Abstract is missing.
- A Design Space for Effective Privacy NoticesFlorian Schaub, Rebecca Balebako, Adam L. Durity, Lorrie Faith Cranor. 1-17 [doi]
- "WTH..!?!" Experiences, Reactions, and Expectations Related to Online Privacy Panic SituationsJulio Angulo, Martin Ortlieb. 19-38 [doi]
- "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and SecurityRuogu Kang, Laura Dabbish, Nathaniel Fruchter, Sara B. Kiesler. 39-52 [doi]
- User Perceptions of Sharing, Advertising, and TrackingFarah Chanchary, Sonia Chiasson. 53-67 [doi]
- Leading Johnny to Water: Designing for Usability and TrustErinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg. 69-88 [doi]
- Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their DevicesSarah J. Andrabi, Michael K. Reiter, Cynthia Sturton. 89-102 [doi]
- Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security BehaviorsJohn M. Blythe, Lynne M. Coventry, Linda Little. 103-122 [doi]
- "I Added '!' at the End to Make It Secure": Observing Password Creation in the LabBlase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. 123-140 [doi]
- Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password TweetsPaul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John C. McCarthy, Patrick Olivier. 141-150 [doi]
- "I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in AuthenticationBryan Dosono, Jordan Hayes, Yang Wang. 151-168 [doi]
- Where Have You Been? Using Location-Based Security Questions for Fallback AuthenticationAlina Hang, Alexander De Luca, Matthew Smith 0001, Michael Richter, Heinrich Hussmann. 169-183 [doi]
- The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical PasswordsMahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo. 185-196 [doi]
- On the Memorability of System-generated PINs: Can Chunking Help?Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov. 197-209 [doi]
- Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field StudyYusuf Albayram, Mohammad Maifi Hasan Khan. 211-224 [doi]
- Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes AnnoyingHassan Khan, Urs Hengartner, Daniel Vogel. 225-239 [doi]
- Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile AppsTakuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori. 241-255 [doi]
- On the Impact of Touch ID on iPhone PasscodesIvan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov. 257-276 [doi]
- Learning Assigned Secrets for Unlocking Mobile DevicesStuart E. Schechter, Joseph Bonneau. 277-295 [doi]
- Security Practices for Households Bank Customers in the Kingdom of Saudi ArabiaDeena Alghamdi, Ivan Flechais, Marina Jirotka. 297-308 [doi]
- Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet UsersRick Wash, Emilee J. Rader. 309-325 [doi]
- "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security PracticesIulia Ion, Rob Reeder, Sunny Consolvo. 327-346 [doi]
- A Human Capital Model for Mitigating Security Analyst BurnoutSathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, S. Raj Rajagopalan. 347-359 [doi]