From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Teaching SQL - Which Pedagogical Horse for This Course?, и . BNCOD, том 3112 из Lecture Notes in Computer Science, стр. 244-256. Springer, (2004)Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures., , и . HCI (35), том 14045 из Lecture Notes in Computer Science, стр. 381-398. Springer, (2023)A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users., и . ER Workshops, том 5232 из Lecture Notes in Computer Science, стр. 228-237. Springer, (2008)Why don't UK citizens protest against privacy-invading dragnet surveillance?, , , и . Inf. Comput. Secur., 24 (4): 400-415 (2016)The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor., и . Inf. Comput. Secur., 29 (3): 526-557 (2021)Scoping the ethical principles of cybersecurity fear appeals., и . Ethics Inf. Technol., 23 (3): 265-284 (2021)Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene., , и . SIGITE, стр. 35-40. ACM, (2021)Crowdsourcing Quality Concerns: An Examination of Amazon's Mechanical Turk., , и . SIGITE, стр. 127-129. ACM, (2022)A Framework to Maximise the Communicative Power of Knowledge Visualisations., и . SAICSIT, стр. 2:1-2:10. ACM, (2019)Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country., и . SAICSIT, стр. 44:1-44:10. ACM, (2016)