Author of the publication

Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).

, , , , , , , and . WWW (Companion Volume), page 1311-1314. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberpsychology - The Study of Individuals, Society and Digital Technologies., and . BPS textbooks Wiley, (2016)Liar, liar! An examination of how open, supportive and honest people are in chat rooms.. Comput. Hum. Behav., 18 (4): 343-352 (2002)Online recreation: The relationship between loneliness, Internet self-efficacy and the use of the Internet for entertainment purposes., and . Comput. Hum. Behav., 23 (3): 1435-1446 (2007)Would I lie to you? Self-serving lies and other-oriented lies told across different media., and . Comput. Hum. Behav., 24 (3): 1021-1031 (2008)Games without frontiers: On the moral and psychological implications of violating taboos within multi-player virtual spaces., and . Comput. Hum. Behav., 26 (6): 1228-1236 (2010)Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI., , , , , and . CHI Extended Abstracts, page 1-8. ACM, (2020)New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace., and . Comput. Hum. Behav., 22 (2): 235-250 (2006)Revealing the 'real' me, searching for the 'actual' you: Presentations of self on an internet dating site.. Comput. Hum. Behav., 24 (4): 1707-1723 (2008)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 270-281. Springer, (2014)Mass-Marketing Fraud: A Growing Concern.. IEEE Secur. Priv., 13 (4): 84-87 (2015)