Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads., , , and . BCS HCI, page 215-220. British Computer Society, (2012)Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems.. IEEE Security & Privacy, 5 (3): 78-81 (2007)Protecting You., and . IEEE Security & Privacy, 12 (1): 11-13 (2014)It Ain't What You Charge, It's The Way That You Do It: A User Perspective of Network QoS and Pricing., and . Integrated Network Management, page 639-654. IEEE, (1999)Information security as organizational power: A framework for re-thinking security policies., and . STAST, page 9-16. IEEE, (2011)The mechanics of trust: A framework for research and design., , and . Int. J. Hum.-Comput. Stud., 62 (3): 381-422 (2005)Desperately seeking assurances: Segmenting users by their information-seeking preferences., and . PST, page 102-111. IEEE, (2014)Not seeing the crime for the cameras?. Commun. ACM, 53 (2): 22-25 (2010)Successful Multiparty Audio Communication over the Internet., , and . Commun. ACM, 41 (5): 74-80 (1998)"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents., , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 70-82. Springer, (2013)