Остановите войну!
for scientists:
default search action
Pamela Briggs
- > Home > Persons > Pamela Briggs
Publications
- 2023
- [j31]Adam N. Joinson, Matt Dixon, Lynne M. Coventry, Pam Briggs:
Development of a new 'human cyber-resilience scale'. J. Cybersecur. 9(1) (2023) - [c65]Benjamin Alan Morrison, James Nicholson, Lynne M. Coventry, Pam Briggs:
Recognising Diversity in Older Adults' Cybersecurity Needs. GoodIT 2023: 437-445 - 2022
- [j27]Matt Dixon, James Nicholson, Dawn Branley-Bell, Pam Briggs, Lynne M. Coventry:
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop. Proc. ACM Hum. Comput. Interact. 6(MHCI): 1-22 (2022) - [c63]Dawn Branley-Bell, Lynne M. Coventry, Pam Briggs:
Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption. EuroUSEC 2022: 151-159 - 2019
- [c56]James Nicholson, Lynne M. Coventry, Pamela Briggs:
"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults. CHI 2019: 349 - 2018
- [c53]James Nicholson, Lynne M. Coventry, Pam Briggs:
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. SOUPS @ USENIX Security Symposium 2018: 443-457 - 2017
- [j18]Debora Jeske, Andrew R. McNeill, Lynne M. Coventry, Pam Briggs:
Security information sharing via Twitter: 'Heartbleed' as a case study. Int. J. Web Based Communities 13(2): 172-192 (2017) - [c50]Andrew R. McNeill, Lynne M. Coventry, Jake Pywell, Pam Briggs:
Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. CHI 2017: 6425-6437 - [c49]Pam Briggs, Debora Jeske, Lynne M. Coventry:
The Design of Messages to Improve Cybersecurity Incident Reporting. HCI (22) 2017: 3-13 - [c47]Andrew R. McNeill, Pamela Briggs, Jake Pywell, Lynne M. Coventry:
Functional privacy concerns of older adults about pervasive health-monitoring systems. PETRA 2017: 96-102 - [c46]James Nicholson, Lynne M. Coventry, Pam Briggs:
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. SOUPS 2017: 285-298 - 2016
- [j15]Debora Jeske, Pam Briggs, Lynne M. Coventry:
Exploring the relationship between impulsivity and decision-making on mobile devices. Pers. Ubiquitous Comput. 20(4): 545-557 (2016) - [c41]Lynne M. Coventry, Pam Briggs:
Mobile Technology for Older Adults: Protector, Motivator or Threat? HCI (24) 2016: 424-434 - 2015
- [c40]James Turland, Lynne M. Coventry, Debora Jeske, Pam Briggs, Aad P. A. van Moorsel:
Nudging towards security: developing an application for wireless network selection for android phones. BCS HCI 2015: 193-201 - 2014
- [c33]Lynne M. Coventry, Pam Briggs, Debora Jeske, Aad P. A. van Moorsel:
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. HCI (8) 2014: 229-239 - [c31]Debora Jeske, Lynne M. Coventry, Pamela Briggs:
Decision Justifications for Wireless Network Selection. STAST 2014: 1-7 - 2013
- [j13]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Faces and Pictures: Understanding age differences in two types of graphical authentications. Int. J. Hum. Comput. Stud. 71(10): 958-966 (2013) - [c28]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Age-related performance issues for PIN and face-based authentication systems. CHI 2013: 323-332 - 2012
- [c23]James Nicholson, Paul Dunphy, Lynne M. Coventry, Pamela Briggs, Patrick Olivier:
A security assessment of tiles: a new portfolio-based graphical authentication system. CHI Extended Abstracts 2012: 1967-1972 - 2011
- [c22]Linda Little, Pamela Briggs, Lynne M. Coventry:
Who knows about me?: an analysis of age-related disclosure preferences. BCS HCI 2011: 84-87 - 2005
- [j5]Linda Little, Pamela Briggs, Lynne M. Coventry:
Public space systems: Designing for privacy? Int. J. Hum. Comput. Stud. 63(1-2): 254-268 (2005)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint