Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The true cost of unusable password policies: password use in the wild., and . CHI, page 383-392. ACM, (2010)Expressions of expertness: the virtuous circle of natural language for access control policy specification., , , and . SOUPS, page 77-88. ACM, (2008)A stealth approach to usable security: helping IT security managers to identify workable security solutions., , , and . NSPW, page 33-50. ACM, (2010)Evaluating the usability and security of a graphical one-time PIN system., , and . BCS HCI, page 88-97. ACM, (2010)Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication., , , and . NSS, page 81-88. IEEE, (2011)Reading the road: challenges and opportunities on the path to responsible innovation in quantum computing., , and . Technol. Anal. Strateg. Manag., 35 (7): 844-856 (July 2023)Usability is the best policy: public policy and the lived experience of transport systems in London., and . BCS HCI (1), page 35-44. BCS, (2007)Counting the Cost of FIRE - Overcoming Barriers to Sustainable Experimentation Facilities., , and . Future Internet Assembly, volume 7858 of Lecture Notes in Computer Science, page 297-309. Springer, (2013)Information security as organizational power: A framework for re-thinking security policies., and . STAST, page 9-16. IEEE, (2011)Asleep at the wheel? Responsible Innovation in quantum computing., , , and . Technol. Anal. Strateg. Manag., 33 (11): 1364-1376 (2021)