Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Alastair BeresfordComputer Laboratory, University of CambridgeVerified email at cam.ac.uk
Dorothea KüblerWZB Social Science Center Berlin and TU BerlinVerified email at wzb.eu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Kat KrolGoogle UKVerified email at google.com
Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
Jose SuchResearch Professor, King's College London & Professor Titular VRAIN-UPVVerified email at kcl.ac.uk
Miguel MalheirosUniversity College LondonVerified email at cs.ucl.ac.uk
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Gunes AcarAssistant Professor at Radboud UniversityVerified email at cs.ru.nl
Adam JoinsonProfessor of Information Systems, University of Bath, UKVerified email at bath.ac.uk
Florian KammüllerAssociate Professor, Middlesex University London and Privatdozent TU BerlinVerified email at mdx.ac.uk
Daniel J. LieblingGoogleVerified email at liebling.org
Chetan BansalMicrosoftVerified email at microsoft.com
Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
Katie ShiltonAssociate Professor, Information Studies, University of Maryland College ParkVerified email at umd.edu
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Jan BlomSnr. User Experience Researcher, GoogleVerified email at google.com