Author of the publication

Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand.

, , and . HICSS, page 1742-1749. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why do users trust the wrong messages? A behavioural model of phishing.. eCrime, page 1-7. IEEE, (2009)Privacy-preserving cooperative localization in vehicular edge computing infrastructure., , , , , , , and . Concurr. Comput. Pract. Exp., (2022)A Comparative Analysis of Distributed Ledger Technology Platforms., , , , , , and . IEEE Access, (2019)Editorial for FGCS special issue: Big Data in the cloud., , , , , and . Future Gener. Comput. Syst., (2016)Steganographic Transports: A Vector for Hidden Secret Internets?, and . TrustCom/BigDataSE, page 891-896. IEEE, (2018)Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand., , and . HICSS, page 1742-1749. IEEE Computer Society, (2015)Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation., , , , , , and . Comput. Secur., (November 2023)The Inadequacy of Entropy-Based Ransomware Detection., , , and . ICONIP (5), volume 1143 of Communications in Computer and Information Science, page 181-189. Springer, (2019)Responsibility Attribution Against Data Breaches., , , , , , and . ICIoT, page 498-503. IEEE, (2020)Significance of Phonological Features in Speech Emotion Recognition., , , , and . Int. J. Speech Technol., 23 (3): 633-642 (2020)