Author of the publication

Evaluating the Effects of Culture and Relationship Strength on Misinformation Challenging Behaviours Within the UK.

, , , and . INTERACT (3), volume 14144 of Lecture Notes in Computer Science, page 429-438. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive style and intelligent help.. INTERACT, page 1007-1008. North-Holland, (1990)"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults., , and . CHI, page 349. ACM, (2019)Using animated scenarios to explore severity of cyberbullying and reporting readiness., , and . OZCHI, page 448-451. ACM, (2014)Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access., , , and . EuroUSEC, page 86-96. ACM, (2023)Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption., , and . EuroUSEC, page 151-159. ACM, (2022)Promoting Cybersecurity Culture Change in Healthcare., , and . PETRA, page 544-549. ACM, (2021)Cyber Security Games: A New Line of Risk., and . ICEC, volume 7522 of Lecture Notes in Computer Science, page 600-603. Springer, (2012)An Appraisal-Based Approach to the Stigma of Walker-Use., and . HCI (25), volume 9193 of Lecture Notes in Computer Science, page 250-261. Springer, (2015)Privacy Considerations when Designing Social Network Systems to Support Successful Ageing., , , and . CHI, page 6425-6437. ACM, (2017)VIP: a visual approach to user authentication., , , , , and . AVI, page 316-323. ACM, (2002)