Abstract is missing.
- Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19Josiah Dykstra, Adam Shostack. 1-10 [doi]
- Towards Foundational Security MetricsNilofar Mansourzadeh, Anil Somayaji. 11-19 [doi]
- Balancing Security and Longevity: Benefits of Modular IoT InfrastructureMaxwell Keleher, David Barrera 0003, Sonia Chiasson. 20-34 [doi]
- 'Debunk-It-Yourself': Health Professionals Strategies for Responding to Misinformation on TikTokFilipo Sharevski, Jennifer Vander Loop, Peter Jachim, Amy Devine, Sanchari Das. 35-55 [doi]
- Public Security User Interfaces: Supporting Spontaneous Engagement with IT SecurityDoruntina Murtezaj, Viktorija Paneva, Verena Distler, Florian Alt. 56-70 [doi]
- Adopting a Systemic Design Approach to Cyber Security Incident ResponseEmma Woodward, Barnaby Craggs, Danaƫ Stanton Fraser, Adam N. Joinson. 71-83 [doi]
- Is Crowdsourcing a Puppet Show? Detecting a New Type of Fraud in Online PlatformsShengqian Wang, Israt Jahan Jui, Julie Thorpe. 84-95 [doi]
- "Function Extraction: A New Paradigm for Producing Secure Code"Richard C. Linger, Mark G. Pleszkoch, Jack McGaughey, John McHugh, Wided Ghardallou, Ali Mili 0001. 96-105 [doi]
- "When Data Breaches Happen, Where Does the Buck Stop?... and where should it stop?"Partha Das Chowdhury, Karen Renaud, Awais Rashid. 106-125 [doi]
- Don't Patch the Researcher, Patch the Game: A Systematic Approach for Responsible Research via Federated Ethics BoardsAlexandra Dirksen, Sebastian Giessler, Hendrik Erz, Martin Johns, Tobias Fiebig. 126-141 [doi]