Author of the publication

Does context influence responses to firewall warnings?

, , and . eCrime Researchers Summit, page 1-10. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Choose Your Own Authentication., , and . NSPW, page 1-15. ACM, (2015)Heuristics for the evaluation of captchas on smartphones., , and . BCS HCI, page 126-135. ACM, (2015)Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy., , and . Int. J. Child Comput. Interact., (2017)Privacy Concerns Amidst OBA and the Need for Alternative Models., , and . IEEE Internet Comput., 22 (2): 52-61 (2018)Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends., , , and . eCrime, page 30-41. IEEE, (2016)Revisiting password rules: facilitating human management of passwords., , and . eCrime, page 81-90. IEEE, (2016)User interface design affects security: patterns in click-based graphical passwords., , , and . Int. J. Inf. Sec., 8 (6): 387-398 (2009)Understanding individual differences: factors affecting secure computer behaviour., , , and . Behav. Inf. Technol., 41 (15): 3237-3263 (2022)Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions., , and . CoRR, (2023)SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences., , and . CoRR, (2022)