Abstract is missing.
- Who Watches the Birdwatchers? Sociotechnical Vulnerabilities in Twitter's Content ContextualisationGarfield Benjamin. 3-23 [doi]
- Provenance Navigator: Towards More Usable Privacy and Data Management Strategies for Smart AppsSandeep Gupta, Matteo Camilli, Maria Papaioannou. 24-42 [doi]
- Bringing Crypto Knowledge to School: Examining and Improving Junior High School Students' Security Assumptions About Encrypted Chat AppsLeonie Schaewitz, Cedric A. Lohmann, Konstantin Fischer, M. Angela Sasse. 43-64 [doi]
- Can Security Be Decentralised? - The Case of the PGP Web of TrustAshwin J. Mathew. 67-85 [doi]
- "I'm Doing the Best I Can." - Understanding Technology Literate Older Adults' Account Management StrategiesMelvin Abraham, Michael Crabb, Sasa Radomirovic. 86-107 [doi]
- Found in Translation: Co-design for Security ModellingAlbesë Demjaha, David J. Pym, Tristan Caulfield. 108-128 [doi]
- Positioning Diplomacy Within a Strategic Response to the Cyber Conflict ThreatKaren Renaud, Amel Attatfa, Tony Craig. 131-152 [doi]
- SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in HealthcareFaiza Tazi, Josiah Dykstra, Prashanth Rajivan, Sanchari Das. 153-181 [doi]
- Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?Katharina Schiller, Florian Adamsky. 182-193 [doi]
- Towards Detection of AI-Generated Texts and MisinformationAhmad Najee-Ullah, Luis Landeros, Yaroslav Balytskyi, Sang-Yoon Chang. 194-205 [doi]