Author of the publication

Pathways to identity: using visualization to aid law enforcement in identification tasks.

, , , , , , and . Secur. Informatics, 3 (1): 12 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconstructing What You Said: Text Inference Using Smartphone Motion., and . IEEE Trans. Mob. Comput., 18 (4): 947-959 (2019)User Identification Using Games., and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 3-14. Springer, (2016)Pathways to identity: using visualization to aid law enforcement in identification tasks., , , , , , and . Secur. Informatics, 3 (1): 12 (2014)Predicting Graphical Passwords., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 23-35. Springer, (2015)Image Choice to Represent the Self in Different Online Environments., , , and . HCI (22), volume 8531 of Lecture Notes in Computer Science, page 528-537. Springer, (2014)Relationships between Password Choices, Perceptions of Risk and Security Expertise., , , and . HCI (27), volume 8030 of Lecture Notes in Computer Science, page 80-89. Springer, (2013)Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks., , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 619-636. Springer, (2020)Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry., , and . HCI (38), volume 1420 of Communications in Computer and Information Science, page 391-399. Springer, (2021)Cyber-enabled burglary of smart homes.. Comput. Secur., (2021)Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords., , , and . Cyberpsy., Behavior, and Soc. Networking, 18 (1): 3-7 (2015)