Abstract is missing.
- Feasibility of structural network clustering for group-based privacy control in social networksSimon Jones, Eamonn O Neill. [doi]
- Optimizing a policy authoring framework for security and privacy policiesMaritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg. [doi]
- Influence of user perception, security needs, and social factors on device pairing method choicesIulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun. [doi]
- Encountering stronger password requirements: user attitudes and behaviorsRichard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. [doi]
- On the impact of real-time feedback on users behaviour in mobile location-sharing applicationsLukasz Jedrzejczyk, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh. [doi]
- Where do security policies come from?Dinei A. F. FlorĂȘncio, Cormac Herley. [doi]
- The impact of social navigation on privacy policy configurationAndrew Besmer, Jason Watson, Heather Richter Lipford. [doi]
- A closer look at recognition-based graphical passwords on mobile devicesPaul Dunphy, Andreas P. Heiner, N. Asokan. [doi]
- Textured agreements: re-envisioning electronic consentMatthew Kay, Michael Terry. [doi]
- Towards understanding ATM security: a field study of real world ATM useAlexander De Luca, Marc Langheinrich, Heinrich Hussmann. [doi]
- Do windows users follow the principle of least privilege?: investigating user account control practicesSara Motiee, Kirstie Hawkey, Konstantin Beznosov. [doi]
- Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safetyAlexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno. [doi]
- Usably secure, low-cost authentication for mobile bankingSaurabh Panjwani, Edward Cutrell. [doi]
- Improving users security choices on home wireless networksJustin T. Ho, David Dearman, Khai N. Truong. [doi]
- Folk models of home computer securityRick Wash. [doi]
- Two heads are better than one: security and usability of device associations in group scenariosRonald Kainda, Ivan Flechais, A. W. Roscoe. [doi]