Abstract is missing.
- Awareness and Working Knowledge of Secure Design Principles: A User StudyMay Almousa, Mahsa Keshavarz, Mohd Anwar. 3-15 [doi]
- The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR)Hamed AlQahtani, Manolya Kavakli-Thorne, Majed Abdullah Alrowaily. 16-31 [doi]
- Does Decision-Making Style Predict Individuals' Cybersecurity Avoidance Behaviour?Hamed AlQahtani, Manolya Kavakli-Thorne. 32-50 [doi]
- Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface DesignLaura M. Bishop, Phillip L. Morgan, Phoebe M. Asquith, George Raywood-Burke, Adam Wedgbury, Kevin Jones. 51-66 [doi]
- Building Connections for a Secure User ExperienceDavid Blank, Ravi Kanth Kosuru. 67-75 [doi]
- Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change?John M. Blythe, Alan Gray, Emily Collins. 76-91 [doi]
- Analyzing Cybersecurity Understanding Using a Brain Computer InterfaceKingberli Capellan, Manuel Condado, Isabel Morais, Patricia Morreale. 92-104 [doi]
- Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure BehaviourLynne M. Coventry, Dawn Branley-Bell, Elizabeth Sillence, Sabina Magalini, Pasquale Mari, Aimilia Magkanaraki, Kalliopi Anastasopoulou. 105-122 [doi]
- Another Week at the Office (AWATO) - An Interactive Serious Game for Threat Modeling Human FactorsLauren S. Ferro, Francesco Sapio. 123-142 [doi]
- Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password ChoiceLaheem Khan, Kovila P. L. Coopamootoo, Magdalene Ng. 143-161 [doi]
- Development of a Test Battery for Cyber SoldiersPatrik Lif, Jacob Löfvenberg, Per Wikberg, Ove Jansson. 162-174 [doi]
- "Trust Me, You Will Need It": Cybersecurity as Extracurricular Subject at Estonian SchoolsBirgy Lorenz, Kaido Kikkas. 175-188 [doi]
- Security Matters ... Until Something Else Matters More: Security Notifications on Different Form FactorsHeather Molyneaux, Elizabeth Stobert, Irina Kondratova, Manon Gaudet. 189-205 [doi]
- A New Hope: Human-Centric Cybersecurity Research Embedded Within OrganizationsPhillip L. Morgan, Phoebe M. Asquith, Laura M. Bishop, George Raywood-Burke, Adam Wedgbury, Kevin Jones. 206-216 [doi]
- Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?Andrew Reeves, Dragana Calic, Paul H. Delfabbro. 217-231 [doi]
- Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness?Andrew Reeves, Kathryn Parsons, Dragana Calic. 232-249 [doi]
- The Man in the Besieged Castle: Heuristic Evaluation of Home Security SystemsLuis Martín Sánchez-Adame, Sonia Mendoza, Beatriz A. González-Beltrán, Amilcar Meneses Viveros, José Rodríguez. 250-260 [doi]
- Natural vs. Technical Language Preference and Their Impact on Firewall ConfigurationArtem Voronkov, Leonardo A. Martucci. 261-270 [doi]
- Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous CommerceAdam Wójtowicz, Jacek Chmielewski. 271-284 [doi]
- To Allow, or Deny? That is the QuestionPanagiotis Andriotis, Atsuhiro Takasu. 287-304 [doi]
- "Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker UsersGeorge Chalhoub, Ivan Flechais. 305-325 [doi]
- Clearing the Hurdles: How to Design Privacy Nudges for Mobile Application UsersSusen Döbelt, Josephine Halama, Sebastian Fritsch, Minh Hoang Nguyen, Franziska Bocklisch. 326-353 [doi]
- Modelling and Presentation of Privacy-Relevant Information for Internet UsersDenis Feth. 354-366 [doi]
- Enabling Medical Research Through Privacy-Preserving Data MarketsShadan Ghaffaripour, Ali Miri. 367-380 [doi]
- Understanding Users' Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure BehaviorCharulata Ghosh, Matthew S. Eastin. 381-392 [doi]
- Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and ChallengesJulie M. Haney, Susanne M. Furman, Yasemin Acar. 393-411 [doi]
- Multi-method Approach Measuring Trust, Distrust, and Suspicion in Information TechnologySarah A. Jessup, Gene M. Alarcon, August A. Capiola, Tyler J. Ryan. 412-426 [doi]
- Did I Agree to This? Silent Tracking Through BeaconsEdden Kashi, Angeliki Zavou. 427-444 [doi]
- Perspectives on Information Technology Artefacts in Trust-Related InteractionsHolger Koelmann. 445-457 [doi]
- Mental Model Mapping Method for CybersecurityKaur Kullman, Laurin Buchanan, Anita Komlodi, Don Engel. 458-470 [doi]
- Parents Unwittingly Leak Their Children's Data: A GDPR Time Bomb?Suzanne Prior, Natalie Coull. 471-486 [doi]
- An Emerging Strategy for Privacy Preserving Databases: Differential PrivacyFatema Rashid, Ali Miri. 487-498 [doi]
- Personal Data Discoverability to Human Searchers: Observations on Personal Data AvailabilityKirsten E. Richards. 499-512 [doi]
- Understanding Privacy and Trust in Smart Home EnvironmentsEva-Maria Schomakers, Hannah Biermann, Martina Ziefle. 513-532 [doi]
- Privacy Apps for Smartphones: An Assessment of Users' Preferences and LimitationsTanusree Sharma, Masooda Bashir. 533-546 [doi]
- Cyberspace and Cyberculture: The New Social and Governance FieldRodolfo Ward, Cleomar Rocha, Suzete Venturelli. 547-557 [doi]
- Evaluation of Secure Pad Resilient to Shoulder HackingKokoro Kobayashi, Tsuyoshi Oguni, Masaki Nakagawa. 561-574 [doi]
- Smart Assistants in IT Security - An Approach to Addressing the Challenge by Leveraging Assistants' Specific FeaturesMichael Kubach, Heiko Roßnagel. 575-587 [doi]
- An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy AuthenticationWei Li, Shuping Yi, Qian Yi, Jiajia Li, Shiquan Xiong. 588-598 [doi]
- Cyber Security Threats and Incidents in Industrial Control SystemsJens Mehrfeld. 599-608 [doi]
- Usable Security by Design: A Pattern ApproachBilal Naqvi, Jari Porras. 609-618 [doi]
- Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat FrameworksKatie Paxton-Fear, Duncan Hodges, Oliver Buckley. 619-636 [doi]
- Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor ReadingsEmanuel Schmitt, Jan-Niklas Voigt-Antons. 637-651 [doi]
- Private Cloud Storage: Client-Side Encryption and Usable Secure Utility FunctionsAkihiro Tachikawa, Akira Kanaoka. 652-670 [doi]
- Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian NetworkYuhan Wang, Qian Yi, Shuping Yi, Jiajia Li, Shiquan Xiong. 671-682 [doi]