Get my own profile
Public access
View all16 articles
1 article
available
not available
Based on funding mandates
Co-authors
Tom BuchananPsychology, University of Westminster, UKVerified email at wmin.ac.uk
Adam JoinsonProfessor of Information Systems, University of Bath, UKVerified email at bath.ac.uk
Duncan HodgesCranfield UniversityVerified email at cranfield.ac.uk
Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
Dr Mark GriffithsDistinguished Professor of Behavioural Addiction, Nottingham Trent UniversityVerified email at ntu.ac.uk
Ellen HelsperLondon School of EconomicsVerified email at lse.ac.uk
Jeff GavinDepartment of Psychology, University of BathVerified email at bath.ac.uk
Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
Gianluca StringhiniAssociate Professor at Boston UniversityVerified email at bu.edu
Matthew EdwardsUniversity of BristolVerified email at bristol.ac.uk
Danae Stanton FraserProfessor of Psychology, University of BathVerified email at bath.ac.uk
Tom SorellProfessor of Politics and Philosophy, Warwick UniversityVerified email at warwick.ac.uk
William DuttonEmeritus Professor, University of Southern CaliforniaVerified email at usc.edu
Ioannis AgrafiotisComputer Science Department, University of OxfordVerified email at cs.ox.ac.uk
Michael LeviProfessor of Criminology, Cardiff UniversityVerified email at Cardiff.ac.uk
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Rosemary Jill LeonardProfessor Western Sydney UniversityVerified email at westernsydney.edu.au