Lynne M. Coventry

Orcid: 0000-0002-6600-8414

According to our database1, Lynne M. Coventry authored at least 63 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Critical Reflection on the Use of Toxicity Detection Algorithms in Proactive Content Moderation Systems.
CoRR, 2024

Key to Kindness: Reducing Toxicity In Online Discourse Through Proactive Content Moderation in a Mobile Keyboard.
CoRR, 2024

2023
The digital harms of smart home devices: A systematic literature review.
Comput. Hum. Behav., August, 2023

Development of a new 'human cyber-resilience scale'.
J. Cybersecur., January, 2023

Evaluating the Effects of Culture and Relationship Strength on Misinformation Challenging Behaviours Within the UK.
Proceedings of the Human-Computer Interaction - INTERACT 2023 - 19th IFIP TC13 International Conference, York, UK, August 28, 2023

Recognising Diversity in Older Adults' Cybersecurity Needs.
Proceedings of the 2023 ACM Conference on Information Technology for Social Good, 2023

"It's the one thing that makes my life tick": Security Perspectives of the Smartphone Era.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access.
Proceedings of the 2023 European Symposium on Usable Security, 2023

"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations.
Proceedings of the 2023 European Symposium on Usable Security, 2023

"I figured her feeling a little bit bad was worth it to not spread that kind of hate": Exploring how UK families discuss and challenge misinformation.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop.
Proc. ACM Hum. Comput. Interact., 2022

Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
User Requirements for Inclusive Technology for Older Adults.
Int. J. Hum. Comput. Interact., 2021

Promoting Cybersecurity Culture Change in Healthcare.
Proceedings of the PETRA '21: The 14th PErvasive Technologies Related to Assistive Environments Conference, Virtual Event, Greece, 29 June, 2021

Training and Embedding Cybersecurity Guardians in Older Communities.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Desires for active ageing technology.
Int. J. Hum. Comput. Stud., 2020

Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

User Trust and Understanding of Explainable AI: Exploring Algorithm Visualisations and User Biases.
Proceedings of the Human-Computer Interaction. Human Values and Quality of Life, 2020

Investigating Teenagers' Ability to Detect Phishing Messages.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
The quantified older adult as design requirements for accessible wellbeing interventions.
Proceedings of the 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2019

"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Costly but effective: Comparing the factors that influence employee anti-malware behaviours.
Comput. Hum. Behav., 2018

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

An Initial Generic Assessment Framework for the Consideration of Risk in the Implementation of Autonomous Systems.
Proceedings of the Human Work Interaction Design. Designing Engaging Automation, 2018

2017
Security information sharing via Twitter: 'Heartbleed' as a case study.
Int. J. Web Based Communities, 2017

Risk perceptions of cyber-security and precautionary behaviour.
Comput. Hum. Behav., 2017

Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Functional privacy concerns of older adults about pervasive health-monitoring systems.
Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments, 2017

The Design of Messages to Improve Cybersecurity Incident Reporting.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Privacy Considerations when Designing Social Network Systems to Support Successful Ageing.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Exploring the relationship between impulsivity and decision-making on mobile devices.
Pers. Ubiquitous Comput., 2016

Mobile Technology for Older Adults: Protector, Motivator or Threat?
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2016

2015
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

An Appraisal-Based Approach to the Stigma of Walker-Use.
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2015

Principles of Persuasion in Social Engineering and Their Use in Phishing.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Nudging towards security: developing an application for wireless network selection for android phones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Decision Justifications for Wireless Network Selection.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Using animated scenarios to explore severity of cyberbullying and reporting readiness.
Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures, 2014

SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment.
Proceedings of the Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience, 2014

2013
Faces and Pictures: Understanding age differences in two types of graphical authentications.
Int. J. Hum. Comput. Stud., 2013

Assistive technology for older adults: psychological and socio-emotional design requirements.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Age-related performance issues for PIN and face-based authentication systems.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

A haptic ATM interface to assist visually impaired users.
Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility, 2013

2012
The role of tea parties to elicit technology requirements to support the mobility of older adults.
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012

Cyber Security Games: A New Line of Risk.
Proceedings of the Entertainment Computing - ICEC 2012 - 11th International Conference, 2012

A security assessment of tiles: a new portfolio-based graphical authentication system.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

Who knows about me?: an analysis of age-related disclosure preferences.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

2010
Human Factors.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Trust in 'E': Users' Trust in Information Resources in the Web Environment.
Proceedings of the ENTERprise Information Systems - International Conference, 2010

2009
Biometrics in Practice: What Does HCI Have to Say?
Proceedings of the Human-Computer Interaction, 2009

2005
Public space systems: Designing for privacy?
Int. J. Hum. Comput. Stud., 2005

Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems.
Int. J. Hum. Comput. Stud., 2005

2004
Introducing ATMs in India: a contextual inquiry.
Interact. Comput., 2004

2003
Usability and biometric verification at the ATM interface.
Proceedings of the 2003 Conference on Human Factors in Computing Systems, 2003

2002
VIP: a visual approach to user authentication.
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002

2001
"You Talking to Me?" Exploring Voice in Self-Service User Interfaces.
Int. J. Hum. Comput. Interact., 2001

1998
The effects of visual proxemic information in video mediated communication.
ACM SIGCHI Bull., 1998

1993
The automation of helpdesks.
Proceedings of the 1st International Workshop on Intelligent User Interfaces, 1993

1990
Cognitive style and intelligent help.
Proceedings of the Human-Computer Interaction, 1990

1989
Some Effects of Cognitive Style on Learning UNIX.
Int. J. Man Mach. Stud., 1989


  Loading...