Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faces and Pictures: Understanding age differences in two types of graphical authentications., , and . Int. J. Hum.-Comput. Stud., 71 (10): 958-966 (2013)Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors., , and . SOUPS, page 103-122. USENIX Association, (2015)The automation of helpdesks., and . IUI, page 219-222. ACM, (1993)The Design of Messages to Improve Cybersecurity Incident Reporting., , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 3-13. Springer, (2017)Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection., , and . SOUPS @ USENIX Security Symposium, page 443-457. USENIX Association, (2018)Biometrics in Practice: What Does HCI Have to Say?, , , and . INTERACT (2), volume 5727 of Lecture Notes in Computer Science, page 920-921. Springer, (2009)A security assessment of tiles: a new portfolio-based graphical authentication system., , , , and . CHI Extended Abstracts, page 1967-1972. ACM, (2012)"You Talking to Me?" Exploring Voice in Self-Service User Interfaces., and . Int. J. Hum. Comput. Interaction, 13 (2): 161-186 (2001)Who knows about me?: an analysis of age-related disclosure preferences., , and . BCS HCI, page 84-87. ACM, (2011)Principles of Persuasion in Social Engineering and Their Use in Phishing., , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 36-47. Springer, (2015)