Abstract is missing.
- Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young AdultsHanieh Atashpanjeh, Arezou Behfar, Cassity Haverkamp, Maryellen McClain Verdoes, Mahdi Nasrullah Al-Ameen. 3-15 [doi]
- Improving Consumer Data Privacy Protection and Trust in the Context of the Digital PlatformCong Cao, Miaomiao Zheng, Linyao Ni. 16-29 [doi]
- Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABERuichen Cong, Yixiao Liu, Yenjou Wang, Kiichi Tago, Ruidong Li, Hitoshi Asaeda, Qun Jin. 30-41 [doi]
- Mental Models of the Internet and Its Online Risks: Children and Their Parent(s)Alexandra Mai, Leonard Guelmino, Katharina Pfeffer, Edgar R. Weippl, Katharina Krombholz. 42-61 [doi]
- Privacy and Customer's Education: NLP for Information Resources Suggestions and Expert Finder SystemsLuca Mazzola, Andreas Waldis, Atreya Shankar, Diamantis Argyris, Alexander Denzler, Michiel Van Roey. 62-77 [doi]
- Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based IndexingMizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki. 78-93 [doi]
- Securing Software Defining Network from Emerging DDoS AttackTemechu Girma Zewdie, Anteneh Girma. 94-103 [doi]
- User Experience, Knowledge, Perceptions, and Behaviors Associated with Internet of Things (IoT) Device Information PrivacyMaria Chaparro Osman, Andrew Nakushian, Summer Rebensky, Tricia Prior, Meredith B. Carroll. 107-123 [doi]
- From Cybersecurity Hygiene to Cyber Well-BeingShreya Gupta, Steven Furnell. 124-134 [doi]
- Lessons Learned and Suitability of Focus Groups in Security Information Workers ResearchJulie M. Haney, Jody L. Jacobs, Fernando Barrientos, Susanne M. Furman. 135-153 [doi]
- A Survey of User Experience in Usable Security and Privacy ResearchDanielle Jacobs, Troy McDaniel. 154-172 [doi]
- Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS ConfigurationsAlexandra Mai, Oliver Schedler, Edgar R. Weippl, Katharina Krombholz. 173-193 [doi]
- Towards the Improvement of UI/UX of a Human-AI Adversarial Authorship SystemSadaira Packer, Cheryl D. Seals, Gerry V. Dozier. 194-205 [doi]
- Bu-Dash: A Universal and Dynamic Graphical Password SchemePanagiotis Andriotis, Myles Kirby, Atsuhiro Takasu. 209-227 [doi]
- A Preliminary Investigation of Authentication of Choice in Health-Related Mobile ApplicationsOluwadamilola Arinde, Jinjuan Feng, Ziying Tang. 228-240 [doi]
- On-Demand Biometric Authentication for System-User ManagementIsao Nakanishi. 241-254 [doi]
- PushID: A Pressure Control Interaction-Based Behavioral Biometric Authentication System for SmartwatchesYoungeun Song, Ian Oakley. 255-267 [doi]
- A Hand Gesture-Based Authentication Method that Makes Forgery DifficultHideaki Terui, Hiroshi Hosobe. 268-279 [doi]
- VibroAuth: Authentication with Haptics Based Non-visual, Rearranged Keypads to Mitigate Shoulder Surfing AttacksManisha Varma, Stacey Watson, Liwei Chan, Roshan Lalintha Peiris. 280-303 [doi]
- The Pitfalls of Evaluating Cyber Defense Techniques by an Anonymous PopulationAsmaa Aljohani, James Jones. 307-325 [doi]
- The Dimensionality of the Cyber WarriorMorgan L. Ferretti, Timothy Richards, Jessica G. Irons, Kirsten Richards James. 326-339 [doi]
- Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional InsidersFlorian Kammüller, Chelsea Mira Alvarado. 340-357 [doi]
- Shaping Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver FrameworkJennifer A. McKneely, Tara K. Sell, Kathleen A. Straub, Mika D. Ayenson, Daniel Thomas. 358-379 [doi]
- A User Study to Evaluate a Web-Based Prototype for Smart Home Internet of Things Device ManagementLeena Alghamdi, Ashwaq Alsoubai, Mamtaj Akter, Faisal Alghamdi, Pamela J. Wisniewski. 383-405 [doi]
- What Makes IoT Secure? A Maturity Analysis of Industrial Product Manufacturers' Approaches to IoT SecurityLaura Lynggaard Nielsen. 406-421 [doi]
- Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and AdoptionMichael Shlega, Sana Maqsood, Sonia Chiasson. 422-443 [doi]
- Privacy in the Smart Household: Towards a Risk Assessment Model for Domestic IoTMarkus Frogner Werner, Ida Ness, Cristina Paupini. 444-454 [doi]
- Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood ModelNirmal Acharya, Abhishek Sharma. 457-468 [doi]
- The Importance of Strengthening Legal Concepts in Overcoming Cybercrime During the Covid-19 Pandemic in IndonesiaArdiansyah, M. Rafi, Pahmi Amri. 469-479 [doi]
- Exploration of Privacy, Ethical and Regulatory Concerns Related to COVID-19 Vaccine Passport ImplementationAbhishek Sharma, Chandana Hewege, Chamila Perera. 480-491 [doi]
- Attitudes Towards the Use of COVID-19 Apps and Its Associated FactorsTian Wang, Masooda N. Bashir. 492-501 [doi]