Based Active Multi-touch AuthenticationRaquel Torres Peralta, Antons Rebguns, Ian R. Fasel, Kobus Barnard. 59-68 [doi]
- Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA MechanismsMarios Belk, Panagiotis Germanakos, Christos Fidas, George Spanoudis, George Samaras. 71-79 [doi]
- Relationships between Password Choices, Perceptions of Risk and Security ExpertiseSadie Creese, Duncan Hodges, Sue Jamison-Powell, Monica Whitty. 80-89 [doi]
- Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online TrustMartin Hesseler, Gerhard Hartmann, Stefan Karsch. 90-99 [doi]
- A Comparison of American and German Folk Models of Home Computer SecurityMichaela Kauer, Sebastian Günther, Daniel Storck, Melanie Volkamer. 100-109 [doi]
- Health Is Silver, Beauty Is Golden? - How the Usage Context Influences the Acceptance of an Invasive TechnologyJohanna Kluge, Martina Ziefle. 110-118 [doi]
- A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk - -The Case of Japanese Internet Users-Ayako Komatsu. 119-126 [doi]
- Personality's Influence on Facebook's Privacy Settings: A Case of College Students in TaiwanTingya Kuo, Hung-Lian Tang. 127-134 [doi]
- An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social NetworksKi Jung Lee, Il-Yeol Song. 135-144 [doi]
- A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation AwarenessCeleste Lyn Paul, Kirsten Whitley. 145-154 [doi]
- Click Me If You Can! - When Do Users Follow a Call to Action in an Online Message?Thomas Pfeiffer, Heike Theuerling, Michaela Kauer. 155-166 [doi]
- Increasing Trust Perceptions in the Internet of ThingsTrenton Schulz, Ingvar Tjøstheim. 167-175 [doi]
- Perception of Risky Security Behaviour by Users: Survey of Current ApproachesLynsay A. Shepherd, Jacqueline Archibald, R. I. Ferguson. 176-185 [doi]
- Understanding People's Preferences for Disclosing Contextual Information to Smartphone AppsFuming Shih, Julia Boortz. 186-196 [doi]
- Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage ThreatsMartyn Styles. 197-206 [doi]
- Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile AppsAnastasopoulou Kalliopi, Theo Tryfonas, Spyros Kokolakis. 209-216 [doi]
- Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service ProvidersSteven Furnell, Nina Bär. 217-225 [doi]
- Ethical Issues Surrounding the Asymmetric Nature of Workplace MonitoringJohn D. Bustard. 226-235 [doi]
- A Reasonable Expectation of Privacy? Secrecy and National Security in a DemocracyKathleen M. Hogan. 236-245 [doi]
- Towards Usable Generation and Enforcement of Trust Evidence from Programmers' IntentMichael Huth, Jim Huan-Pu Kuo, Angela Sasse, Iacovos Kirlappos. 246-255 [doi]
- Modeling Security Policy and the Effect for End-UsersKevin D. Jones, Kizito Salako. 256-265 [doi]
- Legal Protection for Personal Information PrivacyYinan Liu. 266-275 [doi]
- "The Four Most-Used Passwords Are Love, Sex, Secret, and God": Password Security and Training in Different User GroupsBirgy Lorenz, Kaido Kikkas, Aare Klooster. 276-283 [doi]
- The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation ToolsShara Monteleone. 284-294 [doi]
- Addressing User Privacy and Experience in Distributed Long Lifetime SystemsScott W. Cadzow. 297-305 [doi]
- Secure and Energy-Efficient Life-Logging in Wireless Pervasive EnvironmentsAlexandros G. Fragkiadakis, Ioannis G. Askoxylakis, Elias Z. Tragos. 306-315 [doi]
- Supporting Human Decision-Making Online Using Information-Trustworthiness MetricsJason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman. 316-325 [doi]
- On the Secure and Safe Data SynchronizationPavel Ocenasek, Jaromir Karmazin. 326-331 [doi]
- The Practice of Global Internet FilteringPavel Ocenasek. 332-337 [doi]
- A Privacy-Level Model of User-Centric Cyber-Physical SystemsNikolaos E. Petroulakis, Ioannis G. Askoxylakis, Apostolos Traganitis, George Spanoudakis. 338-347 [doi]
- High-Level Design for a Secure Mobile Device Management SystemKeunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, Dongho Won. 348-356 [doi]
- Factors Influencing Adoption of Encryption to Secure Data in the CloudKenneth E. Stavinoha. 357-365 [doi]
- Cloudopsy: An Autopsy of Data Flows in the CloudAngeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis. 366-375 [doi]