Abstract is missing.
- Augmenting Machine Learning with ArgumentationMatt Bishop, Carrie Gates, Karl N. Levitt. 1-11 [doi]
- Against MindsetArne Padmos. 12-27 [doi]
- Shifting Paradigms: Using Strategic Foresight to Plan for Security EvolutionHeather Vescent, Bob Blakley. 28-40 [doi]
- Can Software Licenses Contribute to Cyberarms Control?Steve Dierker, Volker Roth 0002. 41-51 [doi]
- Going Dark: A Retrospective on the North American Blackout of 2038Prashant Anantharaman, J. Peter Brady, Patrick Flathers, Vijay H. Kothari, Michael C. Millian, Jason Reeves, Nathan Reitinger, William G. Nisen, Sean W. Smith. 52-63 [doi]
- An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical PracticeVivien M. Rooney, Simon N. Foley. 64-79 [doi]
- On Security SingularitiesWolter Pieters. 80-88 [doi]
- Rethinking the Proposition of Privacy EngineeringAaron Ceross, Andrew Simpson. 89-102 [doi]
- After the BlockCLoud ApocalypseMark Burgess, Anil Somayaji. 103-109 [doi]
- Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA MoleculesDiptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud. 110-122 [doi]
- Malicious User Experience Design Research for CybersecurityAdam Trowbridge, Filipo Sharevski, Jessica Westbrook. 123-130 [doi]