Abstract is missing.
- Cybersecurity Regrets: I've had a few.... Je Ne RegretteKaren Renaud, Rosalind Searle, Marc J. Dupuis. 1-20 [doi]
- "It may be a pain in the backside but..." Insights into the resilience of business after GDPRGerard Buckley, Tristan Caulfield, Ingolf Becker. 21-34 [doi]
- Side Auth: Synthesizing Virtual Sensors for AuthenticationYan Long, Kevin Fu. 35-44 [doi]
- Designing Through The Stack: The Case for a Participatory Digital Security By DesignIan Slesinger, Lizzie Coles-Kemp, Niki Panteli, René Rydhof Hansen. 45-59 [doi]
- From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETsPartha Das Chowdhury, Andrés Domínguez Hernández, Kopo Marvin Ramokapane, Awais Rashid. 60-74 [doi]
- Passwords and Cryptwords: The Final Limits on LengthsMichael Clark, Kent E. Seamons. 75-89 [doi]
- Autonomous Vehicle Security: Composing Attack, Defense, and Policy SurfacesMichael Clifford, Miriam Heller, Karl N. Levitt, Matt Bishop. 90-103 [doi]
- Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted MessagingNathan Malkin. 104-116 [doi]
- Toward User Control over Information Access: A Sociotechnical ApproachCaleb Malchik, Joan Feigenbaum. 117-129 [doi]
- Transparency, Compliance, And Contestability When Code Is(n't) LawAlexander Hicks. 130-142 [doi]