Author of the publication

Studying users' adaptation to Android's run-time fine-grained access control system.

, , and . J. Inf. Secur. Appl., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Safe and sound: a safety-critical approach to security., and . NSPW, page 41-50. ACM, (2001)Designing and evaluating usable security and privacy technology., , and . SOUPS, ACM, (2009)GazeSpace: eye gaze controlled content spaces., , and . BCS HCI (2), page 55-58. BCS, (2007)The Great Authentication Fatigue - And How to Overcome It., , , and . HCI (19), volume 8528 of Lecture Notes in Computer Science, page 228-239. Springer, (2014)Do you know dis?: a user study of a knowledge discovery tool for organizations., , , and . CHI, page 2887-2896. ACM, (2011)Eliciting and describing users' models of computer systems.. University of Birmingham, UK, (1997)British Library, EThOS.Listen to Your Heart Rate: Counting the Cost of Media Quality., and . IWAI, volume 1814 of Lecture Notes in Computer Science, page 9-20. Springer, (1999)It Ain't What You Charge, It's The Way That You Do It: A User Perspective of Network QoS and Pricing., and . Integrated Network Management, page 639-654. IEEE, (1999)When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads., , , and . BCS HCI, page 215-220. British Computer Society, (2012)Successful Multiparty Audio Communication over the Internet., , and . Commun. ACM, 41 (5): 74-80 (1998)