Author of the publication

Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets.

, , , , , and . SOUPS, page 141-150. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection., , and . SOUPS @ USENIX Security Symposium, page 443-457. USENIX Association, (2018)A security assessment of tiles: a new portfolio-based graphical authentication system., , , , and . CHI Extended Abstracts, page 1967-1972. ACM, (2012)OurStrategy: Employee Voice In Transnational Strategy Development., , , , and . CHI, page 871:1-871:17. ACM, (2023)"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations., , and . EuroUSEC, page 344-355. ACM, (2023)Exploring the Acceptability of Graphical Passwords for People with Dyslexia., and . INTERACT (1), volume 12932 of Lecture Notes in Computer Science, page 213-222. Springer, (2021)Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets., , , , , and . SOUPS, page 141-150. USENIX Association, (2015)"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults., , and . CHI, page 349. ACM, (2019)Designing for the Embedding of Employee Voice., , , , , , , , , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW1): 1-31 (April 2023)Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access., , , and . EuroUSEC, page 86-96. ACM, (2023)Friendly Folk Advice: Exploring Cybersecurity Information Sharing in Nigeria., , , and . INTERACT (1), volume 14142 of Lecture Notes in Computer Science, page 369-378. Springer, (2023)