From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the Net.. Comput. Hum. Behav., 24 (5): 1837-1850 (2008)Pushing the Wrong Buttons: Men's and Women's Attitudes toward Online and Offline Infidelity.. Cyberpsy., Behavior, and Soc. Networking, 6 (6): 569-579 (2003)Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords., , , и . Cyberpsy., Behavior, and Soc. Networking, 18 (1): 3-7 (2015)Revealing the 'real' me, searching for the 'actual' you: Presentations of self on an internet dating site.. Comput. Hum. Behav., 24 (4): 1707-1723 (2008)New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace., и . Comput. Hum. Behav., 22 (2): 235-250 (2006)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 270-281. Springer, (2014)A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals., , и . IJCNN, стр. 1-8. IEEE, (2020)Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)., , , , , , , и . WWW (Companion Volume), стр. 1311-1314. ACM, (2017)Understanding Insider Threat: A Framework for Characterising Attacks., , , , , , и . IEEE Symposium on Security and Privacy Workshops, стр. 214-228. IEEE Computer Society, (2014)Who am I? Representing the self offline and in different online contexts., , , , , , и . Comput. Hum. Behav., (2014)