Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)

View More Papers

Programmer's Perception of Sensitive Information in Code

Xinyao Ma, Ambarish Aniruddha Gurjar, Anesu Christopher Chaora, Tatiana R Ringenberg, L. Jean Camp (Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington)

Read More

Towards Integrating Human-Centered Cybersecurity Research Into Practice: A Practitioner...

Julie Haney, Clyburn Cunningham, Susanne Furman (National Institute of Standards and Technology)

Read More

What Makes Phishing Simulation Campaigns (Un)Acceptable? A Vignette Experiment

Jasmin Schwab (German Aerospace Center (DLR)), Alexander Nussbaum (University of the Bundeswehr Munich), Anastasia Sergeeva (University of Luxembourg), Florian Alt (University of the Bundeswehr Munich and Ludwig Maximilian University of Munich), and Verena Distler (Aalto University)

Read More

Designing a Mobile App to Support Social Processes for...

Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)

Read More