Abstract is missing.
- Digital privacy and social capital on social network sites. friends or foes?Angeliki Kitsiou, Eleni Tzortzaki, Maria Sideri, Stefanos Gritzalis. 3-16 [doi]
- Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM applicationsAmir Herzberg, Hemi Leibowitz. 17-28 [doi]
- Influence tokens: analysing adversarial behaviour change in coloured petri netsPeter Carmichael, Charles Morisset, Thomas Groß 0001. 29-40 [doi]
- Case study: predicting the impact of a physical access control interventionTristan Caulfield, Simon Parkin. 37-46 [doi]
- Is your data gone?: measuring user perceptions of deletionSarah M. Diesburg, C. Adam Feldhaus, Mojtaba Al Fardan, Jonathan Schlicht, Nigel Ploof. 47-59 [doi]
- Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisionsNissy Sombatruang, M. Angela Sasse, Michelle Baddeley. 61-72 [doi]
- User trust assessment: a new approach to combat deceptionMarkus Jakobsson. 73-78 [doi]
- "I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency toolsJulia Earp, Jessica Staddon. 79-86 [doi]
- Proposing ambient visualization and pre-attentive processing for threat detectionSunny Fugate, Jamie Lukos, Robert Gutzwiller, Christopher Lester. 87-92 [doi]