Author of the publication

A clinical study of risk factors related to malware infections.

, , , , and . ACM Conference on Computer and Communications Security, page 97-108. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Choose Your Own Authentication., , and . NSPW, page 1-15. ACM, (2015)Heuristics for the evaluation of captchas on smartphones., , and . BCS HCI, page 126-135. ACM, (2015)User interface design affects security: patterns in click-based graphical passwords., , , and . Int. J. Inf. Sec., 8 (6): 387-398 (2009)Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends., , , and . eCrime, page 30-41. IEEE, (2016)Revisiting password rules: facilitating human management of passwords., , and . eCrime, page 81-90. IEEE, (2016)Understanding individual differences: factors affecting secure computer behaviour., , , and . Behav. Inf. Technol., 41 (15): 3237-3263 (2022)Privacy Concerns Amidst OBA and the Need for Alternative Models., , and . IEEE Internet Comput., 22 (2): 52-61 (2018)Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy., , and . Int. J. Child Comput. Interact., (2017)Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions., , and . CoRR, (2023)SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences., , and . CoRR, (2022)