Abstract is missing.
- Fidelity of Statistical Reporting in 10 Years of Cyber Security User StudiesThomas Groß 0001. 3-26 [doi]
- "I Don't Know Too Much About It": On the Security Mindsets of Computer Science StudentsMohammad Tahaei, Adam Jenkins, Kami Vaniea, Maria Wolters. 27-46 [doi]
- Data, Data, Everywhere: Quantifying Software Developers' Privacy AttitudesDirk van der Linden, Irit Hadar, Matthew Edwards 0001, Awais Rashid. 47-65 [doi]
- You've Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in OrganizationsAlbesë Demjaha, Simon Parkin, David J. Pym. 66-86 [doi]
- What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping StudyAna Magazinius, Niklas Mellegård, Linda Olsson. 89-106 [doi]
- Association Attacks in IEEE 802.11: Exploiting WiFi Usability FeaturesGeorge Chatzisofroniou, Panayiotis Kotzanikolaou. 107-123 [doi]
- A Security Analysis of the Danish Deposit Return SystemIvan Garbacz, Rosario Giustolisi, Kasper Møller Nielsen, Carsten Schürmann. 124-139 [doi]
- Moving to Client-Side Hashing for Online AuthenticationEnka Blanchard, Xavier Coquand, Ted Selker. 140-156 [doi]
- A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive ServicesGianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Paolo Santi. 159-174 [doi]
- Case Study: Disclosure of Indirect Device Fingerprinting in Privacy PoliciesJulissa Milligan, Sarah Scheffler, Andrew Sellars, Trishita Tiwari, Ari Trachtenberg, Mayank Varia. 175-186 [doi]
- Investigating the Effect of Incidental Affect States on Privacy Behavioral IntentionUchechi Phyllis Nwadike, Thomas Groß. 187-210 [doi]
- Which Properties Has an Icon? A Critical Discussion on Data Protection IconographyArianna Rossi, Gabriele Lenzini. 211-229 [doi]