Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding individual differences: factors affecting secure computer behaviour., , , and . Behav. Inf. Technol., 41 (15): 3237-3263 (2022)Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy., , and . Int. J. Child Comput. Interact., (2017)Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions., , and . CoRR, (2023)Heuristics for the evaluation of captchas on smartphones., , and . BCS HCI, page 126-135. ACM, (2015)Choose Your Own Authentication., , and . NSPW, page 1-15. ACM, (2015)Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends., , , and . eCrime, page 30-41. IEEE, (2016)Revisiting password rules: facilitating human management of passwords., , and . eCrime, page 81-90. IEEE, (2016)SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences., , and . CoRR, (2022)Privacy Concerns Amidst OBA and the Need for Alternative Models., , and . IEEE Internet Comput., 22 (2): 52-61 (2018)User interface design affects security: patterns in click-based graphical passwords., , , and . Int. J. Inf. Sec., 8 (6): 387-398 (2009)