- Alessandro Acquisti, CMU:
What Can Behavioral Economics Teach Us About Privacy?
Privacy in Electronic Commerce and the Economics of Immediate Gratification - Andrew Adams, Meiji University:
What’s Yours is Mine and What’s Mine’s My Own
Emerging Social Norms in the UK and Japan on Privacy and Revelation in SNS
Student Assessment in the Ubiquitously Connected World - Ross Anderson, University of Cambridge:
Book chapters on psychology and terror
It’s the Anthropology, Stupid - Matt Blaze, University of Pennsylvania:
Toward a Broader View of Security Protocols - Joe Bonneau, Cambridge:
The Password Thicket: Technical and Market Failures in Human Authentication on the Web
The Privacy Jungle: On the Market for Privacy in Social Networks
The science of guessing: analyzing an anonymized corpus of 70 million passwords
A birthday present every eleven wallets? The security of customer-chosen banking PINs
Linguistic properties of multi-word passphrases - Pam Briggs, Northumbria:
Case Study: The Impact of Using Location-Based Services with a Behaviour-Disordered Child
Ubiquitous Systems and the Family: Thoughts about the Networked Home
Biometric Daemons: Authentication via Electronic Pets - William Burns, Decision Research:
Special issue of Risk Analysis - Jean Camp, School of Informatics, Indiana University:
Privacy Framework for Older Adults - Luke Church, Cambridge
- Dave Clark, MIT:
A Social Embedding of Network Security – Trust, Constraint, Power and Control - Richard Clayton, Cambridge
- Eric Davis, Google
- Dylan Evans, UCC:
Projection Point: Online Risk Intelligence Test - Allan Friedman, Brookings
- Diego Gambetta, Oxford
- Virgil Gligor, Carnegie Mellon
- Rachel Greenstadt, Drexel:
Learning to Extract Quality Discourse in Online Communities - Jeff Hancock, Cornell University:
Detecting Fake Hotel Reviews - Cormac Herley:
Where Do All the Attacks Go?
Sex, Lies and Cyber-crime Surveys - Chris Hoofnagle, Berkeley Center for Law and Technology, Boalt Hall School of Law, University of California-Berkeley:
Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning - Markus Jakobsson, PayPal:
Reduce spoofing by 80%
Fastwords—Faster and More Secure User Authentication - Richard John, USC:
Decision Analysis by Proxy for the Rational Terrorist - Eric Johnson, Tuck School of Business, Dartmouth University:
Access Flexibility with Escalation and Audit
Security through Information Risk Management - Adam Joinson, University of Bath:
Digital Crowding
Privacy Dictionary - Jaeyeon Jung, Microsoft:
TaintDroid: realtime privacy monitoring tools on Android devices
WiFi Privacy Ticker: a tool for improving awareness and control of personal information exposure on WiFi
AppFence: a system to protect user data from Android applications - Grainne Kirwan, Dun Laoghaire Institute of Art, Design, and Technology
The Psychology of Cyber Crime
Presence and the Victims of Crime in Online Virtual Worlds - Ben Laurie, Google
- Steven A. LeBlanc, Harvard
- Mark Levine, Lancaster University:
Intra-group Regulation of Violence: Bystanders and the (De)-escalation of Violence - David Modic, Exeter:
How neurotic are scam victims, really? The big five and Internet scams
Preferences between risky prospects with virtual tender - Tyler Moore, Cambridge/Harvard:
Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems
The Consequences of Non-Cooperation in the Fight Against Phishing
Information Security Economics – and Beyond - John Mueller, Ohio State:
Terror, Security, and Money (Book website) - Bashar Nuseibeh, Open University:
A Multi-Pronged Empirical Approach to Mobile Privacy Investigation
Security Requirements Engineering: A Framework for Representation and Analysis - Andrew Odlyzko, University of Minnesota:
Providing Security with Insecure Systems
Economics, Psychology, and Sociology of Security; Bubbles, Gullibility, and Other Challenges for Economics, Psychology, Sociology, and Information Sciences - Christoph Paar, Ruhr University Bochum
- Sandra Petronio, IUPUI:
Regulating the Privacy of Confidentiality
Unpacking the Paradoxes of Privacy in CMC Relationships: The Challenges of Blogging and Relational Communication on the Internet - Rob Reeder, Microsoft:
Helping Engineers Design NEAT Security Warnings
More than Skin Deep: Measuring the Effects of the Underlying Model on Access-Control System Usability - Peter Robinson, Cambridge:
Affective Computing - Jeffrey Rosen, George Washington Univ.
- Angela Sasse, University College London:
Not Seeing the Crime for the Cameras?
The True Cost of Unusable Password Policies - Stuart Schechter, Harvard/Microsoft:
Popularity is Everything: A New Approach to Protecting Passwords from Statistical-guessing Attacks
It’s No Secret: Measuring the Security and Reliability of Authentication via ‘Secret’ Questions - Bruce Schneier, BT:
Liars and Outliers: Enabling the Trust that Society Needs to Thrive - Umesh Shankar, Google:
Doppelganger: Better Browser Privacy Without the Bother - Adam Shostack, Microsoft
- David Livingstone Smith, University of New England
- Ashkan Soltani
- Frank Stajano, Cambridge:
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
Pico: No More Passwords!
Understanding Scam Victims: Seven Principles for Systems Security
It’s the Anthropology, Stupid - Peter Swire, Ohio State University:
Encryption and Globalization
Going Dark vs. a Golden Age of Surveillance - Paul Syverson, Naval Research Laboratory
- Terence Taylor, International Council for the Life Sciences:
Darwinian Security
Natural Security (A Darwinian Approach to a Dangerous World) - Rahul Telang, Heinz School, Carnegie Mellon University:
Does Competition Improve Security? - Robert Trivers, Rutgers:
The Folly of Fools: The Logic of Deceit and Self-Deception in Human Life - Rick Wash, Michigan State:
Folk Models of Home Computer Security
Stories as Informal Lessons About Security - Alma Whitten, Google:
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0 - Jeff Yan, Newcastle University:
Security and Usability of CAPTCHAs
The Memorability and Security of Passwords – Some Empirical Results