Abstract is missing.
- Emergent Properties & Security: The Complexity ofSecurity as a ScienceNathaniel Husted, Steven Myers. 1-14 [doi]
- Cyber Security as Social ExperimentWolter Pieters, Dina Hadziosmanovic, Francien Dechesne. 15-24 [doi]
- Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable TokensAndrew M. White 0002, Katherine Shaw, Fabian Monrose, Elliott Moreton. 25-38 [doi]
- A Password Manager that Doesn't Remember PasswordsElizabeth Stobert, Robert Biddle. 39-52 [doi]
- Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making ProcessesJustin Cappos, Yanyan Zhuang, Daniela Oliveira, Marissa Rosenthal, Kuo-Chuan Yeh. 53-62 [doi]
- Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging InstitutionsAndreas Kuehn, Milton Mueller. 63-68 [doi]
- An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to AssetsAndreas Poller, Sven Türpe, Katharina Kinder-Kurlanda. 69-82 [doi]
- Understanding the Experience-Centeredness of Privacy and Security TechnologiesPaul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasillis Vlachokyriakos, Peter C. Wright, John C. McCarthy, Patrick Olivier. 83-94 [doi]
- I'm OK, You're OK, the System's OK: Normative Security for SystemsOlgierd Pieczul, Simon N. Foley, Vivien M. Rooney. 95-104 [doi]
- Data Is the New CurrencyCarrie Gates, Peter Matthews. 105-116 [doi]
- Panel Summary: The Future of Software RegulationBenjamin Edwards, Michael E. Locasto, Jeremy Epstein. 117-126 [doi]
- Planning and Integrating Deception into Computer Security DefensesMohammed H. Almeshekah, Eugene H. Spafford. 127-138 [doi]