default search action
James Nicholson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c35]Curtis Briddick, Pam Briggs, James Nicholson:
Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults. World Conference on Information Security Education 2024: 65-80 - 2023
- [j5]David Buil-Gil, Steven Kemp, Stefanie Kuenzel, Lynne M. Coventry, Sameh Zakhary, Daniel Tilley, James Nicholson:
The digital harms of smart home devices: A systematic literature review. Comput. Hum. Behav. 145: 107770 (2023) - [j4]Dinislam Abdulgalimov, Reuben Kirkham, Stephen Lindsay, James Nicholson, Vasilis Vlachokyriakos, Emily Dao, Daniel Kos, Daniel Jitnah, Pam Briggs, Patrick Olivier:
Designing for the Embedding of Employee Voice. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-31 (2023) - [c34]Dinislam Abdulgalimov, Reuben Kirkham, James Nicholson, Tom Bartindale, Patrick Olivier:
OurStrategy: Employee Voice In Transnational Strategy Development. CHI 2023: 871:1-871:17 - [c33]Matt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry:
Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access. EuroUSEC 2023: 86-96 - [c32]Matt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry:
"It's the one thing that makes my life tick": Security Perspectives of the Smartphone Era. EuroUSEC 2023: 97-111 - [c31]Neeranjan Chitare, Lynne M. Coventry, James Nicholson:
"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations. EuroUSEC 2023: 344-355 - [c30]Benjamin Alan Morrison, James Nicholson, Lynne M. Coventry, Pam Briggs:
Recognising Diversity in Older Adults' Cybersecurity Needs. GoodIT 2023: 437-445 - [c29]James Nicholson, Opeyemi Dele-Ajayi, Kemi Fasae, Boniface Kayode Alese:
Friendly Folk Advice: Exploring Cybersecurity Information Sharing in Nigeria. INTERACT (1) 2023: 369-378 - 2022
- [j3]Matt Dixon, James Nicholson, Dawn Branley-Bell, Pam Briggs, Lynne M. Coventry:
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop. Proc. ACM Hum. Comput. Interact. 6(MHCI): 1-22 (2022) - [c28]Rohit Venugopal, Longzhi Yang, Vicki Elsey, Mark J. Flynn, Joshua S. Jackman, Phillip G. Bell, Joe Kupusarevic, Paul D. Smith, James Nicholson:
Association Rule Mining for Occupational Wellbeing During COVID. UKCI 2022: 539-550 - [i4]David Buil-Gil, Steven Kemp, Stefanie Kuenzel, Lynne M. Coventry, Sameh Zakhary, Daniel Tilley, James Nicholson:
The digital harms of smart home devices: A systematic literature review. CoRR abs/2209.05458 (2022) - 2021
- [c27]James Nicholson, Benjamin Alan Morrison, Matt Dixon, Jack Holt, Lynne M. Coventry, Jill McGlasson:
Training and Embedding Cybersecurity Guardians in Older Communities. CHI 2021: 86:1-86:15 - [c26]James Nicholson, Julia Terry, Helen Beckett, Pardeep Kumar:
Understanding Young People's Experiences of Cybersecurity. EuroUSEC 2021: 200-210 - [c25]Polina Evtimova, James Nicholson:
Exploring the Acceptability of Graphical Passwords for People with Dyslexia. INTERACT (1) 2021: 213-222 - [c24]Jack Holt, James Nicholson, Jan David Smeddinck:
From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data. WWW 2021: 2745-2756 - [i3]Jack Holt, James Nicholson, Jan David Smeddinck:
From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data. CoRR abs/2104.07807 (2021) - 2020
- [c23]James Nicholson, Jill McGlasson:
CyberGuardians: Improving Community Cyber Resilience Through Embedded Peer-to-Peer Support. Conference on Designing Interactive Systems (Companion Volume) 2020: 117-121 - [c22]Dinislam Abdulgalimov, Reuben Kirkham, James Nicholson, Vasilis Vlachokyriakos, Pam Briggs, Patrick Olivier:
Designing for Employee Voice. CHI 2020: 1-13 - [c21]James Nicholson, Yousra Javed, Matt Dixon, Lynne M. Coventry, Opeyemi Dele-Ajayi, Philip Anderson:
Investigating Teenagers' Ability to Detect Phishing Messages. EuroS&P Workshops 2020: 140-149 - [i2]Dinislam Abdulgalimov, Reuben Kirkham, James Nicholson, Vasilis Vlachokyriakos, Pam Briggs, Patrick Olivier:
Designing for Employee Voice. CoRR abs/2003.02976 (2020)
2010 – 2019
- 2019
- [c20]Matt Dixon, Nalin Asanka Gamagedara Arachchilage, James Nicholson:
Engaging Users with Educational Games: The Case of Phishing. CHI Extended Abstracts 2019 - [c19]James Nicholson, Lynne M. Coventry, Pamela Briggs:
"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults. CHI 2019: 349 - [i1]Matt Dixon, Nalin Asanka Gamagedara Arachchilage, James Nicholson:
Engaging Users with Educational Games: The Case of Phishing. CoRR abs/1903.03019 (2019) - 2018
- [c18]James Nicholson, Lynne M. Coventry, Pam Briggs:
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. SOUPS @ USENIX Security Symposium 2018: 443-457 - 2017
- [j2]Aftab Khan, James Nicholson, Thomas Plötz:
Activity Recognition for Quality Assessment of Batting Shots in Cricket using a Hierarchical Representation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 62:1-62:31 (2017) - [c17]James Nicholson, Lynne M. Coventry, Pam Briggs:
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. SOUPS 2017: 285-298 - 2016
- [c16]Pam Briggs, Elizabeth F. Churchill, Mark Levine, James Nicholson, Gary W. Pritchard, Patrick Olivier:
Everyday Surveillance. CHI Extended Abstracts 2016: 3566-3573 - 2015
- [c15]Paul Dunphy, Johannes Schöning, James Nicholson, Patrick Olivier:
Captchat: A Messaging Tool to Frustrate Ubiquitous Surveillance. CHI Extended Abstracts 2015: 639-646 - [c14]Ahmed Kharrufa, James Nicholson, Paul Dunphy, Steve Hodges, Pam Briggs, Patrick Olivier:
Using IMUs to Identify Supervisors on Touch Devices. INTERACT (2) 2015: 565-583 - [c13]Paul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John C. McCarthy, Patrick Olivier:
Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets. SOUPS 2015: 141-150 - 2014
- [c12]James Nicholson, Mark Huber, Daniel Jackson, Patrick Olivier:
Panopticon as an eLearning support search tool. CHI 2014: 1221-1224 - [c11]Christo Panchev, Petar Dobrev, James Nicholson:
Detecting Port Scans against Mobile Devices with Neural Networks and Decision Trees. EANN 2014: 175-182 - [c10]Aftab Khan, James Nicholson, Sebastian Mellor, Daniel Jackson, Karim Ladha, Cassim Ladha, Jon Hand, Joseph Clarke, Patrick Olivier, Thomas Plötz:
Occupancy monitoring using environmental & context sensors and a hierarchical analysis framework. BuildSys 2014: 90-99 - 2013
- [j1]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Faces and Pictures: Understanding age differences in two types of graphical authentications. Int. J. Hum. Comput. Stud. 71(10): 958-966 (2013) - [c9]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Age-related performance issues for PIN and face-based authentication systems. CHI 2013: 323-332 - [c8]Daniel Jackson, James Nicholson, Gerrit Stoeckigt, Rebecca Wrobel, Anja Thieme, Patrick Olivier:
Panopticon: a parallel video overview system. UIST 2013: 123-130 - 2012
- [c7]Pamela Briggs, Mark Blythe, John Vines, Stephen Lindsay, Paul Dunphy, James Nicholson, David Philip Green, Jim Kitson, Andrew Monk, Patrick Olivier:
Invisible design: exploring insights and ideas through ambiguous film scenarios. Conference on Designing Interactive Systems 2012: 534-543 - [c6]James Nicholson, Paul Dunphy, Lynne M. Coventry, Pamela Briggs, Patrick Olivier:
A security assessment of tiles: a new portfolio-based graphical authentication system. CHI Extended Abstracts 2012: 1967-1972 - 2010
- [c5]David Kim, Paul Dunphy, Pamela Briggs, Jonathan Hook, John Nicholson, James Nicholson, Patrick Olivier:
Multi-touch authentication on tabletops. CHI 2010: 1093-1102 - [c4]James H. Taylor, Hazem M. S. Ibrahim, Jeff Slipp, James Nicholson:
A safe communication scheme for an intelligent Wireless Networked Control System Coordination Agent. SMC 2010: 3068-3073
2000 – 2009
- 2008
- [c3]Jeff Slipp, Changning Ma, Nagesh Polu, James Nicholson, Martin J. Murillo, Sajid Hussain:
WINTeR: Architecture and Applications of a Wireless Industrial Sensor Network Testbed for Radio-Harsh Environments. CNSR 2008: 422-431 - [c2]Paul Dunphy, James Nicholson, Patrick Olivier:
Securing passfaces for description. SOUPS 2008: 24-35 - 2007
- [c1]Ian Johnstone, James Nicholson, Babar Shehzad, Jeff Slipp:
Experiences from a wireless sensor network deployment in a petroleum environment. IWCMC 2007: 382-387
Coauthor Index
aka: Pam Briggs
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint