Author of the publication

Human Implications of Technology.

, and . The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human Implications of Technology., and . The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Digital identity. Technology and Society Magazine, IEEE, 23 (3): 34--41 (2004)Bongo: A BGP speaker built for defending against bad routes., , and . MILCOM, page 735-739. IEEE, (2016)Identity Management's Misaligned Incentives.. IEEE Secur. Priv., 8 (6): 90-94 (2010)Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory., , , and . HAISA, volume 593 of IFIP Advances in Information and Communication Technology, page 109-120. Springer, (2020)User Engagement with Chatbots: A Discursive Psychology Approach., and . CIU, page 52:1-52:4. ACM, (2020)An Atomicity-Generating Protocol for Anonymous Currencies.. IEEE Trans. Software Eng., 27 (3): 272-278 (2001)Panel Report: Open Code for Digital Government.. DG.O, Digital Government Research Center, (2003)Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies., and . SafeConfig@CCS, page 31-36. ACM, (2016)Cars, Condoms, and Facebook., and . ISC, volume 7807 of Lecture Notes in Computer Science, page 280-289. Springer, (2013)