Author of the publication

Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice.

, , and . Comput. Secur., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure., , , and . CRITIS, volume 11777 of Lecture Notes in Computer Science, page 3-17. Springer, (2019)Trust beyond computation alone: human aspects of trust in blockchain technologies., and . ICSE-SEIS, page 21-30. ACM, (2019)Information bias and trust in bitcoin speculation.. Lancaster University, UK, (2017)British Library, EThOS.A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation., , , , , and . IEEE CLOUD, page 606-613. IEEE Computer Society, (2018)Assessing Effectiveness of Cyber Essentials Technical Controls., , , , and . CoRR, (2024)Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice., , and . Comput. Secur., (May 2023)A just culture is fundamental: extending security ergonomics by design.. SEsCPS@ICSE, page 46-49. IEEE / ACM, (2019)Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds., , , and . CPS-SPC@CCS, page 75-86. ACM, (2019)Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables., , , , and . IEEE Secur. Priv., 17 (3): 28-39 (2019)Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design., and . SEsCPS@ICSE, page 22-25. IEEE, (2017)