Author of the publication

"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making.

, , , , , and . ACM Trans. Priv. Secur., 24 (1): 5:1-5:29 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations., , , and . CoRR, (2021)"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?, , , and . ICSE, page 486-498. IEEE, (2021)SLR_Dataset., , , and . (December 2020)The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups., , , , , and . IEEE Trans. Software Eng., 48 (5): 1515-1528 (2022)How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces., , , , , and . CoRR, (2022)Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries., , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Capturing mobile security policies precisely. University of Edinburgh, UK, (2018)British Library, EThOS.The best laid plans or lack thereof: Security decision-making of different stakeholder groups., , , , , and . CoRR, (2021)Developers Are Neither Enemies Nor Users: They Are Collaborators., , , , and . SecDev, page 47-55. IEEE, (2021)Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures., , , , , , and . CRITIS, volume 13723 of Lecture Notes in Computer Science, page 9-26. Springer, (2022)