Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19
Adam Shostack & Josiah Dykstra
Towards Foundational Security Metrics
Nilofar Mansourzadeh & Anil Somayaji
Function Extraction, A New Paradigm for Producing Secure Code
Richard Linger, Mark Pleszkoch, Ali Mili, John Mchugh, Wided Ghardallou, Jack Mcgaughey
Balancing Security and Longevity: Benefits of Modular IoT Infrastructure
Maxwell Keleher, David Barrera, Sonia Chiasson
‘Debunk-It-Yourself’: Health Professionals’ Strategies for Responding to Misinformation on TikTok
Filipo Sharevski, Jennifer Vander Loop, Amy Devine, Peter Jachim, Sanchari Das
When Data Breaches Happen, Where Does the Buck Stop ... and Where Should it Stop?
Partha Das Chowdhury, Karen V. Renaud, Awais Rashid
Public Security User Interfaces: Supporting Spontaneous Engagement with IT Security
Doruntina Murtezaj, Viktorija Paneva, Verena Distler, Florian Alt
Adopting a Systemic Design Approach to Cyber Security Incident Response
Emma Woodward, Barnaby Craggs, Adam Joinson, Danaë Stanton Fraser
Is Crowdsourcing a Puppet Show? Detecting a New Type of Fraud in Online Platforms
Shengqian Wang, Israt Jahan Jui, Julie Thorpe
Don’t Patch the Researcher, Patch the Game: A Systematic Approach for Responsible Research via Federated IRBs
Alexandra Dirksen, Sebastian Giessler, Hendrik Erz, Martin Johns, Tobias Fiebig