Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporating Psychology into Cyber Security Education: A Pedagogical Approach., , , , , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 207-217. Springer, (2020)Design and Development of a Mobile Application to Combat Digital Addiction and Dissociative States During Phone Usage., , , , and . ICEBE, page 204-209. IEEE, (2022)Online Peer Support Groups for Behavior Change: Moderation Requirements., , , and . RCIS, volume 385 of Lecture Notes in Business Information Processing, page 157-173. Springer, (2020)Perceptions and Misperceptions of Smartphone Use: Applying the Social Norms Approach., , , and . Inf., 11 (11): 513 (2020)Online Peer Groups as a Persuasive Tool to Combat Digital Addiction., , , and . PERSUASIVE, volume 9638 of Lecture Notes in Computer Science, page 288-300. Springer, (2016)Can We Re-design Social Media to Persuade People to Challenge Misinformation? An Exploratory Study., , , , and . PERSUASIVE, volume 13832 of Lecture Notes in Computer Science, page 123-141. Springer, (2023)Goal Setting for Persuasive Information Systems: Five Reference Checklists., , , , , and . PERSUASIVE, volume 11433 of Lecture Notes in Computer Science, page 237-253. Springer, (2019)Knowledge is power: An analysis of discussions on hacking forums., , , and . EuroS&P Workshops, page 477-483. IEEE, (2020)Empowering responsible online gambling by real-time persuasive information systems., , , , , , , , , and 3 other author(s). RCIS, page 1-11. IEEE, (2018)Teaching psychological principles to cybersecurity students., , , , , , and . EDUCON, page 1782-1789. IEEE, (2017)