Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Creese, Sadie
add a person with the name Creese, Sadie
 

Other publications of authors with the same name

Can Cognitive Science Help Us Make Online Risk More Tangible?., and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)Applying Semantic Technologies to Fight Online Banking Fraud., , and . EISIC, page 61-68. IEEE Computer Society, (2015)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 271-282. Springer, (2010)Privacy Salience: Taxonomies and Research Opportunities., , and . CoRR, (2018)Investigating the leakage of sensitive personal and organisational information in email headers., , , and . J. Internet Serv. Inf. Secur., 5 (1): 70-84 (2015)"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things., , and . CoRR, (2018)Trustworthy and effective communication of cybersecurity risks: A review., , , and . STAST, page 60-68. IEEE, (2011)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , and . STAST, page 8-15. IEEE Computer Society, (2014)(Smart)Watch Out! encouraging privacy-protective behavior through interactive games., , and . Int. J. Hum.-Comput. Stud., (2019)