Abstract is missing.
- Rethinking Connection Security IndicatorsAdrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, Sunny Consolvo. 1-14 [doi]
- A Week to Remember: The Impact of Browser Warning Storage PoliciesJoel Weinberger, Adrienne Porter Felt. 15-25 [doi]
- Follow My Recommendations: A Personalized Privacy Assistant for Mobile App PermissionsBin Liu 0017, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, Alessandro Acquisti. 27-41 [doi]
- "They Keep Coming Back Like Zombies": Improving Software Updating InterfacesArunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty. 43-58 [doi]
- Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security AdviceMichael Fagan, Mohammad Maifi Hasan Khan. 59-75 [doi]
- Expecting the Unexpected: Understanding Mismatched Privacy Expectations OnlineAshwini Rao, Florian Schaub, Norman M. Sadeh, Alessandro Acquisti, Ruogu Kang. 77-96 [doi]
- Do or Do Not, There Is No Try: User Engagement May Not Improve Security OutcomesAlain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang. 97-111 [doi]
- An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption SystemsWei Bai 0004, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek, Doowon Kim. 113-130 [doi]
- User Attitudes Toward the Inspection of Encrypted TrafficScott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons. 131-146 [doi]
- Expert and Non-Expert Attitudes towards (Secure) Instant MessagingAlexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie. 147-157 [doi]
- Snooping on Mobile Phones: Prevalence and TrendsDiogo Marques, Ildar Muslukhov, Tiago João Guerreiro, Luís Carriço, Konstantin Beznosov. 159-174 [doi]
- Understanding Password Choices: How Frequently Entered Passwords Are Re-used across WebsitesRick Wash, Emilee J. Rader, Ruthie Berman, Zac Wellmer. 175-188 [doi]
- A Study of Authentication in Daily LifeShrirang Mare, Mary Baker, Jeremy Gummeson. 189-206 [doi]
- Use the Force: Evaluating Force-Sensitive Authentication for Mobile DevicesKatharina Krombholz, Thomas Hupperich, Thorsten Holz. 207-219 [doi]
- Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for SmartphonesLalit Agarwal, Hassan Khan, Urs Hengartner. 221-236 [doi]
- Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security OperationsSathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan. 237-251 [doi]
- Productive Security: A Scalable Methodology for Analysing Employee Security BehavioursAdam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse. 253-270 [doi]
- Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the USJeffrey Warshaw, Nina Taft, Allison Woodruff. 271-285 [doi]
- Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared DataMainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate. 287-299 [doi]
- Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American UsersSadegh Torabi, Konstantin Beznosov. 301-320 [doi]
- How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy NoticesJoshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman M. Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal. 321-340 [doi]
- Addressing Physical Safety, Security, and Privacy for People with Visual ImpairmentsTousif Ahmed, Patrick Shaffer, Kay Connelly, David J. Crandall, Apu Kapadia. 341-354 [doi]