Author of the publication

Relationships between Password Choices, Perceptions of Risk and Security Expertise.

, , , and . HCI (27), volume 8030 of Lecture Notes in Computer Science, page 80-89. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Cognitive Science Help Us Make Online Risk More Tangible?., and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CyberSA, page 1-8. IEEE, (2020)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 271-282. Springer, (2010)Applying Semantic Technologies to Fight Online Banking Fraud., , and . EISIC, page 61-68. IEEE Computer Society, (2015)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , and . STAST, page 8-15. IEEE Computer Society, (2014)A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing., , and . Cyber Security, page 1-9. IEEE, (2019)Trustworthy and effective communication of cybersecurity risks: A review., , , and . STAST, page 60-68. IEEE, (2011)Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation., , and . PrimeLife, volume 375 of IFIP Advances in Information and Communication Technology, page 232-244. Springer, (2011)