Abstract is missing.
- The Design of Messages to Improve Cybersecurity Incident ReportingPam Briggs, Debora Jeske, Lynne M. Coventry. 3-13 [doi]
- Overcoming Fear of the Threat ModelScott Cadzow. 14-24 [doi]
- "No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure OnesSteve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse. 25-44 [doi]
- Mobile Online Proficiency and Mobile Internet Use - Findings from FinlandTitiana Ertiö, Pekka Räsänen. 45-56 [doi]
- Usability in Solutions of Secure Email - A Tools ReviewLucas Ferreira, Junia Anacleto. 57-73 [doi]
- A User-Centered Model for Usable Security and PrivacyDenis Feth, Andreas Maier, Svenja Polst. 74-89 [doi]
- Information Security, Privacy, and Trust in Social Robotic Assistants for Older AdultsThomas Given-Wilson, Axel Legay, Sean Sedwards. 90-109 [doi]
- Android App Permission and Users' Adoption: A Case Study of Mental Health ApplicationHsiao-Ying Huang, Masooda Bashir. 110-122 [doi]
- "If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security DecisionsNorbert Nthala, Ivan Flechais. 123-142 [doi]
- Assessing the Impact of Affective Feedback on End-User Security AwarenessLynsay A. Shepherd, Jacqueline Archibald, Robert Ian Ferguson. 143-159 [doi]
- A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIsChamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay. 160-173 [doi]
- Managing User Experience: Usability and Security in a New Era of Software SupremacyPanagiotis Zagouras, Christos Kalloniatis, Stefanos Gritzalis. 174-188 [doi]
- PSV (Password Security Visualizer): From Password Checking to User EducationNouf Aljaffan, Haiyue Yuan, Shujun Li. 191-211 [doi]
- Dear Password, I Know You Too Well - A Congenial Call for Ubiquitous AuthenticationFrans F. Blauw. 212-225 [doi]
- Keystroke Inference Using Smartphone KinematicsOliver Buckley, Duncan Hodges, Melissa Hadgkiss, Sarah Morris. 226-238 [doi]
- Live Gaze-Based Authentication and Gaming SystemQuan Wang, Lelai Deng, Hao Cheng, Hualei Fan, Xiaoping Du, Qinghong Yang. 239-250 [doi]
- When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security SystemsHaiyue Yuan, Shujun Li, Patrice Rusconi, Nouf Aljaffan. 251-264 [doi]
- "If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication TechnologiesVerena Zimmermann, Nina Gerber. 265-283 [doi]
- Identifying Changes in the Cybersecurity Threat Landscape Using the LDA-Web Topic Modelling Data Search EngineNoura Al Moubayed, David Wall, A. Stephen McGough. 287-295 [doi]
- Secure Peripherals in a Converged Mobile EnvironmentJaco du Toit, Ian Ellefsen. 296-308 [doi]
- System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and AnalysisTesleem Fagade, Theodoros Spyridopoulos, Nabeel Albishry, Theodore Tryfonas. 309-321 [doi]
- Developing Usable Interface for Internet of Things (IoT) Security Analysis SoftwareSeokjun Hong, Youngsun Kim, Gerard Jounghyun Kim. 322-328 [doi]
- Visualization Technologies of Information Security Support System Using Haptic DevicesManabu Ishihara, Taiki Kanayama. 329-338 [doi]
- Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care SystemsFlorian Kammüller. 339-352 [doi]
- Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious InsidersKoichi Niihara, Michihiro Yamada, Hiroaki Kikuchi. 353-365 [doi]
- An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting SystemJason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese. 366-383 [doi]
- Application of Work Domain Analysis for CybersecurityHao Wang, Nathan Lau, Ryan M. Gerdes. 384-395 [doi]
- Using Human Factor Approaches to an Organisation's Bring Your Own Device SchemeJodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilios Katos. 396-413 [doi]
- A Case Study: Heartbleed Vulnerability Management and Swedish MunicipalitiesShao-Fang Wen, Stewart Kowalski. 414-431 [doi]
- Usable Security Management for Network Access Rules of Critical InfrastructureJeong-Han Yun, Seungoh Choi, Woonyon Kim, Hwasun Kang, Sung Woo Kim. 432-447 [doi]
- Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?Ahto Buldas, Märt Saarepera. 451-463 [doi]
- Walking the Line: The Everyday Security Ties that BindLizzie Coles-Kemp, René Rydhof Hansen. 464-480 [doi]
- Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCIJoanne Hinds, Adam N. Joinson. 481-493 [doi]
- Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security ProfessionalsDuncan Hodges, Oliver Buckley. 494-506 [doi]
- Behavioural Profiling in Cyber-Social SystemsJason Perno, Christian W. Probst. 507-517 [doi]
- The Impact of Changing Technology on International Cybersecurity CurriculaHuw Read, Iain Sutherland, Konstantinos Xynos, Tom Drange, Ernst Sundt. 518-528 [doi]
- Towards a Conceptualisation of Cloud (Cyber) CrimeDavid S. Wall. 529-538 [doi]
- How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime?Steve Warren, Gavin Oxburgh, Pam Briggs, David Wall. 539-556 [doi]
- Modelling Trust and Trust-Building Among IT-Security Professionals - How Do Practitioners Find Out Whom to Work With?Laurin B. Weissinger. 557-566 [doi]
- Law Infringements in Social Live Streaming ServicesFranziska Zimmer, Kaja J. Fietkiewicz, Wolfgang G. Stock. 567-585 [doi]
- Privacy Decision-Making in the Digital Era: A Game Theoretic ReviewKallia Anastasopoulou, Spyros Kokolakis, Panagiotis Andriotis. 589-603 [doi]
- A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission ModelPanagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, Gianluca Stringhini. 604-622 [doi]
- Communicability Evaluation of Privacy Settings on Facebook for AndroidBeatriz Brito do Rêgo, Ingrid Teixeira Monteiro, Andréia Libório Sampaio. 623-639 [doi]
- Sharing the 'Real Me' - How Usage Motivation and Personality Relate to Privacy Protection Behavior on FacebookNina Gerber, Paul Gerber, Maria Hernando. 640-655 [doi]
- Exploring Consumers' Attitudes of Smart TV Related Privacy RisksMarco Ghiglieri, Melanie Volkamer, Karen Renaud. 656-674 [doi]
- Sharing Information with Web Services - A Mental Model Approach in the Context of Optional InformationOksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer. 675-690 [doi]
- Integrating a Practice Perspective to Privacy by DesignChristopher Lentzsch, Kai-Uwe Loser, Martin Degeling, Alexander Nolte. 691-702 [doi]
- Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in AndroidHui Li, Wenling Liu, Bin Wang, Wen Zhang. 703-721 [doi]
- A Privacy-Driven Data Management Model for Smart Personal AssistantsDanilo M. Nogueira, Cristiano Maciel, José Viterbo, Daniel Vecchiato. 722-738 [doi]
- Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric PrivacyAwanthika Senarath, Nalin Asanka Gamagedara Arachchilage, Jill Slay. 739-752 [doi]