Abstract is missing.
- Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and ConsequencesAllison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro Acquisti. 1-18
- Parents' and Teens' Perspectives on Privacy In a Technology-Filled WorldLorrie Faith Cranor, Adam L. Durity, Abigail Marsh, Blase Ur. 19-35
- Privacy Attitudes of Mechanical Turk Workers and the U.S. PublicRuogu Kang, Stephanie Brown, Laura Dabbish, Sara B. Kiesler. 37-49
- Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and GoogleEmilee J. Rader. 51-67
- Too Much Choice: End-User Privacy Decisions in the Context of Choice ProliferationStefan Korff, Rainer Böhme. 69-87
- Out of the Loop: How Automated Software Updates Cause Unintended Security ConsequencesRick Wash, Emilee J. Rader, Kami Vaniea, Michelle Rizor. 89-104
- Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent ItCristian Bravo-Lillo, Lorrie Faith Cranor, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper. 105-111 [doi]
- Your Reputation Precedes You: History, Reputation, and the Chrome Malware WarningHazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny Consolvo. 113-128
- Exploring Internet Security Perceptions and Practices in Urban GhanaJay Chen, Michael Paik, Kelly McCabe. 129-142
- The Effect of Social Influence on Security SensitivitySauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong. 143-157
- Privacy Concerns in Online Recommender Systems: Influences of Control and User Data InputBo Zhang, Na Wang, Hongxia Jin. 159-173
- Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario SimulationsHeather Rosoff, Jinshu Cui, Richard S. John. 175-186
- Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on SmartphonesHui Xu, Yangfan Zhou, Michael R. Lyu. 187-198 [doi]
- Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission SettingsJialiu Lin, Bin Liu, Norman M. Sadeh, Jason I. Hong. 199-212 [doi]
- It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk PerceptionMarian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith 0001. 213-230 [doi]
- Applying Psychometrics to Measure User Comfort when Constructing a Strong PasswordS. M. Taiabul Haque, Shannon Scielzo, Matthew Wright. 231-242 [doi]
- The Password Life Cycle: User Behaviour in Managing PasswordsElizabeth Stobert, Robert Biddle. 243-255 [doi]
- Crowdsourcing Attacks on Biometric SystemsSaurabh Panjwani, Achintya Prakash. 257-269 [doi]
- Understanding and Specifying Social Access Control ListsMainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, Alan Mislove. 271-283 [doi]
- To Befriend Or Not? A Model of Friend Request Acceptance on FacebookHootan Rashtian, Yazan Boshmaf, Pooya Jaferian, Konstantin Beznosov. 285-300 [doi]
- To Authorize or Not Authorize: Helping Users Review Access Policies in OrganizationsPooya Jaferian, Hootan Rashtian, Konstantin Beznosov. 301-320 [doi]