Duncan Hodges

Orcid: 0000-0002-0660-8776

According to our database1, Duncan Hodges authored at least 24 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
An analysis of the writing of 'suicide cult' members.
Digit. Scholarsh. Humanit., 2022

Personal information: Perceptions, types and evolution.
J. Inf. Secur. Appl., 2022

An Investigation Into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective.
Frontiers Comput. Sci., 2022

CLICKA: Collecting and leveraging identity cues with keystroke dynamics.
Comput. Secur., 2022

2021
Cyber-enabled burglary of smart homes.
Comput. Secur., 2021

Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Sharing Secrets with Agents: Improving Sensitive Disclosures Using Chatbots.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

2020
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
Reconstructing What You Said: Text Inference Using Smartphone Motion.
IEEE Trans. Mob. Comput., 2019

2018
Deconstructing who you play: Character choice in online gaming.
Entertain. Comput., 2018

2017
Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Keystroke Inference Using Smartphone Kinematics.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
User Identification Using Games.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords.
Cyberpsychology Behav. Soc. Netw., 2015

Predicting Graphical Passwords.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Pathways to identity: using visualization to aid law enforcement in identification tasks.
Secur. Informatics, 2014

Image Choice to Represent the Self in Different Online Environments.
Proceedings of the Social Computing and Social Media, 2014

Utility evaluation of models.
Proceedings of the Fifth Workshop on Beyond Time and Errors: Novel Evaluation Methods for Visualization, 2014

2013
Building a better intelligence machine: A new approach to capability review and development.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Relationships between Password Choices, Perceptions of Risk and Security Expertise.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Breaking the Arc: Risk control for Big Data.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
A Model for Identity in the Cyber and Natural Universes.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2009
Estimation of Rainfall Rate from Terrestrial Microwave Link Measurements.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009


  Loading...