Author of the publication

Can Cognitive Science Help Us Make Online Risk More Tangible?.

, and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Creese, Sadie
add a person with the name Creese, Sadie
 

Other publications of authors with the same name

Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things., , and . CoRR, (2018)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 271-282. Springer, (2010)Trustworthy and effective communication of cybersecurity risks: A review., , , and . STAST, page 60-68. IEEE, (2011)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , and . STAST, page 8-15. IEEE Computer Society, (2014)Privacy Salience: Taxonomies and Research Opportunities., , and . CoRR, (2018)Investigating the leakage of sensitive personal and organisational information in email headers., , , and . J. Internet Serv. Inf. Secur., 5 (1): 70-84 (2015)Applying Semantic Technologies to Fight Online Banking Fraud., , and . EISIC, page 61-68. IEEE Computer Society, (2015)Can Cognitive Science Help Us Make Online Risk More Tangible?., and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)(Smart)Watch Out! encouraging privacy-protective behavior through interactive games., , and . Int. J. Hum.-Comput. Stud., (2019)