Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Examining the Contribution of Critical Visualisation to Information Security., , , and . NSPW, page 59-72. ACM, (2015)In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities., , and . CHI, page 584. ACM, (2018)Internet Users' Security and Privacy While They Interact with Amazon., and . TrustCom, page 878-883. IEEE Computer Society, (2011)Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices., and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 121-135. Springer, (2010)Remote Management of Face-to-face Written Authenticated Though Anonymous Exams., , , and . CSEDU (2), page 431-437. SciTePress, (2011)Dagstuhl Reports, Vol. 2, Issue 12 ISSN 2192-5283, , , , , , , , , and 1 other author(s). (2013)Digitalised Welfare: Systems For Both Seeing and Working With Mess., , and . WebSci (Companion), page 26-31. ACM, (2020)10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response., , , , and . Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Designing Through The Stack: The Case for a Participatory Digital Security By Design., , , and . NSPW, page 45-59. ACM, (2022)Walking the Line: The Everyday Security Ties that Bind., and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 464-480. Springer, (2017)