Author of the publication

Layered Analysis of Security Ceremonies.

, and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 273-286. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote Management of Face-to-face Written Authenticated Though Anonymous Exams., , , and . CSEDU (2), page 431-437. SciTePress, (2011)Dagstuhl Reports, Vol. 2, Issue 12 ISSN 2192-5283, , , , , , , , , and 1 other author(s). (2013)Digitalised Welfare: Systems For Both Seeing and Working With Mess., , and . WebSci (Companion), page 26-31. ACM, (2020)Protecting The Vulnerable: Dimensions of Assisted Digital Access., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-26 (2022)Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge., and . SN Comput. Sci., 3 (5): 346 (2022)10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response., , , , and . Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Designing Through The Stack: The Case for a Participatory Digital Security By Design., , , and . NSPW, page 45-59. ACM, (2022)Walking the Line: The Everyday Security Ties that Bind., and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 464-480. Springer, (2017)Reducing normative conflicts in information security., and . NSPW, page 11-24. ACM, (2011)The need for enhanced privacy and consent dialogues., , and . Inf. Secur. Tech. Rep., 14 (3): 167-172 (2009)