Abstract is missing.
- Transparency of Privacy Risks Using PIA VisualizationsAla Sarah Alaqra, Simone Fischer-Hübner, Farzaneh Karegar. 3-17 [doi]
- Overcoming Privacy-Related Challenges for Game DevelopersMarissa Berk, Tamara Marantika, Daan Oldenhof, Marcel Stalenhoef, Erik Hekman, Levien Nordeman, Simone van der Hof, Linda Louis, Aletta Smits, Koen van Turnhout. 18-28 [doi]
- Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children's Password PracticesYee-Yin Choong, Kerrianne Buchanan, Olivia Williams. 29-48 [doi]
- Refining the Understanding of Usable SecurityWesam Fallatah, Steven Furnell, Ying He. 49-67 [doi]
- Survey of Services that Store Passwords in a Recoverable MannerKazutoshi Itoh, Akira Kanaoka. 68-77 [doi]
- (I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and PrivacyAkira Kanaoka. 78-89 [doi]
- Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH (Voter Data Information System) ApplicationJaka Raharja, Achmad Nurmandi, Misran, Dimas Subekti. 90-100 [doi]
- Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of RhetoricAnkit Shrestha, Rizu Paudel, Prakriti Dumaru, Mahdi Nasrullah Al-Ameen. 101-121 [doi]
- A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental ValidationRuichen Cong, Yaping Ye, Jianlun Wu, Yuxi Li, Yuerong Chen, Yishan Bian, Kiichi Tago, Shoji Nishimura, Atsushi Ogihara, Qun Jin. 125-134 [doi]
- Usable Implementation of Data Sovereignty in Digital EcosystemsDenis Feth. 135-150 [doi]
- Research on the Capability Maturity Model of Data Security in the Era of Digital TransformationZimeng Gao, Fei Xing, Guochao Peng. 151-162 [doi]
- Data Guardians' Behaviors and Challenges While Caring for Others' Personal DataJulie M. Haney, Sandra Spickard Prettyman, Mary Frances Theofanos, Susanne M. Furman. 163-183 [doi]
- A Privacy-Orientated Distributed Data Storage Model for Smart HomesKhutso Lebea, Wai Sze Leung. 184-193 [doi]
- A Question Answering Tool for Website Privacy Policy ComprehensionLuca Mazzola, Atreya Shankar, Christof Bless, Maria A. Rodriguez, Andreas Waldis, Alexander Denzler, Michiel Van Roey. 194-212 [doi]
- Perception of Privacy and Willingness to Share Personal Data in the Smart FactoryLuisa Vervier, Philipp Brauner, Martina Ziefle. 213-231 [doi]
- Multi-ledger Coordinating Mechanism by Smart Contract for Individual-Initiated Trustworthy Data SharingYenjou Wang, Ruichen Cong, Yixiao Liu, Kiichi Tago, Ruidong Li, Hitoshi Asaeda, Qun Jin. 232-243 [doi]
- Privacy Awareness Among Users of Digital Healthcare Services in Saudi ArabiaHebah A. Albatati, John A. Clark, Maysoon F. Abulkhair. 247-261 [doi]
- Threat Actors and Methods of Attack to Social Robots in Public SpacesYonas Zewdu Ayele, Sabarathinam Chockalingam, Nathan Lau. 262-273 [doi]
- Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing TechnologiesMaria Bada, Steven Furnell, Jason R. C. Nurse, Jason Dymydiuk. 274-289 [doi]
- Cybersecurity Compliance Requirements for USA Department of Defense Contractors - Dragons at the GateGordon J. Bruce. 290-308 [doi]
- Behavioral Biometrics Authentication in Critical Infrastructure Using Siamese Neural NetworksArnoldas Budzys, Olga Kurasova, Viktor Medvedev. 309-322 [doi]
- Trust and Blame in Self-driving Cars Following a Successful Cyber AttackVictoria Marcinkiewicz, Phillip L. Morgan. 323-337 [doi]
- I Just Want to Help: SMEs Engaging with Cybersecurity TechnologyJohn Brian Pickering, Stephen C. Phillips, Gencer Erdogan. 338-352 [doi]
- Business Continuity Planning (BCP) for Election SystemsDavid Stevens, Richard Halverson. 353-367 [doi]
- Cybersecurity as Part of Mission AssuranceJoel Wilf. 368-377 [doi]
- Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive MeasuresRufai Ahmad, Sotirios Terzis, Karen Renaud. 381-398 [doi]
- Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness TrackersAbdulmajeed Alqhatani, Heather Richter Lipford. 399-418 [doi]
- User Motivations of Secure Web BrowsingUmai Balendra, Sana Maqsood. 419-434 [doi]
- Working for Home - Privacy and Confidentiality Issues in University EducationDebasis Bhattacharya, Jodi Ito. 435-446 [doi]
- Overcoming the UX Challenges Faced by FIDO Credentials in the Consumer SpaceFrancisco Corella. 447-466 [doi]
- Understanding Older Adults' Safety Perceptions and Risk Mitigation Strategies when Accessing Online ServicesDandi Feng, Hiba Rafih, Cosmin Munteanu. 467-491 [doi]
- Smart Home Device Loss of Support: Consumer Perspectives and PreferencesJulie M. Haney, Susanne M. Furman. 492-510 [doi]
- Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse UsersDavid Jones, Shiva Ghasemi, Denis Gracanin, Mohamed Azab. 511-528 [doi]
- "Stay Out of My Way!": The Impact of Cookie Consent Notice Design on Young Users' DecisionAysun Ogut. 529-541 [doi]
- Evaluating Individuals' Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity AwarenessHana Yousuf, Mostafa Al-Emran, Khaled Shaalan. 542-554 [doi]
- Assessing User Understanding, Perception and Behaviour with Privacy and Permission SettingsNourah Alshomrani, Steven Furnell, Ying He. 557-575 [doi]
- Capability Maturity Models for Targeted Cyber Security TrainingSabarathinam Chockalingam, Espen Nystad, Coralie Esnoul. 576-590 [doi]
- Designing and Evaluating a Resident-Centric Digital Wallet ExperienceSukhi Chuhan, Veronica Wojnas. 591-609 [doi]
- A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner UseUlku Clark, Jeff Greer, Rahmira Rufus, Geoff Stoker. 610-621 [doi]
- Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability AssessmentPriscilla Kyei Danso, Heather Molyneaux, Alireza Zohourian, Euclides Carlos Pinto Neto, Derrick Whalen, Sajjad Dadkhah, Ali A. Ghorbani 0001. 622-642 [doi]
- Fail-Safe Automatic Timed Response Protocol for Cyber Incident and Fault ManagementZeth Dubois, Roger T. Lew, Ronald L. Boring. 643-655 [doi]
- Analysis of Country and Regional User Password Characteristics in Dictionary AttacksShodai Kurasaki, Akira Kanaoka. 656-671 [doi]
- Cyber Technologies, Machine Learning, Additive Manufacturing, and Cloud in the Box to Enable Optimized Maintenance Processes in Extreme ConditionsKasey Miller, Johnathan Mun. 672-684 [doi]
- Person Verification Based on Multipoint Measurement of Intrabody Propagation SignalsIsao Nakanishi, Tomoaki Oku, Souta Okasaka. 685-700 [doi]