Abstract is missing.
- "Hello, is this Anna?": Unpacking the Lifecycle of Pig-Butchering ScamsRajvardhan Oak, Zubair Shafiq. 1-18 [doi]
- Language as Lure: A Naturalistic Study on Pasifika Phishing SusceptibilityEric Spero, Isa Seow, Lucas Betts, Eddie Fuatimau, Robert Biddle, Danielle M. Lottridge, Giovanni Russello. 19-35 [doi]
- Can You Walk Me Through It? Explainable SMS Phishing Detection using LLM-based AgentsYizhu Wang, Haoyu Zhai, Chenkai Wang, Qingying Hao, Nick A. Cohen, Roopa Foulger, Jonathan A. Handler, Gang Wang 0011. 37-56 [doi]
- Victims, Vigilantes, and Advice Givers: An Analysis of Scam-Related Discourse on RedditRajvardhan Oak, Zubair Shafiq. 57-71 [doi]
- "You go now! No trouble!" Understanding the Offboarding Process in Companies from an IT Security PerspectiveChristina Detsika, Timo Jagusch, Nora Weidner, Larissa Weir, Florin Martius, Christian Tiefenau. 73-92 [doi]
- Safety Perceptions of Generative AI Conversational Agents: Uncovering Perceptual Differences in Trust, Risk, and FairnessJan Tolsdorf, Alan F. Luo, Monica Kodwani, Junho Eum, Mahmood Sharif, Michelle L. Mazurek, Adam J. Aviv. 93-112 [doi]
- "We are not Future-ready": Understanding AI Privacy Risks and Existing Mitigation Strategies from the Perspective of AI Developers in EuropeAlexandra Klymenko, Stephen Meisenbacher, Patrick Gage Kelley, Sai Teja Peddinti, Kurt Thomas, Florian Matthes. 113-132 [doi]
- Integrating Large Language Models into Security Incident ResponseDiana Kramer, Lambert Rosique, Ajay Narotam, Elie Bursztein, Patrick Gage Kelley, Kurt Thomas, Allison Woodruff. 133-148 [doi]
- Youth-Centered GAI Risks (YAIR): A Taxonomy of Generative AI Risks from Empirical DataYaman Yu, Yiren Liu, Jacky Zhang, Yun Huang 0003, Yang Wang 0005. 149-165 [doi]
- Shiny Shells, Rusty Cores: A Crowdsourced Security Evaluation of Integrated Web BrowsersGertjan Franken, Pieter Claeys, Tom van Goethem, Lieven Desmet. 167-184 [doi]
- Spy-oT: Understanding How Users Learn to Use Internet of Things Devices For Abusive PurposesKieron Ivy Turk, Alice Hutchings. 185-203 [doi]
- Smart Spaces, Private Lives: A Culturally Grounded Examination of Privacy Tensions in Smart HomesYara Alsiyat, Yuanhaur Chang, Ning Zhang 0017, Ivan Flechais. 205-224 [doi]
- Playing in the Sandbox: A Study on the Usability of SeccompMaysara Alhindi, Joseph Hallett. 225-240 [doi]
- Between Court Orders and Platform Policies: Understanding Law Enforcement and Meta Interactions in Addressing Non-Consensual Image Disclosure AbuseAmna Batool, Kentaro Toyama. 241-258 [doi]
- Minoritised Ethnic People's Security and Privacy Concerns and Responses towards Essential Online ServicesAunam Quyoum, Mark Wong, Sebati Ghosh, Siamak F. Shahandashti. 259-278 [doi]
- User Understandings of Technical Terms in App Privacy LabelsIshika Keswani, Kerick Walker, Adrian Clement, Eusila Kitur, Nannapas Wonghirundacha, Ryan Aubrey, Vivien Song, Eleanor Birrell. 279-298 [doi]
- Do You See If I See? Investigating Reciprocity in Interpersonal Access-Control Settings (in the U.S.)Nathan Malkin, Alan F. Luo, Evan J. Zhao, Michelle L. Mazurek. 299-315 [doi]
- "TikTok, Do Your Thing": User Reactions to Social Surveillance in the Public SphereMeira Gilbert, Miranda Wei, Lindah Kotut. 317-334 [doi]
- Measuring NIST Authentication Standards Compliance by Higher Education InstitutionsNoah J. Apthorpe, Boen Beavers, Yan Shvartzshnaider, Brett Frischmann. 335-350 [doi]
- The more accounts I use, the less I have to think': A Longitudinal Study on the Usability of Password Managers for Novice UsersPatricia Arias Cabarcos, Peter Mayer 0001. 351-369 [doi]
- From TOTPs to Security Keys: Studying the Reality of Passwordless FIDO2 Authentication With PIN and Biometrics in a Corporate EnvironmentLeona Lassak, Nicklas Lindemann, Marvin Kowalewski. 371-389 [doi]
- Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in KenyaKaren Sowon, Collins W. Munyendo, Lily Klucinec, Eunice Maingi, Gerald Suleh, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye. 391-413 [doi]
- I never reuse passwords! Development and Validation of a Security and Privacy Social Desirability Scale (SP-SDS) for end users without a background in computer scienceLaura Marie Abels, Matthew Smith 0001, Anna-Marie Ortloff. 415-434 [doi]
- Replication: "No one can hack my mind" - 10 years later: An update and outlook on experts' and non-experts' security practices and adviceAnna-Marie Ortloff, Jenny Tang, Arthi Arumugam, Daniel Huschina, Lisa Geierhaas, Florin Martius, Luisa Jansen, Kolja von der Twer, Lilly Jungbluth, Matthew Smith 0001. 435-454 [doi]
- More than Usability: Differential Access to Digital Security and PrivacyAnnalina Buckmann, Jan Magnus Nold, Yasemin Acar, Yixin Zou. 455-474 [doi]
- Misuse, Misreporting, Misinterpretation of Statistical Methods in Usable Privacy and Security PapersJenny Tang, Lujo Bauer, Nicolas Christin. 475-493 [doi]
- Trust-Enabled Privacy: Social Media Designs to Support Adolescent User Boundary RegulationJaewon Kim, Robert Wolfe, Ramya Bhagirathi Subramanian, Mei-Hsuan Lee, Jessica Colnago, Alexis Hiniker. 495-514 [doi]
- How Predatory Monetization Designs Manifest in Child-Friendly Video GamesQiurong Song, ZiNan Zhang, Rie Helene (Lindy) Hernandez, Xinning Gui, Yubo Kou. 515-534 [doi]
- Unpacking the Social and Emotional Dimensions of Security and Privacy User EngagementNina Gerber, Verena Zimmermann, Alexandra von Preuschen, Karen Renaud. 535-554 [doi]
- Adopting AI to Protect Industrial Control Systems: Assessing Challenges and Opportunities from the Operators' PerspectiveClement Fung, Eric Zeng 0001, Lujo Bauer. 555-573 [doi]