Author of the publication

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.

, , , and . CIT/IUCC/DASC/PICom, page 461-468. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Salience: Taxonomies and Research Opportunities., , and . CoRR, (2018)"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things., , and . CoRR, (2018)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CoRR, (2020)Automated Insider Threat Detection System Using User and Role-Based Profile Assessment., , , and . IEEE Syst. J., 11 (2): 503-512 (2017)Can Cognitive Science Help Us Make Online Risk More Tangible?., and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)Investigating the leakage of sensitive personal and organisational information in email headers., , , and . J. Internet Serv. Inf. Secur., 5 (1): 70-84 (2015)(Smart)Watch Out! encouraging privacy-protective behavior through interactive games., , and . Int. J. Hum. Comput. Stud., (2019)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)Hearing attacks in network data: An effectiveness study., , , and . Comput. Secur., (2019)A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing., , and . Cyber Security, page 1-9. IEEE, (2019)