Get my own profile
Public access
View all27 articles
1 article
available
not available
Based on funding mandates
Co-authors
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Kat KrolGoogle UKVerified email at google.com
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Graham MorganComputing Science, Newcastle UniversityVerified email at ncl.ac.uk
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Paul DunphyGenVerified email at dunph.me
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Simon ArnellConfigured ThingsVerified email at configuredthings.com
Jonas HielscherPostdoc, Human-Centred CybersecurityVerified email at cispa.de
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Elsa Turcios RodríguezTU DelftVerified email at tudelft.nl
Yi Ting ChuaUniversity of TulsaVerified email at utulsa.edu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
PD Dr. Zinaida BenensonHead of Human Factors in Security and Privacy Group, University of Erlangen-NurembergVerified email at fau.de