Abstract is missing.
- "Nobody's Happy": Design Insights from Privacy-Conscious Smart Home Power Users on Enhancing Data Transparency, Visibility, and ControlSunyup Park, Anna Lenhart, Michael Zimmer 0004, Jessica Vitak. [doi]
- Investigating Security Indicators for Hyperlinking Within the MetaverseMaximiliane Windl, Anna Scheidle, Ceenu George, Sven Mayer. [doi]
- An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers', Parents', and Bystanders' PerspectivesElmira Deldari, Diana Freed, Julio Poveda, Yaxing Yao. 1-17 [doi]
- Fight Fire with Fire: Hacktivists' Take on Social Media MisinformationFilipo Sharevski, Benjamin Kessell. 19-36 [doi]
- "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in PakistanAfaq Ashraf, Afaq Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa. 37-56 [doi]
- Checking, nudging or scoring? Evaluating e-mail user security toolsSarah Y. Zheng, Ingolf Becker. 57-76 [doi]
- Understanding the Viability of Gmail's Origin Indicator for Identifying the SenderEnze Liu 0001, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, Imani N. S. Munyaka. 77-95 [doi]
- 'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation CenterLeon Kersten, Tom Mulders, Emmanuele Zambon, Chris Snijders, Luca Allodi. 97-111 [doi]
- Exploring the Security Culture of Operational Technology (OT) Organisations: the Role of External Consultancy in Overcoming Organisational BarriersStefanos Evripidou, Uchenna Daniel Ani, Stephen Hailes, Jeremy D. McK. Watson. 113-129 [doi]
- Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security ManagersJonas Hielscher, Markus Schöps, Uta Menges, Marco Gutfleisch, Mirko Helbling, M. Angela Sasse. 131-150 [doi]
- What can central bank digital currency designers learn from asking potential users?Svetlana Abramova, Rainer Böhme, Helmut Elsinger, Helmut Stix, Martin Summer. 151-170 [doi]
- "Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager SetupSabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl. 171-190 [doi]
- Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information SecurityEva Gerlitz, Maximilian Häring, Matthew Smith 0001, Christian Tiefenau. 191-210 [doi]
- Dissecting Nudges in Password Managers: Simple Defaults are PowerfulSamira Zibaei, Amirali Salehi-Abari, Julie Thorpe. 211-225 [doi]
- Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is LostEva Gerlitz, Maximilian Häring, Charlotte Theresa Mädler, Matthew Smith 0001, Christian Tiefenau. 227-243 [doi]
- Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor AuthenticationMark Turner 0014, Martin Schmitz, Morgan Masichi Bierey, Mohamed Khamis, Karola Marky. 245-261 [doi]
- Prospects for Improving Password SelectionJoram Amador, Yiran Ma, Summer Hasama, Eshaan Lumba, Gloria Lee, Eleanor Birrell. 263-282 [doi]
- Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security AdviceLorenzo Neil, Harshini Sri Ramulu, Yasemin Acar, Bradley Reaves. 283-299 [doi]
- Towards Usable Security Analysis Tools for Trigger-Action ProgrammingMcKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia 0001, Yuan Tian 0001. 301-320 [doi]
- On the Recruitment of Company Developers for Security Studies: Results from a Qualitative Interview StudyRaphael Serafini, Marco Gutfleisch, Stefan Horstmann, Alena Naiakshina. 321-340 [doi]
- SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable SecurityAnna-Marie Ortloff, Christian Tiefenau, Matthew Smith 0001. 341-359 [doi]
- GuardLens: Supporting Safer Online Browsing for People with Visual ImpairmentsSmirity Kaushik, Natã M. Barbosa, Yaman Yu, Tanusree Sharma, Zachary Kilhoffer, Jooyoung Seo, Sauvik Das, Yang Wang 0005. 361-380 [doi]
- Iterative Design of An Accessible Crypto Wallet for Blind UsersZhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang 0005. 381-398 [doi]
- Youth understandings of online privacy and security: A dyadic study of children and their parentsOlivia Williams, Yee-Yin Choong, Kerrianne Buchanan. 399-416 [doi]
- ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image ContentZhuohao (Jerry) Zhang, Smirity Kaushik, Jooyoung Seo, Haolin Yuan, Sauvik Das, Leah Findlater, Danna Gurari, Abigale Stangl, Yang Wang 0005. 417-436 [doi]
- Evaluating the Impact of Community Oversight for Managing Mobile Privacy and SecurityMamtaj Akter, Madiha Tabassum, Md. Nazmus Sakib Miazi, Leena Alghamdi, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford. 437-456 [doi]
- Data Privacy and Pluralistic IgnoranceEmilee Rader. 457-471 [doi]
- Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure emailWarda Usman, Jackie Hu, McKynlee Wilson, Daniel Zappala. 473-490 [doi]
- "Is Reporting Worth the Sacrifice of Revealing What I've Sent?": Privacy Considerations When Reporting on End-to-End Encrypted PlatformsLeijie Wang, Ruotong Wang 0004, Sterling Williams-Ceci, Sanketh Menda, Amy X. Zhang. 491-508 [doi]
- Evaluating User Behavior in Smartphone Security: A Psychometric PerspectiveHsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir. 509-524 [doi]
- Privacy Mental Models of Electronic Health Records: A German Case StudyRebecca Panskus, Max Ninow, Sascha Fahl, Karola Marky. 525-542 [doi]
- Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End UserHussein Hazazi, Mohamed Shehab. 559-577 [doi]
- "There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the futurePatrick Gage Kelley, Celestina Cornejo, Lisa Hayes, Ellie Shuo Jin, Aaron Sedley, Kurt Thomas, Yongwei Yang, Allison Woodruff. 579-603 [doi]