Ana Ferreira

Orcid: 0000-0002-0953-9411

Affiliations:
  • University of Porto, Faculty of Medicine, CINTESIS, Portugal
  • University of Luxembourg, Luxembourg (2012 - 2015)
  • University of Kent, Canterbury, UK (PhD 2010)
  • University of Porto, Portugal (PhD 2010)


According to our database1, Ana Ferreira authored at least 60 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Attitudes and preferences of digitally skilled dementia caregivers towards online psychoeducation: a cross-sectional study.
Behav. Inf. Technol., March, 2023

2022
Girls4Cyber: A Game to Promote Awareness and Innovation in Cybersecurity.
Proceedings of the HCI International 2022 Posters, 2022

AnyMApp Framework: Anonymous Digital Twin Human-App Interactions.
Proceedings of the HCI International 2022 - Late Breaking Papers. Design, User Experience and Interaction, 2022

VR for Rehabilitation: The Therapist Interaction and Experience.
Proceedings of the HCI International 2022 - Late Breaking Posters, 2022

2021
mHealth in End Stage Renal Disease Self-management: A Usability study.
Proceedings of the ICMHI 2021: 5th International Conference on Medical and Health Informatics, 2021

Perceptions of Security and Privacy in mHealth.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Netphishing: Network and Linguistic Analysis of Phishing Email Subject Lines.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

GDPR: What's in a Year (and a Half)?
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

2019
Bridging the gap between technology and older adults: insights from a collaborative workshop on R&D methodologies for ambient assisted living solutions.
J. Reliab. Intell. Environ., 2019

SoTRAACE for smart security in ambient assisted living.
J. Ambient Intell. Smart Environ., 2019

Persuasion: How phishing emails can influence users and bypass security measures.
Int. J. Hum. Comput. Stud., 2019

Secure Visualization When Using Mobile Applications for Dementia Scenarios.
Proceedings of the 2nd International Conference on Human Systems Engineering and Design: Future Trends and Applications, 2019

Transparency Enhancing Tools and the GDPR: Do They Match?
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Accomplishing Transparency within the General Data Protection Regulation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

mHealth Applications: Can User-adaptive Visualization and Context Affect the Perception of Security and Privacy?
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Visual Schedule: A Mobile Application for Autistic Children - Preliminary Study.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Usability Study of a Tool for Patients' Access Control to Their Health Data.
Proceedings of the 12th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2019), 2019

Dementia and mHealth: On the Way to GDPR Compliance.
Proceedings of the Biomedical Engineering Systems and Technologies, 2019

Mobile Apps for People with Dementia: Are They Compliant with the General Data Protection Regulation (GDPR)?
Proceedings of the 12th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2019), 2019

2018
Phishing Through Time: A Ten Year Story based on Abstracts.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

How Can Visualization Affect Security?
Proceedings of the 20th International Conference on Enterprise Information Systems, 2018

Translating GDPR into the mHealth Practice.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

TagUBig - Taming Your Big Data.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Why Ransomware Needs A Human Touch.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

2017
SoTRAACE - Socio-technical risk-adaptable access control model.
Proceedings of the International Carnahan Conference on Security Technology, 2017

What to Phish in a Subject?
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Persuasion in Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

2015
Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records?
Proceedings of the New Contributions in Information Systems and Technologies, 2015

In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

An Analysis of Social Engineering Principles in Effective Phishing.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Principles of Persuasion in Social Engineering and Their Use in Phishing.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Envisioning secure and usable access control for patients.
Proceedings of the 3nd IEEE International Conference on Serious Games and Applications for Health, 2014

A Conceptual Framework to Study Socio-Technical Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Socio-technical Security Analysis of Wireless Hotspots.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Analysis of the quality of hospital information systems audit trails.
BMC Medical Informatics Decis. Mak., 2013

Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports.
Proceedings of the ICEIS 2013, 2013

2012
A Mobile Based Authorization Mechanism for Patient Managed Role Based Access Control.
Proceedings of the Information Technology in Bio- and Medical Informatics, 2012

One Way to Patient Empowerment - The Proposal of an Authorization Model.
Proceedings of the HEALTHINF 2012 - Proceedings of the International Conference on Health Informatics, Vilamoura, Algarve, Portugal, 1, 2012

2011
Usability of authentication and access control: A case study in healthcare.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Usable access control policy and model for healthcare.
Proceedings of the 24th IEEE International Symposium on Computer-Based Medical Systems, 2011

Protection of Clinical Data - Comparison of European with American Legislation and Respective Technological Applicability.
Proceedings of the HEALTHINF 2011, 2011

Evaluation of a Teleradiology System - Impact and User Satisfaction.
Proceedings of the HEALTHINF 2011, 2011

2010
Grounding information security in healthcare.
Int. J. Medical Informatics, 2010

Access Control in Healthcare: the methodology from legislation to practice.
Proceedings of the MEDINFO 2010, 2010

From Legislation to Practice - A Case Study of Break the Glass in Healthcare.
Proceedings of the HEALTHINF 2010, 2010

2009
How to Securely Break into RBAC: The BTG-RBAC Model.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008

2007
Reviewing the integration of patient data: how systems are evolving in practice to meet patient needs.
BMC Medical Informatics Decis. Mak., 2007

Why Teach Computer Security to Medical Students?
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

E-learning at Porto Faculty of Medicine. A Case Study for the Subject 'Introduction to Medicine'.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

2006
A secure wireless architecture to access a virtual electronic patient record.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

How to Break Access Control in a Controlled Manner.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
Integration of hospital data using agent technologies - A case study.
AI Commun., 2005

2004
Securing a Web-Based EPR: An Approach to Secure a Centralized EPR Within a Hospital.
Proceedings of the ICEIS 2004, 2004

Integrity for Electronic Patient Record Reports.
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004


  Loading...