Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberpsychology - The Study of Individuals, Society and Digital Technologies., and . BPS textbooks Wiley, (2016)Online recreation: The relationship between loneliness, Internet self-efficacy and the use of the Internet for entertainment purposes., and . Comput. Hum. Behav., 23 (3): 1435-1446 (2007)Liar, liar! An examination of how open, supportive and honest people are in chat rooms.. Comput. Hum. Behav., 18 (4): 343-352 (2002)Would I lie to you? Self-serving lies and other-oriented lies told across different media., and . Comput. Hum. Behav., 24 (3): 1021-1031 (2008)Games without frontiers: On the moral and psychological implications of violating taboos within multi-player virtual spaces., and . Comput. Hum. Behav., 26 (6): 1228-1236 (2010)Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI., , , , , and . CHI Extended Abstracts, page 1-8. ACM, (2020)New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace., and . Comput. Hum. Behav., 22 (2): 235-250 (2006)Revealing the 'real' me, searching for the 'actual' you: Presentations of self on an internet dating site.. Comput. Hum. Behav., 24 (4): 1707-1723 (2008)Mass-Marketing Fraud: A Growing Concern.. IEEE Secur. Priv., 13 (4): 84-87 (2015)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 270-281. Springer, (2014)