Abstract is missing.
- We have met the enemy and he is usMatt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates. 1-12 [doi]
- Localization of credential information to address increasingly inevitable data breachesMohammad Mannan, Paul C. van Oorschot. 13-21 [doi]
- ROFL: routing as the firewall layerHang Zhao, Chi-Kin Chau, Steven M. Bellovin. 23-31 [doi]
- The user is not the enemy: fighting malware by tracking user intentionsJeff Shirley, David Evans. 33-45 [doi]
- The compliance budget: managing security behaviour in organisationsAdam Beautement, Martina Angela Sasse, Mike Wonham. 47-58 [doi]
- A profitless endeavor: phishing as tragedy of the commonsCormac Herley, Dinei A. F. FlorĂȘncio. 59-70 [doi]
- Security compliance: the next frontier in security researchKlaus Julisch. 71-74 [doi]
- Towards an ethical code for information security?Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme. 75-87 [doi]
- The developer is the enemyGlenn Wurster, Paul C. van Oorschot. 89-97 [doi]
- The ecology of MalwareJedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro. 99-106 [doi]
- Trading in risk: using markets to improve access controlIan Molloy, Pau-Chen Cheng, Pankaj Rohatgi. 107-125 [doi]
- and the blue pill: a position paperBen Laurie, Abe Singer. 127-133 [doi]