Author of the publication

Usable Privacy and Security from the Perspective of Cognitive Abilities.

, , , , and . Privacy and Identity Management, volume 644 of IFIP Advances in Information and Communication Technology, page 105-121. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamentals of Digital Forensics - Theory, Methods, and Real-Life Applications. Springer, (2018)Defining and Modelling the Online Fraud Process., and . HAISA, page 203-213. University of Plymouth, (2018)Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?, , and . HAISA, volume 613 of IFIP Advances in Information and Communication Technology, page 12-21. Springer, (2021)Automatic Detection of Fake News., , and . STPIS, volume 2789 of CEUR Workshop Proceedings, page 168-179. CEUR-WS.org, (2020)Users perception of using CBMT for information security training., , and . HAISA, page 122-131. University of Plymouth, (2019)Using context based micro training to develop OER for the benefit of all., and . OpenSym, page 7:1-7:10. ACM, (2019)Evaluation of Contextual and Game-Based Training for Phishing Detection., , , , , and . Future Internet, 14 (4): 104 (2022)Understanding passwords - a taxonomy of password creation strategies., , and . Inf. Comput. Secur., 27 (3): 453-467 (2019)Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 95-108. Springer, (2020)A model for the creation of biographical dictionaries., , and . STPIS, volume 3239 of CEUR Workshop Proceedings, page 165-172. CEUR-WS.org, (2022)