Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Tom BuchananPsychology, University of Westminster, UKVerified email at wmin.ac.uk
- Adam JoinsonProfessor of Information Systems, University of Bath, UKVerified email at bath.ac.uk
- Duncan HodgesCranfield UniversityVerified email at cranfield.ac.uk
- Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Dr Mark GriffithsDistinguished Professor of Behavioural Addiction, Nottingham Trent UniversityVerified email at ntu.ac.uk
- Ellen HelsperLondon School of EconomicsVerified email at lse.ac.uk
- Jeff GavinDepartment of Psychology, University of BathVerified email at bath.ac.uk
- Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
- Gianluca StringhiniAssociate Professor at Boston UniversityVerified email at bu.edu
- Matthew EdwardsUniversity of BristolVerified email at bristol.ac.uk
- Danae Stanton FraserProfessor of Psychology, University of BathVerified email at bath.ac.uk
- Tom SorellProfessor of Politics and Philosophy, Warwick UniversityVerified email at warwick.ac.uk
- William DuttonEmeritus Professor, University of Southern CaliforniaVerified email at usc.edu
- Ioannis AgrafiotisComputer Science Department, University of OxfordVerified email at cs.ox.ac.uk
- Michael LeviProfessor of Criminology, Cardiff UniversityVerified email at Cardiff.ac.uk
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
- Rosemary Jill LeonardProfessor Western Sydney UniversityVerified email at westernsydney.edu.au