Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Considerations when Designing Social Network Systems to Support Successful Ageing., , , and . CHI, page 6425-6437. ACM, (2017)Using animated scenarios to explore severity of cyberbullying and reporting readiness., , and . OZCHI, page 448-451. ACM, (2014)"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults., , and . CHI, page 349. ACM, (2019)An Appraisal-Based Approach to the Stigma of Walker-Use., and . HCI (25), volume 9193 of Lecture Notes in Computer Science, page 250-261. Springer, (2015)Cognitive style and intelligent help.. INTERACT, page 1007-1008. North-Holland, (1990)Promoting Cybersecurity Culture Change in Healthcare., , and . PETRA, page 544-549. ACM, (2021)Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption., , and . EuroUSEC, page 151-159. ACM, (2022)Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access., , , and . EuroUSEC, page 86-96. ACM, (2023)Cyber Security Games: A New Line of Risk., and . ICEC, volume 7522 of Lecture Notes in Computer Science, page 600-603. Springer, (2012)Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies., , , and . CASoN, page 25-30. IEEE, (2011)