Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding motivations and characteristics of financially-motivated cybercriminals., , , and . CoRR, (2022)Developing a measure of information seeking about phishing., and . J. Cybersecur., 6 (1): tyaa001 (2020)A Survey of Relevant Text Mining Technology., , , and . CoRR, (2022)Characterising Cybercriminals: A Review., , , and . CoRR, (2022)Press accept to update now: Individual differences in susceptibility to malevolent interruptions., , and . Decis. Support Syst., (2017)Fusing system design and social science to reduce susceptibility to online influence., and . BCS HCI, BCS, (2016)Safe cryptography for all: towards visual metaphor driven cryptography building blocks., , , and . SEAD@ICSE, page 41-44. ACM, (2018)The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers., , , and . IEEE Trans. Software Eng., 48 (2): 364-376 (2022)Automatic User Profiling in Darknet Markets: a Scalability Study., , , and . CoRR, (2022)Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use., , , , , , , , and . STAST, page 5:1-5:6. ACM, (2018)