Abstract is missing.
- The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data ControllersCostas Lambrinoudakis. 3-8  [doi]
 - An Inquiry into Perception and Usage of Smartphone Permission ModelsLena Reinfelder, Andrea Schankin, Sophie Russ, Zinaida Benenson. 9-22  [doi]
 - On the Hardness of Separation of Duties Problems for Cloud DatabasesFerdinand Bollwein, Lena Wiese. 23-38  [doi]
 - Three Tales of Disillusion: Benchmarking Property Preserving Encryption SchemesFrank Pallas, Martin Grambow. 39-54  [doi]
 - Evaluating the Privacy Properties of Secure VoIP MetadataJoão S. Resende, Patrícia R. Sousa, Luís Antunes 0002. 57-68  [doi]
 - Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy?Anand Paturi, Subhasish Mazumdar. 69-84  [doi]
 - Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk AssessmentMajed Alshammari, Andrew Simpson. 85-99  [doi]
 - PERSUADED: Fighting Social Engineering Attacks with a Serious GameDina Aladawy, Kristian Beckers, Sebastian Pape 0001. 103-118  [doi]
 - Developing and Evaluating a Five Minute Phishing Awareness VideoMelanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber. 119-134  [doi]
 - Biometrically Linking Document Leakage to the Individuals ResponsibleAbdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell. 135-149  [doi]
 - A Decision-Making Approach for Improving Organizations' Cloud Forensic ReadinessStavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis. 150-164  [doi]
 - Towards Blockchain-Based Identity and Access Management for Internet of Things in EnterprisesMartin Nuss, Alexander Puchta, Michael Kunz. 167-181  [doi]
 - Access Control Requirements for Physical Spaces Protected by Virtual PerimetersBrian Greaves, Marijke Coetzee, Wai Sze Leung. 182-197  [doi]
 - Towards the Definition of a Security Incident Response Modelling LanguageMyrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis, Emmanouil Panaousis. 198-212  [doi]
 - An Enhanced Cyber Attack Attribution FrameworkNikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis. 213-228  [doi]
 - A Comprehensive Methodology for Deploying IoT HoneypotsAntonio Acien, Ana Nieto, Gerardo Fernandez, Javier López 0001. 229-243  [doi]
 - Trustworthiness Cases - Toward Preparation for the Trustworthiness CertificationNazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel. 244-259  [doi]