Max Abrahms, Northeastern University
- The Political Effectiveness of Terrorism Revisited
- The Strategic Logic of Credit Claiming: A New Theory for Anonymous Terrorist Attacks
- What Terrorist Leaders Want: A Content Analysis of Terrorist Propaganda Videos
Alessandro Acquisti, Carnegie Mellon University
Andrew A. Adams, Meiji University
- Theorizing Deception: A Scoping Review of Theory in Research on Dark Patterns and Deceptive Design
- Facebook Code: Social Network Sites Platform
Affordances and Privacy - The Effects of Nudging a Privacy Setting Suggestion Algorithm’s Outputs on User Acceptability
Sadia Afroz, ICSI/Gen Digital Inc.
Luca Allodi, TU Eindhoven
- Cognition in Social Engineering Empirical Research:
A Systematic Literature Review - You Can Tell a Cybercriminal by the Company they Keep:
A Framework to Infer the Relevance of Underground Communities to the Threat Landscape - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale
Bonnie Anderson, Brigham Young University
Ross Anderson, Edinburgh and Cambridge
- No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment
- Chat Control or Child Protection?
Zinaida Benenson, University of Erlangen-Nuremberg
- Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities
- “You’re not smart enough for it. You can’t do it anyway.” – Experiences and Coping Strategies of Female System Administrators
Nancy N. Blackburn, University of Utah
- OGrES Welcome! Toward a Systematic Theory for Serious Game Design
- Player-Centric Procedural Content Generation: Enhancing Runtime Customization by Integrating Real-Time Player Feedback
Laura Brandimarte, University of Arizona
Miranda Bruce, Oxford and UNSW Canberra
- Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country
- Mapping the Global Geography of Cybercrime with the World Cybercrime Index
L. Jean Camp, Indiana University
- Security by Demand: The U.S. Cyber Trust Mark in a Simulated Amazon Purchasing Decision
- An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape
Yi Ting Chua, University of Tulsa
- “We Want You!” Applying Social Network Analysis to Online Extremist Communities
- Examining Risk and Risk Perception on LSD and MDMA in Online Marketplaces
Gabriella Coleman, Harvard University
- From Busting Cults to Breeding Cults: Anonymous H/acktivism vs. the (A)nonymous Far Right and QAnon
- Wearing Many Hats: The Rise of the Professional Hacker
- The Public Interest Hack
Ben Collier, University of Edinburgh
- Influence Policing: Strategic Communications, Digital Nudges, and Behaviour Change Marketing in Scottish and UK Preventative Policing
- Influence Government, Platform Power and the Patchwork Profile: Exploring the Appropriation of Targeted Advertising Infrastructures for Government Behaviour Change Campaigns
- Tor: From the Dark Web to the Future of Privacy
Sunny Consolvo, Google
- SoK: A Framework for Unifying At-Risk User Research
- SoK: Safer Digital-Safety Research Involving At-Risk Users
- Practicing Information Sensibility: How Gen Z Engages with Online Information
Manila Devaraja, University of Utah
Judith Donath, Berkman-Klein Center, Harvard
Serge Egelman, International Computer Science Institute (ICSI)
- Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem
- Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act
- Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps
Christian Eichenmüller, FAU Erlangen-Nürnberg
Sascha Fahl, CISPA
- The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts
- A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service
- 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University
Diana Freed, Harvard University
- Understanding Digital-Safety Experiences of Youth in the U.S.
- An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers’, Parents’, and Bystanders’ Perspectives
Simson Garfinkel, BasisTech LLC
Vaibhav Garg, Comcast Cable
- Covenants Without the Sword: Market Incentives for Cybersecurity Investment
- Squeezing the Cybersecurity Labels: A Labeling Regime for IoT Products
- The Engineer Who Cried Quantum
Matt Goerzen, Harvard University
Jonas Hielscher, Ruhr University Bochum
- “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centered Security
- Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers
- A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countriesa>
Richard John, University of Southern California
- All is Fair in Love and War: Moral Foundations in English-Language Tweets during the First 36 Weeks of Conflict Between Ukraine and Russia
- A Framework for Estimating the Value of Deterrence
- Semi-Automated Construction of Decision-Theoretic Models of Human Behavior
Adam Joinson, University of Bath
- Is Cybersecurity Research Missing a Trick? Integrating Insights from the Psychology of Habit into Research and Practice
- Development of a New “Human Cyber-resilience Scale”
Alexander Klimburg, Center for Strategic and International Studies
Susan Landau, Tufts University
- Reversing Privacy Risks: Strict Limitations on the Use of Communications Metadata and Telemetry Information
- Control Use of Data to Protect Privacy
Ada Lerner, Northeastern University
- Counting Carrds: Investigating Personal Disclosure and Boundary Management in Transformative Fandom
- Privacy Norms of Transformative Fandom: A Case Study of
an Activity-Defined Community - SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
Tesary Lin, Boston University
- Valuing Intrinsic and Instrumental Preferences for Privacy
- COPPAcalypse? The YouTube Settlement’s Impact on Kids Content
Damon McCoy, NYU
- Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot
- Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español
Allison McDonald, Boston University
- “Delete it and Move On”: Digital Management of Shared Sexual
Content after a Breakup - Safer Digital Intimacy For Sex Workers And Beyond: A Technical Research Agenda
Tyler Moore, University of Tulsa
- Leveraging Situational Judgment Tests to Measure
Behavioral Information Security - Transforming Raw Authentication Logs
into Interpretable Events
Alena Naiakshina, Ruhr University Bochum
- ChatGPT-Resistant Screening Instrument for Identifying Non-Programmers
- “Those Things Are Written by Lawyers, and Programmers Are Reading That.” Mapping the Communication Gap Between Software Developers
and Privacy Experts - Let’s Hash: Helping Developers with Password Security
Aileen Nielsen, Harvard Law School
Simon Parkin, Delft University of Technology
- Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centered Security
- Drivers and Barriers for Secure Hardware Adoption Across Ecosystem Stakeholders
- The Boundedly Rational Employee: Security Economics for Behaviour Intervention Support in Organizations
Sergio Pastrana, University Carlos III of Madrid
- Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls
- The Art of Cybercrime Community Research
Sameer Patil, University of Utah
- Effects of Credibility Indicators on Social Media News Sharing Intent
- Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use
- How Mandatory Second Factor Affects the Authentication User Experience
Lucy Qin, Georgetown University
Elissa Redmiles, Georgetown University
Alan Rubel, University of Wisconsin–Madison
- Algorithms and Autonomy: The Ethics of Automated Decision Systems
- Agency Laundering and Information Technologies
- Student Privacy in Learning Analytics: An Information Ethics Perspective
Sagar Samtani, Indiana University
- Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform
- Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression
Stuart Schechter, Harvard / DiceKeys
- The Safety Tips Dating Apps Omit
- Collecting Commissions Corrupts Product Coverage
- How You Can Help Fix Peer Review
Bruce Schneier, Harvard Kennedy School
Arianna Schuler Scott, Virginia Tech
Ryan Shandler, Georgia Tech
- Introduction: Cyber-Conflict—Moving from Speculation to Investigation
- The Hidden Threat of Cyber-Attacks—Undermining Public Confidence in Government
- Cyber Terrorism and Public Support for Retaliation—a Multi-Country Survey Experiment
Adam Shostack, UW/Shostack + Associates
Frank Stajano, University of Cambridge
- Sleepwalking into disaster? Requirements engineering for digital cash
- Deploying authentication in the wild: Towards greater ecological validity in security usability studies
- Raising a new generation of cyber-defenders
Geoffrey Tomaino, University of Florida
- Intransitivity of Consumer Preferences for Privacy
- Consumers Are More Willing to Disclose Data That Receive High Evaluations
Tony Vance, Virginia Tech
Kami Vaniea, University of Waterloo
- Not as Easy as Just Update: Survey of System Administrators and Patching Behaviors
- To Patch, or not To Patch? That is the Question: A Case Study of System Administrators’ Online Collaborative Behaviour
- “I Didn’t Click”: What Users Say When Reporting Phishing
Anh V. Vu, University of Cambridge
- No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment
- Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict
- Defacement Attacks on Israeli Websites
Rick Wash, University of Wisconsin–Madison
- How Experts Detect Phishing Scam Emails
- Prioritizing Security Over Usability: Strategies for How People Choose Passwords
- The Power of Storytelling in Cybersecurity Training
Josephine Wolff, Tufts University