Abstract is missing.
- Security requirements engineering via commitmentsFabiano Dalpiaz, Elda Paja, Paolo Giorgini. 1-8 [doi]
- Information security as organizational power: A framework for re-thinking security policiesPhilip Inglesant, Martina Angela Sasse. 9-16 [doi]
- Controlled data sharing in E-healthIlaria Matteucci, Paolo Mori, Marinella Petrocchi, Luca Wiegand. 17-23 [doi]
- An approach to measure effectiveness of control for risk analysis with game theoryLisa Rajbhandari, Einar Snekkenes. 24-29 [doi]
- Camera use in the public domain: Towards a "Big Sister" approachManon van der Sar, Ingrid Mulder, Sunil Choenni. 30-36 [doi]
- User study of the improved Helios voting system interfacesFatih Karayumak, Michaela Kauer, Maina M. Olembo, Tobias Volk, Melanie Volkamer. 37-44 [doi]
- Information security management systems and socio-technical walkthroughsKai-Uwe Loser, Alexander Nolte, Thomas Herrmann, Haiko te Neues. 45-51 [doi]
- On-line trust perception: What really mattersElisa Costante, Jerry den Hartog, Milan Petkovic. 52-59 [doi]
- Trustworthy and effective communication of cybersecurity risks: A reviewJason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts. 60-68 [doi]