Abstract is missing.
- The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systemsAlberto Zanutto, Ben Shreeve, Karolina Follis, Jerry S. Busby, Awais Rashid. [doi]
- Inclusive persuasion for security software adoptionEunjin Jung, Evelyn Y. Ho. [doi]
- You Want Me To Do What? A Design Study of Two-Factor Authentication MessagesElissa M. Redmiles, Everest Liu, Michelle L. Mazurek. [doi]
- Modeling Aggregate Security with User Agents that Employ Password Memorization TechniquesChristopher Novak, Jim Blythe, Ross Koppel, Vijay Kothari, Sean W. Smith. [doi]
- Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of RiskAndrew M'manga, Shamal Faily, John McAlaney, Christopher Williams. [doi]
- Augmenting Centralized Password Management with Application-Specific PasswordsTrevor-Smith, Scott Ruoti, Kent E. Seamons. [doi]
- Touchscreen Biometrics Across Multiple DevicesTuan Ngyuen, Jonathan Voris. [doi]
- On the Design of Distributed Adaptive Authentication SystemsPatricia Arias Cabarcos, Christian Krupitzer. [doi]
- Smartwatches Locking Methods: A Comparative StudyToan Nguyen, Nasir D. Memon. [doi]
- Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafeHuichuan Xia, Yun Huang, Yang Wang 0005. [doi]
- Comparing Educational Approaches to Secure programming: Tool vs. TAMadiha Tabassum, Stacey Watson, Heather Richter Lipford. [doi]
- Formal Mental Models for Inclusive Privacy and SecurityAdam Houser, Matthew L. Bolton. [doi]
- A Proposed Visualization for Vulnerability Scan DataStacey Watson, Heather Richter Lipford. [doi]
- Key-bored to Tears: The Usability Cost of Character Authentication on Mobile DevicesAnn-Marie Horcher. [doi]
- Ask Me Anything: A Conversational Interface to Augment Information Security WorkersBobby Filar, Richard Seymour, Matthew Park. [doi]
- Learning System-assigned Passwords: A Preliminary Study on the People with Learning DisabilitiesSonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright. [doi]
- A Gamified Approach to Improve Users' Memorability of Fall-back AuthenticationNicholas Micallef, Nalin Asanka Gamagedara Arachchilage. [doi]
- Skills and Characteristics of Successful Cybersecurity AdvocatesJulie M. Haney, Wayne G. Lutters. [doi]
- Security and privacy design considerations for low-literate users in developing regionsShrirang Mare, Aditya Vashistha, Richard J. Anderson. [doi]
- "I want my money back!" Limiting Online Password-Guessing FinanciallyMaximilian Golla, Daniel V. Bailey, Markus Dürmuth. [doi]
- Diversify to Survive: Making Passwords Stronger with Adaptive PoliciesSean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek. 1-12 [doi]
- A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016Peter Mayer, Jan Kirchner, Melanie Volkamer. 13-28 [doi]
- Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging ApplicationsElham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent E. Seamons, Daniel Zappala. 29-47 [doi]
- "...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking BehaviorYusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen. 49-63 [doi]
- End User Security and Privacy Concerns with Smart HomesEric Zeng, Shrirang Mare, Franziska Roesner. 65-80 [doi]
- Security Developer Studies with GitHub Users: Exploring a Convenience SampleYasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl. 81-95 [doi]
- Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money ServicesJasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler. 97-114 [doi]
- A Qualitative Investigation of Bank Employee Experiences of Information Security and PhishingDan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen. 115-129 [doi]
- DigiTally: Piloting Offline Payments for PhonesKhaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla. 131-143 [doi]
- Turtle Guard: Helping Android Users Apply Contextual Privacy PreferencesLynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner 0001, Nathan Good, Jung-Wei Chen. 145-162 [doi]
- Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke DynamicsHeather Crawford, Ebad Ahmadzadeh. 163-173 [doi]
- Impact of User Characteristics on Attitudes Towards Automatic Mobile Application UpdatesArunesh Mathur, Marshini Chetty. 175-193 [doi]
- Exploring decision making with Android's runtime permission dialogs using in-context surveysBram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft. 195-210 [doi]
- Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security PostureScott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons. 211-228 [doi]
- How Effective is Anti-Phishing Training for Children?Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger. 229-239 [doi]
- "I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping StrategiesKopo M. Ramokapane, Awais Rashid, Jose M. Such. 241-256 [doi]
- The importance of visibility for folk theories of sensor dataEmilee J. Rader, Janine Slaker. 257-270 [doi]
- Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability MetricsCasey Inez Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas. 271-284 [doi]
- Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detectionJames Nicholson, Lynne M. Coventry, Pam Briggs. 285-298 [doi]
- Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase IntentionsSonam Samat, Alessandro Acquisti, Linda Babcock. 299-319 [doi]
- Using chatbots against voice spam: Analyzing Lenny's effectivenessMerve Sahin, Marc Relieu, Aurélien Francillon. 319-337 [doi]
- Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?Yu Pu, Jens Grossklags. 339-355 [doi]
- Self-driving cars and data collection: Privacy perceptions of networked autonomous vehiclesCara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer. 357-375 [doi]
- Format vs. Content: The Impact of Risk and Presentation on Disclosure DecisionsSonam Samat, Alessandro Acquisti. 377-384 [doi]
- New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity NetworkKevin Gallagher, Sameer Patil, Nasir D. Memon. 385-398 [doi]
- Privacy Expectations and Preferences in an IoT WorldPardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh. 399-412 [doi]