Author of the publication

Mental Models of Online Privacy: Structural Properties with Cognitive Maps.

, and . BCS HCI, British Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ün-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns., and . USENIX Security Symposium, page 5611-5628. USENIX Association, (2023)Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice., , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 143-161. Springer, (2020)Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials., , , , , and . CoRR, (2021)Mental Models for Usable Privacy: A Position Paper., and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 410-421. Springer, (2014)Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions & Method Preferences.. CoRR, (2020)Evidence-Based Methods for Privacy and Identity Management., and . Privacy and Identity Management, volume 498 of IFIP Advances in Information and Communication Technology, page 105-121. (2016)Work in progress: Fearful users' privacy intentions: an empirical investigation.. STAST, page 82-89. ACM, (2017)Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method Preferences.. Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 71-83. Springer, (2020)In Private, Secure, Conversational FinBots We Trust., , , , , , , and . CoRR, (2022)The relationship between trust in AI and trustworthy machine learning technologies., , , , , and . CoRR, (2019)