Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?, , , and . ITCH, volume 208 of Studies in Health Technology and Informatics, page 215-220. IOS Press, (2015)Measuring the security impacts of password policies using cognitive behavioral agent-based modeling., , , and . HotSoS, page 13:1-13:9. ACM, (2015)Bridging the Gap Between Intent and Outcome: Knowledge, Tools & Principles for Security-Minded Decision-Making.. Dartmouth College, USA, (2020)Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users., , , and . WSF@SOUPS, USENIX Association, (2016)Mismorphism: a semiotic model of computer security circumvention (poster abstract)., , , and . HotSoS, page 25:1-25:2. ACM, (2015)Capturing the iccMAX calculatorElement: A Case Study on Format Design., , , , , , , , and . SP (Workshops), page 176-197. IEEE, (2022)Eyes on URLs: Relating Visual Behavior to Safety Decisions., , , , , , and . ETRA, page 19:1-19:10. ACM, (2020)Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques., , , , and . SOUPS, USENIX Association, (2017)Going Dark: A Retrospective on the North American Blackout of 2038., , , , , , , , and . NSPW, page 52-63. ACM, (2018)Mismorphism: a Semiotic Model of Computer Security Circumvention., , , and . HAISA, page 172-182. University of Plymouth, (2015)