Abstract is missing.
- Authentication Management of Home IoT DevicesAniqa Alam, Heather Molyneaux, Elizabeth Stobert. 3-21 [doi]
- Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?Aniqa Alam, Robert Biddle, Elizabeth Stobert. 22-40 [doi]
- Development of a Novice-Friendly Representation of Camouflaged Boolean NetworksSalsabil Hamadache, Malte Elson. 41-49 [doi]
- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative ReviewAimee Kendall Roundtree. 50-65 [doi]
- Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof SchemesPantelitsa Leonidou, Argyris Constantinides, Marios Belk, Christos Fidas, Andreas Pitsillides. 66-75 [doi]
- Risk Assessment of "Ostrich ZIP"Michihiro Nakayama, Akira Kanaoka. 76-90 [doi]
- Identity Recognition Based on the Hierarchical Behavior Characteristics of Network UsersBiao Wang, Zhengang Zhai, Bingtao Gao, Li Zhang. 91-102 [doi]
- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment ServicesDaniel Wilusz, Adam Wójtowicz. 103-119 [doi]
- Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience - An Applied Practice Case Study Discussing Approaches to Assessing Human Factors Vulnerabilities in Cyber-Security SystemsNicola Fairburn, Andrew Shelton, Frances Ackroyd, Rachel Selfe. 123-138 [doi]
- A Human Factor Approach to Threat ModelingLauren S. Ferro, Andrea Marrella, Tiziana Catarci. 139-157 [doi]
- Smart Technologies and Internet of Things Designed for Aging in PlaceHélène Fournier, Irina Kondratova, Keiko Katsuragawa. 158-176 [doi]
- Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy ConsiderationJongkeon Kim, Jeongyun Heo. 177-193 [doi]
- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User InterfacesKarsten Martiny, Mark St. John, Grit Denker, Christopher Korkos, Linda Briesemeister. 194-211 [doi]
- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber RiskChris Nichols, Geoff Stoker, Ulku Clark. 212-225 [doi]
- Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure BehaviorGeorge Raywood-Burke, Laura M. Bishop, Phoebe M. Asquith, Phillip L. Morgan. 226-240 [doi]
- Privacy Design Strategies and the GDPR: A Systematic Literature ReviewMarco Saltarella, Giuseppe Desolda, Rosa Lanzilotti. 241-257 [doi]
- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk ExposureZainab Agha, Reza Ghaiumy Anaraky, Karla A. Badillo-Urquiola, Bridget Christine McHugh, Pamela J. Wisniewski. 261-280 [doi]
- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old DevicesMahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas. 281-296 [doi]
- Perceptions of Security and Privacy in mHealthAna Ferreira 0001, Joana Muchagata, Pedro Vieira-Marques, Diogo Abrantes, Soraia Teles. 297-309 [doi]
- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online AccountHuzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen. 310-325 [doi]
- CyberPin - Challenges on Recognizing Youngest Cyber TalentsBirgy Lorenz, Kaido Kikkas, Aleksei Talisainen, Taavi Eomäe. 326-336 [doi]
- It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity AwarenessJ. Brian Pickering, Costas Boletsis, Ragnhild Halvorsrud, Stephen C. Phillips, Mike Surridge. 337-352 [doi]
- Understanding the Last Line of Defense: Human Response to Cybersecurity EventsSummer Rebensky, Meredith B. Carroll, Andrew Nakushian, Maria Chaparro, Tricia Prior. 353-366 [doi]
- The Effectiveness of Video Messaging Campaigns to Use 2FAElham Al Qahtani, Lipsarani Sahoo, Mohamed Shehab. 369-390 [doi]
- A Study on Online Businesses' Commitment to Consumer PrivacyMay Almousa, Yang Liu, Tianyang Zhang, Mohd Anwar. 391-402 [doi]
- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing AttacksJoseph Aneke, Carmelo Ardito, Giuseppe Desolda. 403-416 [doi]
- Social Engineering Attacks: Recent Advances and ChallengesNikol Mashtalyar, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak, Suprio Ray. 417-431 [doi]
- Brand Validation: Security Indicator to Better Indicate Website IdentityTetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Toshinori Fukunaga, Ryohei Suzuki, Masayuki Kanda. 432-447 [doi]
- Study on the Impact of Learning About Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning MaterialsSatoshi Ozaki, Hiroshi Furukawa. 448-474 [doi]
- Gaming Apps' and Social Media Partnership: A Privacy PerspectiveTian Wang, Masooda N. Bashir. 475-487 [doi]