Abstract is missing.
- Blessed Are The Lawyers, For They Shall Inherit CybersecurityDaniel W. Woods, Aaron Ceross. 1-12 [doi]
- COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal DesignsKevin Gallagher, Santiago Torres-Arias, Nasir D. Memon, Jessica Feldman. 13-27 [doi]
- Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation SecuritySimon Parkin, Simon Arnell, Jeremy Ward. 28-42 [doi]
- The tragedy of common bandwidth: rDDoSArturs Lavrenovs, Eireann Leverett, Aaron Kaplan. 43-58 [doi]
- Beyond NVD: Cybersecurity meets the Semantic WebRaúl Aranovich, Muting Wu, Dian Yu, Katya Katsy, Benyamin Ahmadnia, Matthew Bishop, Vladimir Filkov, Kenji Sagae. 59-69 [doi]
- Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?Karen Renaud, Rosalind Searle, Marc J. Dupuis. 70-87 [doi]
- VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information DiscourseFilipo Sharevski, Peter Jachim, Emma Pieroni, Nate Jachim. 88-107 [doi]
- "Taking out the Trash": Why Security Behavior Change requires Intentional ForgettingJonas Hielscher, Annette Kluge, Uta Menges, M. Angela Sasse. 108-122 [doi]