Choose Your Own Authentication (DOI)
Alain Forget, Sonia Chiasson, Robert Biddle
The Myth of the Average User: Improving Privacy and Security Systems through Individualization (DOI)
Serge Egelman, Eyal Peer
Milware: Identification and Implications of State Authored Malicious Software (DOI)
Trey Herr, Eric Armbrust
Exploiting the Physical Environment for Securing the Internet of Things (DOI)
Christian T. Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar
Examining the Contribution of Critical Visualisation to Information Security (DOI)
Peter Hall, Claude Heath, Lizzie Coles-Kemp, Axel Tanner
Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the risk perceptions and emotions that drive security behaviors (DOI)
Odette Beris, Adam Beautement, M. Angela Sasse
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security (DOI)
Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira, Simon Parkin, Sven Uebelacker
Towards Managed Role Explosion (DOI)
Aaron Elliott, Scott Knight
"If you were attacked, you'd be sorry": Counterfactuals as security arguments (DOI)
Cormac Herley, Wolter Pieters
Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security (DOI)
Mohammad Mannan, Arash Shahkar, Atieh Saberi Pirouz, Vladimir Rabotka
WebSheets: Web Applications for Non-Programmers (DOI)
Riccardo Pelizzi, R. Sekar
Bridging the Trust Gap: Integrating Models of Behavior and Perception (DOI)
Raquel Hill, Devan Ray Donaldson