default search action
Lynsay A. Shepherd
Person information
- affiliation: Abertay University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Andrea Szymkowiak, Lynsay A. Shepherd, Jason R. C. Nurse, Philipp Brauner, Martina Ziefle:
Editorial: Technology for the greater good? The influence of (ir)responsible systems on human emotions, thinking and behavior. Frontiers Comput. Sci. 5 (2023) - [j6]Alexander Bilz, Lynsay A. Shepherd, Graham I. Johnson:
Tainted Love: a Systematic Literature Review of Online Romance Scam Research. Interact. Comput. 35(6): 773-788 (2023) - [c10]Lynsay A. Shepherd, Andrea Szymkowiak:
Investigating Phishing Awareness Using Virtual Agents and Eye Movements. ETRA 2023: 45:1-45:2 - [i12]Marc Kydd, Lynsay A. Shepherd:
Deep Breath: A Machine Learning Browser Extension to Tackle Online Misinformation. CoRR abs/2301.03301 (2023) - [i11]Alexander Bilz, Lynsay A. Shepherd, Graham I. Johnson:
Tainted Love: A Systematic Review of Online Romance Fraud. CoRR abs/2303.00070 (2023) - 2022
- [c9]Jamie O'Hare, Lynsay A. Shepherd:
Developing a Gamified Peer-Reviewed Bug Bounty Programme. HCI (40) 2022: 514-522 - [c8]Merve Sahin, Tolga Ünlü, Cédric Hébert, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
Measuring Developers' Web Security Awareness from Attack and Defense Perspectives. SP (Workshops) 2022: 31-43 - 2021
- [j5]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105: 102248 (2021) - [c7]Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
Poster: Angry Birding: Evaluating Application Exceptions as Attack Canaries. EuroS&P 2021: 701-703 - 2020
- [c6]Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
A Taxonomy of Approaches for Integrating Attack Awareness in Applications. Cyber Security 2020: 1-4 - [i10]Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
A Taxonomy of Approaches for Integrating Attack Awareness in Applications. CoRR abs/2005.00280 (2020) - [i9]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. CoRR abs/2006.11929 (2020) - [i8]Lynsay A. Shepherd, Stefano De Paoli, Jim Conacher:
Human-Computer Interaction Considerations When Developing Cyber Ranges. CoRR abs/2007.04760 (2020) - [i7]Jamie O'Hare, Lynsay A. Shepherd:
Proposal of a Novel Bug Bounty Implementation Using Gamification. CoRR abs/2009.10158 (2020)
2010 – 2019
- 2019
- [j4]Calum C. Hall, Lynsay A. Shepherd, Natalie Coull:
BlackWatch: Increasing Attack Awareness within Web Applications. Future Internet 11(2): 44 (2019) - [c5]Sam Scholefield, Lynsay A. Shepherd:
Gamification Techniques for Raising Cyber Security Awareness. HCI (29) 2019: 191-203 - [i6]Calum C. Hall, Lynsay A. Shepherd, Natalie Coull:
BlackWatch: Increasing Attack Awareness Within Web Applications. CoRR abs/1901.04243 (2019) - [i5]Sam Scholefield, Lynsay A. Shepherd:
Gamification Techniques for Raising Cyber Security Awareness. CoRR abs/1903.08454 (2019) - 2018
- [j3]Adam Rapley, Xavier J. A. Bellekens, Lynsay A. Shepherd, Colin McLean:
Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis. Informatics 5(4): 46 (2018) - [j2]Karen Renaud, Lynsay A. Shepherd:
GDPR: its time has come. Netw. Secur. 2018(2): 20 (2018) - [c4]Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. CyberSA 2018: 1-8 - [i4]Lynsay A. Shepherd, Karen Renaud:
How to design browser security and privacy alerts. CoRR abs/1806.05426 (2018) - [i3]Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. CoRR abs/1806.06670 (2018) - [i2]Lynsay A. Shepherd, Jacqueline Archibald:
Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour. CoRR abs/1806.06905 (2018) - [i1]Adam Rapley, Xavier J. A. Bellekens, Lynsay A. Shepherd, Colin McLean:
Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis. CoRR abs/1811.05945 (2018) - 2017
- [c3]Lynsay A. Shepherd, Jacqueline Archibald:
Security awareness and affective feedback: Categorical behaviour vs. reported behaviour. CyberSA 2017: 1-6 - [c2]Lynsay A. Shepherd, Jacqueline Archibald, Robert Ian Ferguson:
Assessing the Impact of Affective Feedback on End-User Security Awareness. HCI (22) 2017: 143-159 - 2016
- [b1]Lynsay A. Shepherd:
Enhancing security risk awareness in end-users via affective feedback. Abertay University, UK, 2016 - 2014
- [j1]Lynsay A. Shepherd, Jacqueline Archibald, Robert Ian Ferguson:
Reducing Risky Security Behaviours: Utilising Affective Feedback to Educate Users. Future Internet 6(4): 760-772 (2014) - 2013
- [c1]Lynsay A. Shepherd, Jacqueline Archibald, Robert Ian Ferguson:
Perception of Risky Security Behaviour by Users: Survey of Current Approaches. HCI (27) 2013: 176-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint