Abstract is missing.
- Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment ScenariosMelanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer. 1-11 [doi]
- User Behaviors and Attitudes Under Password Expiration PoliciesHana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. 13-30 [doi]
- The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi ArabiansElham Al Qahtani, Mohamed Shehab, Abrar Aljohani. 31-46 [doi]
- Action Needed! Helping Users Find and Complete the Authentication Ceremony in SignalElham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent E. Seamons, Daniel Zappala. 47-62 [doi]
- Informal Support Networks: an investigation into Home Data Security PracticesNorbert Nthala, Ivan Flechais. 63-82 [doi]
- Share and Share Alike? An Exploration of Secure Behaviors in Romantic RelationshipsCheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason I. Hong. 83-102 [doi]
- Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online TrackingArunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty. 103-116 [doi]
- Can Digital Face-Morphs Influence Attitudes and Online Behaviors?Sonam Samat, Eyal Péer, Alessandro Acquisti. 117-125 [doi]
- "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South AsiaNithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, Elizabeth Churchill. 127-142 [doi]
- "You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive PhotographyYasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su. 143-157 [doi]
- Away From Prying Eyes: Analyzing Usage and Understanding of Private BrowsingHana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor. 159-175 [doi]
- Online Privacy and Aging of Digital ArtifactsReham Ebada Mohamed, Sonia Chiasson. 177-195 [doi]
- "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data BreachYixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub. 197-216 [doi]
- Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed DataSowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu. 217-234 [doi]
- User Comfort with Android Background Resource Accesses in Different ContextsDaniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster. 235-250 [doi]
- Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled GardensOrçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten. 251-263 [doi]
- Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API MisusePeter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl. 265-281 [doi]
- Security in the Software Development LifecycleHala Assal, Sonia Chiasson. 281-296 [doi]
- Deception Task Design in Developer Password Studies: Exploring a Student SampleAlena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith 0001. 297-313 [doi]
- API Blindspots: Why Experienced Developers Write Vulnerable CodeDaniela Seabra Oliveira, Tian Lin, Muhammad Sajidur Rahman, Rad Akefirad, Donovan Ellis, Eliany Perez, Rahul Bobhate, Lois DeLong, Justin Cappos, Yuriy Brun. 315-328 [doi]
- "If I press delete, it's gone" - User Understanding of Online Data Deletion and ExpirationAmbar Murillo, Andreas Kramm, Sebastian Schnorf, Alexander De Luca. 329-339 [doi]
- Programming Experience Might Not Help in Comprehending Obfuscated Source Code EfficientlyNorman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson. 341-356 [doi]
- "We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic ProductsJulie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman. 357-373 [doi]
- A Comparative Usability Study of Key Management in Secure EmailScott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons. 375-394 [doi]
- When is a Tree Really a Truck? Exploring Mental Models of EncryptionJustin Wu, Daniel Zappala. 395-409 [doi]
- "It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of SecurityJulie M. Haney, Wayne G. Lutters. 411-425 [doi]
- Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual RealityDevon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, Elissa M. Redmiles. 427-442 [doi]
- Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber ProtectionJames Nicholson, Lynne M. Coventry, Pam Briggs. 443-457 [doi]