Abstract is missing.
- Replication: Stories as Informal Lessons about SecurityKatharina Pfeffer, Alexandra Mai, Edgar R. Weippl, Emilee Rader, Katharina Krombholz. 1-18 [doi]
- DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety MicrolearningRyo Yoshikawa, Hideya Ochiai, Koji Yatani. 19-37 [doi]
- Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A SiteAyako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama. 39-56 [doi]
- The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User's Quest for More Secure and Privacy-Preserving BehaviorNina Gerber, Karola Marky. 57-76 [doi]
- "I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing AttacksPeter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer. 77-96 [doi]
- Industrial practitioners' mental models of adversarial machine learningLukas Bieringer, Kathrin Grosse, Michael Backes 0001, Battista Biggio, Katharina Krombholz. 97-116 [doi]
- Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing AttitudesPatrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt. 117-134 [doi]
- Comparing User Perceptions of Anti-Stalkerware Apps with the Technical RealityMatthias Fassl, Simon Anell, Sabine Houy, Martina Lindorfer, Katharina Krombholz. 135-154 [doi]
- Users' Perceptions of Chrome Compromised Credential NotificationYue Huang, Borke Obada-Obieh, Konstantin Beznosov. 155-174 [doi]
- Exploring User-Suitable Metaphors for Differentially Private Data AnalysesFarzaneh Karegar, Ala Sarah Alaqra, Simone Fischer-Hübner. 175-193 [doi]
- An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User ControlMaina Korir, Simon Parkin, Paul Dunphy. 195-211 [doi]
- Usability and Security of Trusted Platform Module (TPM) Library APIsSiddharth Prakash Rao, Gabriela Limonta, Janne Lindqvist. 213-232 [doi]
- Increasing security without decreasing usability: A comparison of various verifiable voting systemsMelanie Volkamer, Oksana Kulyk, Jonas Ludwig, Niklas Fuhrberg. 233-252 [doi]
- Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing DetectionSarah Zheng, Ingolf Becker. 253-271 [doi]
- Evaluating the Usability of Privacy Choice MechanismsHana Habib, Lorrie Faith Cranor. 273-289 [doi]
- Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and ObstaclesAndrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Faith Cranor. 291-312 [doi]
- If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information WorkersNicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl. 313-330 [doi]
- Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructsJessica Colnago, Lorrie Faith Cranor, Alessandro Acquisti, Kate Hazel Stanton. 331-346 [doi]
- On recruiting and retaining users for security-sensitive longitudinal measurement panelsAkira Yamada 0001, Kyle Crichton, Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, Nicolas Christin. 347-366 [doi]
- Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security SurveysJenny Tang, Eleanor Birrell, Ada Lerner. 367-385 [doi]
- Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American WomenTanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, Florian Schaub. 387-406 [doi]
- An open door may tempt a saint: Examining situational and individual determinants of privacy-invading behaviorMarkus Langer, Rudolf Siegel, Michael Schilling 0001, Tim Hunsicker, Cornelius J. König. 407-426 [doi]
- Investigating How University Students in the United States Encounter and Deal With Misinformation in Private WhatsApp Chats During COVID-19K. J. Kevin Feng, Kevin Song, Kejing Li, Oishee Chakrabarti, Marshini Chetty. 427-446 [doi]
- Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child RelationshipsMiranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner. 447-462 [doi]
- "Fast, Easy, Convenient." Studying Adoption and Perception of Digital Covid CertificatesFranziska Herbert, Marvin Kowalewski, Theodor Schnitzler, Leona Lassak, Markus Dürmuth. 463-482 [doi]
- "As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based AuthenticationPhilipp Markert, Theodor Schnitzler, Maximilian Golla, Markus Dürmuth. 483-501 [doi]
- Let's Hash: Helping Developers with Password SecurityLisa Geierhaas, Anna-Marie Ortloff, Matthew Smith 0001, Alena Naiakshina. 503-522 [doi]
- Exploring User Authentication with Windows Hello in a Small Business EnvironmentFlorian M. Farke, Leona Lassak, Jannis Pinter, Markus Dürmuth. 523-540 [doi]
- Improving Password Generation Through the Design of a Password Composition Policy Description LanguageAnuj Gautam, Shan Lalani, Scott Ruoti. 541-560 [doi]
- Password policies of most top websites fail to follow best practicesKevin Lee, Sten Sjöberg, Arvind Narayanan. 561-580 [doi]
- Do Password Managers Nudge Secure (Random) Passwords?Samira Zibaei, Dinah Rinoa Malapaya, Benjamin Mercier, Amirali Salehi-Abari, Julie Thorpe. 581-597 [doi]
- Let The Right One In: Attestation as a Usable CAPTCHA AlternativeTara Whalen, Thibault Meunier, Mrudula Kodali, Alex Davidson, Marwan Fayed, Armando Faz-Hernández, Watson Ladd, Deepak Maram, Nick Sullivan, Benedikt Wolters, Maxime Guerreiro, Andrew Galloni. 599-612 [doi]
- Being Hacked: Understanding Victims' Experiences of IoT HackingAsreen Rostami, Minna Vigren, Shahid Raza, Barry Brown 0001. 613-631 [doi]
- Runtime Permissions for Privacy in Proactive Intelligent AssistantsNathan Malkin, David A. Wagner 0001, Serge Egelman. 633-651 [doi]
- Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy ManagementEmilee Rader. 653-670 [doi]
- Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary SharingJiayi Chen, Urs Hengartner, Hassan Khan. 671-685 [doi]
- Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect RelationshipsJulia Bernd, Ruba Abu-Salma, Junghyun Choy, Alisa Frik. 687-706 [doi]