Author of the publication

Understanding Trust in Social Media: Twitter.

, , and . HCI (37), volume 1419 of Communications in Computer and Information Science, page 440-447. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks., , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 619-636. Springer, (2020)Understanding User Preferences for Gaining Trust, When Utilising Conversational Agents for Mental Health Data Disclosures., , and . HCI (44), volume 1833 of Communications in Computer and Information Science, page 167-174. Springer, (2023)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 270-281. Springer, (2014)User Identification Using Games., and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 3-14. Springer, (2016)The language of biometrics: Analysing public perceptions., and . J. Inf. Secur. Appl., (2019)Investigating Longitudinal Effects of Physical Inoculation Interventions Against Disinformation., , and . HCI (46), volume 1835 of Communications in Computer and Information Science, page 39-46. Springer, (2023)Understanding Insider Threat: A Framework for Characterising Attacks., , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 214-228. IEEE Computer Society, (2014)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , and . STAST, page 8-15. IEEE Computer Society, (2014)Identifying Soft Biometric Features from a Combination of Keystroke and Mouse Dynamics., , and . AHFE (10), volume 268 of Lecture Notes in Networks and Systems, page 184-190. Springer, (2021)Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals., and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 494-506. Springer, (2017)