Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
M. Angela Sasse FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Kat KrolGoogle UKVerified email at google.com
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Graham MorganComputing Science, Newcastle UniversityVerified email at ncl.ac.uk
Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Simon ArnellConfigured ThingsVerified email at configuredthings.com
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
Paul DunphyGenVerified email at gendigital.com
Yi Ting ChuaUniversity of AlabamaVerified email at ua.edu
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
PD Dr. Zinaida BenensonHead of Human Factors in Security and Privacy Group, University of Erlangen-NurembergVerified email at fau.de
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Shamal FailyDefence Science and Technology LaboratoryVerified email at dstl.gov.uk
John LyleDepartment of Computer Science, University of OxfordVerified email at cs.ox.ac.uk