Abstract is missing.
- How Can Personality Influence Perception on Security of Context-Aware Applications?Nelly Condori-Fernández, Franci Suni Lopez, Denisse Muñante, Maya Daneva. 3-22 [doi]
- Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of BehavioursSimon Parkin, Yi Ting Chua. 23-42 [doi]
- Natural Strategic Abilities in Voting ProtocolsWojciech Jamroga, Damian Kurpiewski, Vadim Malvone. 45-62 [doi]
- A Study of Targeted Telephone Scams Involving Live AttackersIan G. Harris, Ali Derakhshan, Marcel Carlsson. 63-82 [doi]
- User Privacy Concerns and Preferences in Smart BuildingsScott Harper, Maryam Mehrnezhad, John C. Mace. 85-106 [doi]
- Work in Progress: Towards Usable Updates for Smart Home DevicesJulie M. Haney, Susanne M. Furman. 107-117 [doi]
- WARChain: Blockchain-Based Validation of Web ArchivesImre Lendák, Balázs Indig, Gábor Palkó. 121-134 [doi]
- Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net ForumsSimon Butler 0002. 135-153 [doi]
- Self-Governing Public Decentralised Systems - Work in ProgressMoritz Platt, Peter McBurney. 154-167 [doi]
- Statistical Reliability of 10 Years of Cyber Security User StudiesThomas Groß. 171-190 [doi]
- Privacy, Security and Trust in the Internet of NeuronsDiego Sempreboni, Luca Viganò 0001. 191-205 [doi]