Author of the publication

Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.

, , , and . Int. J. Mob. Hum. Comput. Interact., 6 (2): 73-78 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends., , , and . eCrime, page 30-41. IEEE, (2016)Revisiting password rules: facilitating human management of passwords., , and . eCrime, page 81-90. IEEE, (2016)Choose Your Own Authentication., , and . NSPW, page 1-15. ACM, (2015)Understanding individual differences: factors affecting secure computer behaviour., , , and . Behav. Inf. Technol., 41 (15): 3237-3263 (2022)Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy., , and . Int. J. Child Comput. Interact., (2017)Privacy Concerns Amidst OBA and the Need for Alternative Models., , and . IEEE Internet Comput., 22 (2): 52-61 (2018)Heuristics for the evaluation of captchas on smartphones., , and . BCS HCI, page 126-135. ACM, (2015)User interface design affects security: patterns in click-based graphical passwords., , , and . Int. J. Inf. Sec., 8 (6): 387-398 (2009)Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions., , and . CoRR, (2023)"I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemic., , and . EuroUSEC, page 40-52. ACM, (2022)