Abstract is missing.
- Decision Justifications for Wireless Network SelectionDebora Jeske, Lynne M. Coventry, Pamela Briggs. 1-7 [doi]
- Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider ThreatOliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese. 8-15 [doi]
- Modelling User Devices in Security CeremoniesTaciane Martimiano, Jean Everson Martina, Maina M. Olembo, Marcelo Carlomagno Carlos. 16-23 [doi]
- The Social Engineering Personality FrameworkSven Uebelacker, Susanne Quiel. 24-30 [doi]
- Modeling Human Behaviour with Higher Order Logic: Insider ThreatsJaap Boender, Marieta Georgieva Ivanova, Florian Kammüller, Giuseppe Primiero. 31-39 [doi]
- What You Enter Is What You Sign: Input Integrity in an Online Banking EnvironmentSven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen. 40-47 [doi]
- Using Statistical Information to Communicate Android Permission Risks to UsersLydia Kraus, Ina Wechsung, Sebastian Möller. 48-55 [doi]