Author of the publication

Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook.

, and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 196-204. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote Management of Face-to-face Written Authenticated Though Anonymous Exams., , , and . CSEDU (2), page 431-437. SciTePress, (2011)Dagstuhl Reports, Vol. 2, Issue 12 ISSN 2192-5283, , , , , , , , , and 1 other author(s). (2013)Digitalised Welfare: Systems For Both Seeing and Working With Mess., , and . WebSci (Companion), page 26-31. ACM, (2020)Protecting The Vulnerable: Dimensions of Assisted Digital Access., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-26 (2022)Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge., and . SN Comput. Sci., 3 (5): 346 (2022)Designing Through The Stack: The Case for a Participatory Digital Security By Design., , , and . NSPW, page 45-59. ACM, (2022)10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response., , , , and . Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Walking the Line: The Everyday Security Ties that Bind., and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 464-480. Springer, (2017)Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud., , and . Inf. Secur. Tech. Rep., 16 (3-4): 115-122 (2011)Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things., , and . CHI, page 308. ACM, (2019)