Alessandro Acquisti, MIT Sloan
Idris Adjerid, Virginia Tech
Ali Ahmed, Louisiana State University
- Vulnerability Disclosure Mechanisms: A Synthesis and Framework for Market-Based and Non-Market-Based Disclosures
- Vulnerability Disclosure as a Signal: Effects on Submission Volume and Validity in Bug Bounty Programs
- The Role of Commitment in Online Reputation Systems: An Empirical Study of Express Delivery Promise in an E-Commerce Platform
Tawfiq Alashoor, IESE Business School
- Why Your Biggest Cybersecurity Risk Isn’t Technology—It’s Your People
- The Contexts Putting Your Privacy at Risk
- The General Relativity of Privacy
Matt Blaze, Georgetown University
Joseph Bonneau, New York University
- Cornucopia: Distributed Randomness Beacons at Scale
- Good Things Come To Those Who Wait: Dishonest-Majority Coin-Flipping Requires Delay Functions
Laura Brandimarte, University of Arizona
- Does Increasing Reliance on Artificial Intelligence Boost Creativity? Assessing AI-Augmented Creativity with Large Language Models
- Privacy Concerns and Willingness to Adopt AI Products: A Cross-Country Randomized Survey Experiment
Burcu Bulgurcu, Toronto Metropolitan University
- Antecedents of Trust in Deepfakes: Insights from the Elaboration Likelihood Model
- Implications of Organizational Governance on Cybersecurity Management: A Qualitative Study in Higher Education
- The Profound Influence of Small Choices in Digital Collaboration
Jean Camp, UNC Charlotte
- Usability, Efficacy, and Acceptability of the U.S. Cyber Trust Mark
- Comparing the Use and Usefulness of Four IoT Security Labels
- Made in the USA: Increasing a Product’s Perceived Cybersecurity by Indicating the Country of Origin
Sarah Chun, University of Waterloo
Avinash Collis, Carnegie Mellon University
John D’Arcy, University of Delaware
Judith Donath, Berkman-Klein Center @ Harvard University
Serge Egelman, UC Berkeley / ICSI
Jeremy Epstein, Georgia Tech Research Institute
Maschio Fernando, Virginia Tech
Dr. Shannon E. French, Case Western Reserve University
- The Code of the Warrior: Exploring Warrior Values Past and Present
- Artificial Intelligence in Military Decision-making: Avoiding Ethical and Strategic Perils with an Option-generator Model
- War and Technology: Should Data Decide Who Lives, Who Dies?
Simson L. Garfinkel, Harvard Kennedy School
- Law and Policy for the Quantum Age
- Quantum Cryptanalysis: Hype and Reality
- What if Quantum Computing Is a Bust?
Vaibhav Garg, Comcast Cable
- Covenants Without the Sword: Market Incentives for Cybersecurity Investment
- The Engineer Who Cried Quantum: Emerging Technologies Committee Impact Report on Post Quantum Cryptography
- All the AI Risks We Cannot See
Melissa Hathaway, Hathaway Global Strategies
- Integrating the IC’s Cyber Security Mission
- Hijacked and Paying the Price—Why Ransomware Gangs Should Be Designated as Terrorists
- Patching Our Digital Future Is Unsustainable and Dangerous
Susan Landau, Tufts University
Tesary Lin, Boston University
- Valuing Intrinsic and Instrumental Preferences for Privacy
- Frontiers: The Intended and Unintended Consequences of Privacy Regulation for Consumer Marketing
- Designing Consent: Choice Architecture and Consumer Welfare in Data Sharing
Carolin Lämmle, Friedrich-Alexander-University Erlangen-Nuremberg
Nathan Malkin, New Jersey Institute of Technology
James Mickens, Harvard University
Andrew Odlyzko, University of Minnesota
- Cybersecurity Is Not Very Important
- The Glorious Promise of the Post-Truth World
- Digital Economy: Some Underestimated Benefits of the Cryptocurrency Mania
Sameer Patil, University of Utah
- Strategic Misdirection: Attempts to Protect Privacy with Made-up Email Addresses
- Understanding User Prioritization and Comprehension of Smartphone Permissions
- ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser
Samantha Phillips, The University of Tulsa
- A Mixed-Method Case Study of Information Security Culture at an Energy Firm
- Measuring Dimensions of Information Security Culture Across Industries with Situational Judgement Tests
- Leveraging Situational Judgment Tests to Measure Behavioral Information Security
Emilee Rader, University of Wisconsin-Madison
David Reeves, ARNG CISO / VT PhD Student
Norman Sadeh, Carnegie Mellon University
Zeynep Sahin, Virginia Tech
Mols Sauter, University of Maryland
- AI as an Excuse in Participatory Systems: Identifying and Describing the Civic AI Imaginary and Its Impact on Representative and Participatory Governance
- Seeing Without Looking: Sidewalk Toronto Is Dead, but Its Legacy Shows There Are More Ways to Violate One’s Privacy Than Collecting One’s Image
- The Apophenic Machine: The Conspiratorial Mode and the Internet’s Data Hoard Were Made for Each Other
Florian Schaub, University of Michigan
Stuart Schechter, Harvard
Kent Seamons, Brigham Young University
- Secure Messaging Authentication Ceremonies Are Broken
- Cryptographic Deniability: A Multi-Perspective Study of User Perceptions and Expectations
- Deniable Encrypted Messaging: User Understanding a?Er Hands-Onsocial Experience
David Sidi, We Build Networks
Eugene Soltes, Harvard Business School
Jessica Stern, Boston University
Geoff Tomaino, University of Florida
- Intransitivity of Consumer Preferences for Privacy
- How Artificial Intelligence Constrains the Human Experience
Blase Ur, University of Chicago
Tony Vance, Virginia Tech
- Inexpert Supervision: Field Evidence on Boards’ Oversight of Cybersecurity
- The Fog of Warnings: How Non-Security-Related Notifications Diminish the Efficacy of Security Warnings
- “Complexity is the Worst Enemy of Security”: Studying Cybersecurity Through the Lens of Organizational Complexity
Kami Vaniea, University of Waterloo
- Why Do They Need to Know I Spotted a Pothole? Privacy Issues in Canadian Municipal Problem Reporting Websites
- Judging Phishing Under Uncertainty: How Do Users Handle Inaccurate Automated Advice?
- DarkDialogs: Automated Detection of 10 Dark Patterns on Cookie Dialogs
Marie Vasek, University College London
- A Sinister Fattening: Dissecting the Tales of Pig Butchering and Other Cryptocurrency Scams
- “Hey Mum, I Dropped My Phone Down the Toilet”: Investigating Hi Mum and Dad Sms Scams in the United Kingdom
- An Overview of 7726 User Reports: Uncovering SMS Scams and Scammer Strategies
Arun Vishwanath, Cyber Hygiene Academy, Inc
- The Death Of Security Awareness Training: Why AI Is Making It Obsolete
- When a Robot Writes Your News, What Happens to Democracy?
- This Op-Ed Wasn’t Written by AI
Rick Wash, University of Wisconsin—Madison
- What Can Cybersecurity Learn from Security?
- How Experts Detect Phishing Scam Emails
- Folk Models of Home Computer Security
Miranda Wei, Princeton / EPFL
- Towards Anti-Imperialist Security, Privacy, and Safety Research in HCI
- “We’re Utterly Ill-Prepared to Deal with Something Like This”: Teachers’ Perspectives on Student Generation of Synthetic Nonconsensual Explicit Imagery
- Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse
Ryan Wright, University of Virginia