Author of the publication

Biometrics in Practice: What Does HCI Have to Say?

, , , and . INTERACT (2), volume 5727 of Lecture Notes in Computer Science, page 920-921. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults., , and . CHI, page 349. ACM, (2019)An Appraisal-Based Approach to the Stigma of Walker-Use., and . HCI (25), volume 9193 of Lecture Notes in Computer Science, page 250-261. Springer, (2015)Some Effects of Cognitive Style on Learning UNIX.. Int. J. Man Mach. Stud., 31 (3): 349-365 (1989)Privacy Considerations when Designing Social Network Systems to Support Successful Ageing., , , and . CHI, page 6425-6437. ACM, (2017)Security information sharing via Twitter: 'Heartbleed' as a case study., , , and . Int. J. Web Based Communities, 13 (2): 172-192 (2017)Using animated scenarios to explore severity of cyberbullying and reporting readiness., , and . OZCHI, page 448-451. ACM, (2014)Cognitive style and intelligent help.. INTERACT, page 1007-1008. North-Holland, (1990)Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop., , , , and . Proc. ACM Hum. Comput. Interact., 6 (MHCI): 1-22 (2022)Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems., , , and . Int. J. Hum. Comput. Stud., 63 (1-2): 128-152 (2005)Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption., , and . EuroUSEC, page 151-159. ACM, (2022)