%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (Your contribution) endobj 9 0 obj << /S /GoTo /D (section.3) >> endobj 12 0 obj (Experimental design) endobj 13 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 16 0 obj (What to include) endobj 17 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 20 0 obj (Ethics and participant safety) endobj 21 0 obj << /S /GoTo /D (subsection.3.3) >> endobj 24 0 obj (Supplementary documentation) endobj 25 0 obj << /S /GoTo /D (section.4) >> endobj 28 0 obj (Special considerations:Experiments involving simulated attacks) endobj 29 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 32 0 obj (Have a clear threat model) endobj 33 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 36 0 obj (Avoid bias in favor of your own system) endobj 37 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 40 0 obj (Address ecological validity) endobj 41 0 obj << /S /GoTo /D (section.5) >> endobj 44 0 obj (Disclose limitations) endobj 45 0 obj << /S /GoTo /D (section.6) >> endobj 48 0 obj (Presenting results) endobj 49 0 obj << /S /GoTo /D (subsection.6.1) >> endobj 52 0 obj (Tables and figures) endobj 53 0 obj << /S /GoTo /D (subsection.6.2) >> endobj 56 0 obj (Statistical validity) endobj 57 0 obj << /S /GoTo /D (section.7) >> endobj 60 0 obj (Citing related work) endobj 61 0 obj << /S /GoTo /D (subsection.7.1) >> endobj 64 0 obj (Where does related work go?) endobj 65 0 obj << /S /GoTo /D (subsection.7.2) >> endobj 68 0 obj (Citation etiquette) endobj 69 0 obj << /S /GoTo /D (section.8) >> endobj 72 0 obj (Acknowledgements) endobj 73 0 obj << /S /GoTo /D [74 0 R /Fit] >> endobj 76 0 obj << /Length 4472 /Filter /FlateDecode >> stream xڕr_U"SM,%i<@$(!L_3= /"f[~fET$./nEUV%oXE|lmj=5iϛf}2C/