Lynne M. Coventry

According to our database1, Lynne M. Coventry authored at least 42 papers between 1989 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The quantified older adult as design requirements for accessible wellbeing interventions.
Proceedings of the 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2019

"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Costly but effective: Comparing the factors that influence employee anti-malware behaviours.
Computers in Human Behavior, 2018

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

An Initial Generic Assessment Framework for the Consideration of Risk in the Implementation of Autonomous Systems.
Proceedings of the Human Work Interaction Design. Designing Engaging Automation, 2018

2017
Security information sharing via Twitter: 'Heartbleed' as a case study.
IJWBC, 2017

Risk perceptions of cyber-security and precautionary behaviour.
Computers in Human Behavior, 2017

Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Functional privacy concerns of older adults about pervasive health-monitoring systems.
Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments, 2017

The Design of Messages to Improve Cybersecurity Incident Reporting.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Privacy Considerations when Designing Social Network Systems to Support Successful Ageing.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Exploring the relationship between impulsivity and decision-making on mobile devices.
Personal and Ubiquitous Computing, 2016

Mobile Technology for Older Adults: Protector, Motivator or Threat?
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2016

2015
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

An Appraisal-Based Approach to the Stigma of Walker-Use.
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2015

Principles of Persuasion in Social Engineering and Their Use in Phishing.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Nudging towards security: developing an application for wireless network selection for android phones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Decision Justifications for Wireless Network Selection.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Using animated scenarios to explore severity of cyberbullying and reporting readiness.
Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures, 2014

SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment.
Proceedings of the Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience, 2014

2013
Faces and Pictures: Understanding age differences in two types of graphical authentications.
Int. J. Hum.-Comput. Stud., 2013

Assistive technology for older adults: psychological and socio-emotional design requirements.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Age-related performance issues for PIN and face-based authentication systems.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

A haptic ATM interface to assist visually impaired users.
Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility, 2013

2012
The role of tea parties to elicit technology requirements to support the mobility of older adults.
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012

Cyber Security Games: A New Line of Risk.
Proceedings of the Entertainment Computing - ICEC 2012 - 11th International Conference, 2012

A security assessment of tiles: a new portfolio-based graphical authentication system.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

Who knows about me?: an analysis of age-related disclosure preferences.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

2010
Human Factors.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Trust in 'E': Users' Trust in Information Resources in the Web Environment.
Proceedings of the ENTERprise Information Systems - International Conference, 2010

2009
Biometrics in Practice: What Does HCI Have to Say?
Proceedings of the Human-Computer Interaction, 2009

2005
Public space systems: Designing for privacy?
International Journal of Man-Machine Studies, 2005

Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems.
International Journal of Man-Machine Studies, 2005

2004
Introducing ATMs in India: a contextual inquiry.
Interacting with Computers, 2004

2003
Usability and biometric verification at the ATM interface.
Proceedings of the 2003 Conference on Human Factors in Computing Systems, 2003

2002
VIP: a visual approach to user authentication.
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002

2001
"You Talking to Me?" Exploring Voice in Self-Service User Interfaces.
Int. J. Hum. Comput. Interaction, 2001

1993
The automation of helpdesks.
Proceedings of the 1st International Workshop on Intelligent User Interfaces, 1993

1990
Cognitive style and intelligent help.
Proceedings of the Human-Computer Interaction, 1990

1989
Some Effects of Cognitive Style on Learning UNIX.
International Journal of Man-Machine Studies, 1989


  Loading...