| 2025 | "You Creep! It Really Worked!": An Empirical Study of Telephone Scams with Cloned Familiar Voices and Trusted Caller IDs. Filipo Sharevski, Jennifer Vander Loop, Bill Evans, Alexander Ponticello |
| 2025 | A Multi-Layered Privacy Permission Framework for Extended Reality. Shady Mansour, Verena Winterhalter, Florian Alt, Viktorija Paneva |
| 2025 | A Platform for Physiological and Behavioral Security. Felix Dietz, Peter Heubl, Luke Haliburton, David Bothe, Jan Hörnemann, Martina Angela Sasse, Florian Alt |
| 2025 | Card-Not-Present Fraud resulting from Smishing Attacks: An Experimental Study. Sharad Agarwal, Marie Vasek |
| 2025 | Cyber Risk Integration framework for Boards (CRIB): If Boards Had KPIs, Would They Pass? Robert Bose, Tristan Caulfield |
| 2025 | Proceedings of the 2025 New Security Paradigms Workshop, NSPW 2025, Aerzen, Germany, August 24-27, 2025 |
| 2025 | The Embeddedness of Security: Theorising quality uncertainty in markets for secure software. Matt Spencer |
| 2025 | Towards Anti-Imperialist Security, Privacy, and Safety Research in HCI. Miranda Wei, Matthias Fassl |
| 2025 | Transformational Provocations for Usable Privacy and Security: Designing Beyond Compliance and Expert Norms. Yuxi Wu, Alexandra To, Emilee Rader, W. Keith Edwards, Sauvik Das |
| 2025 | When User Needs Meet Power: Improving Security Usability by Recognizing Where Business Needs Come First. Simon Parkin |
| 2025 | Would 'Secure' Users Lead to Secure Commons? Surprisingly Not! A framework to evaluate effective power and collective outcomes in cybersecurity. Partha Das Chowdhury, Karen Renaud, Ingrid Ott |