Search filters

List of works by Sadie Creese

A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches

article

A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks

article

A Pragmatic System-failure Assessment and Response Model

A picture tells a thousand words: What Facebook and Twitter images convey about our personality

scholarly article by Monica T. Whitty et al published October 2018 in Personality and Individual Differences

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System

Analytics for characterising and measuring the naturalness of online personae

Building Confidence in Information-Trustworthiness Metrics for Decision Support

Communicating trustworthiness using radar graphs: A detailed look

Future scenarios and challenges for security and privacy

Guidelines for usable cybersecurity: Past and present

Identifying attack patterns for insider threat detection

Image Choice to Represent the Self in Different Online Environments

Individual differences in cyber security behaviors: an examination of who is sharing passwords

scientific article

Inferring social relationships from technology-level device connections

Mapping the coverage of security controls in cyber insurance proposal forms

Pathways to identity: using visualization to aid law enforcement in identification tasks

scholarly article by Joe Bruce et al published 18 September 2014 in Security informatics

Predicting Graphical Passwords

Privacy Salience: Taxonomies and Research Opportunities

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat

Relationships between Password Choices, Perceptions of Risk and Security Expertise

Security Risk Assessment in Internet of Things Systems

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics

Tag clouds with a twist: using tag clouds coloured by information’s trustworthiness to support situational awareness

article by Jason R.C. Nurse et al published December 2015 in Journal of Trust Management

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content

scholarly article published October 2015

The Perfect Storm: The Privacy Paradox and the Internet-of-Things

scholarly article published August 2016

Tools for understanding identity

Trustworthy and effective communication of cybersecurity risks: A review

article

Two sides of the coin: measuring and communicating the trustworthiness of online information

Understanding Insider Threat: A Framework for Characterising Attacks

Using Information Trustworthiness Advice in Decision Making