Abstract is missing.
- On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable SecurityMarios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras. 3-10 [doi]
- A Network Telescope for Early Warning Intrusion DetectionPanos Chatziadam, Ioannis G. Askoxylakis, Alexandros G. Fragkiadakis. 11-22 [doi]
- Visualization of System Log Files for Post-incident Analysis and ResponseJohn Haggerty, Thomas Hughes-Roberts. 23-32 [doi]
- An Assessment Framework for Usable-Security Based on Decision ScienceYasser M. Hausawi, William H. Allen. 33-44 [doi]
- On Designing Usable Policy Languages for Declarative Trust AggregationMichael Huth, Jim Huan-Pu Kuo. 45-56 [doi]
- An Image-Based CAPTCHA Using Sophisticated Mental RotationYuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki. 57-68 [doi]
- What Usable Security Really Means: Trusting and Engaging UsersIacovos Kirlappos, Martina Angela Sasse. 69-78 [doi]
- QR Code Security: A Survey of Attacks and Challenges for Usable SecurityKatharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar Weippl. 79-90 [doi]
- Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like IndiaRutuja More, Abhishek Bora. 91-101 [doi]
- Discrete Hardware Apparatus and Method for Mobile Application and Communication SecurityPaschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis. 102-112 [doi]
- Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication MethodPanagiotis Andriotis, Theo Tryfonas, George C. Oikonomou. 115-126 [doi]
- A Cognitive-Behavioral Framework of User Password Management LifecycleYee-Yin Choong. 127-137 [doi]
- Do Graphical Authentication Systems Solve the Password Memorability Problem?Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie. 138-148 [doi]
- E-voting Authentication with QR-codesStefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar Weippl. 149-159 [doi]
- I Can't Type That! P@$$w0rd Entry on Mobile DevicesKristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee. 160-171 [doi]
- Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security InterventionNina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt. 172-182 [doi]
- ACCESS: Describing and Contrasting - Authentication MechanismsKaren Renaud, Melanie Volkamer, Joseph Maguire. 183-194 [doi]
- Character Strings, Memory and Passwords: What a Recall Study Can Tell UsBrian C. Stanton, Kristen K. Greene. 195-206 [doi]
- From Regulations to Practice: Achieving Information Security Compliance in HealthcareSubrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller. 209-220 [doi]
- Rethinking the Smart Card TechnologyRaja Naeem Akram, Konstantinos Markantonakis. 221-232 [doi]
- Compositional Security Modelling - Structure, Economics, and BehaviourTristan Caulfield, David Pym, Julian Williams. 233-245 [doi]
- End User Development and Information Security CultureFredrik Karlsson, Karin Hedström. 246-257 [doi]
- DSAPE - Dynamic Security Awareness Program EvaluationCharalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis. 258-269 [doi]
- A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection ApproachesJason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon-Wright, Monica Whitty, David Upton, Michael Goldsmith, Sadie Creese. 270-281 [doi]
- Changing Faces: Identifying Complex Behavioural ProfilesGiles Oatley, Tom Crick. 282-293 [doi]
- A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in OrganizationsReza Alavi, Shareeful Islam, Haralambos Mouratidis. 297-305 [doi]
- Socio-technical Security Analysis of Wireless HotspotsAna Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini. 306-317 [doi]
- A Conceptual Framework to Study Socio-Technical SecurityAna Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini. 318-329 [doi]
- An Evaluation of Behavioural Profiling on Mobile DevicesFudong Li, Ross Wheeler, Nathan L. Clarke. 330-339 [doi]
- Nudging for Quantitative Access Control SystemsCharles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva. 340-351 [doi]
- Social Information Leakage: Effects of Awareness and Peer Pressure on User BehaviorMariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland. 352-360 [doi]
- The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security CultureKaren Renaud, Wendy Goucher. 361-372 [doi]
- User Acceptance of Privacy-ABCs: An Exploratory StudyZinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou. 375-386 [doi]
- "My Life Doesn't Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network SitesFrancine Bülow Bergmann, Milene Selbach Silveira. 387-399 [doi]
- Paper Audit Trails and Voters' Privacy ConcernsJurlind Budurushi, Simon Stockhardt, Marcel Woide, Melanie Volkamer. 400-409 [doi]
- Mental Models for Usable Privacy: A Position PaperKovila P. L. Coopamootoo, Thomas Groß. 410-421 [doi]
- Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users?Anna L. Langhorne. 422-432 [doi]
- Privacy Protection Based Privacy Conflict Detection and Solution in Online Social NetworksArunee Ratikan, Mikifumi Shikida. 433-445 [doi]