- Privacy, Security, and Data Protection
- Technology Use by Older Adults
- Information and Cyber Security
- User Authentication and Security Systems
- Cybercrime and Law Enforcement Studies
- Innovative Human-Technology Interaction
- Biometric Identification and Security
- Misinformation and Its Impacts
- Advanced Malware Detection Techniques
- Spam and Phishing Detection
- Aging and Gerontology Research
- Digital Mental Health Interventions
- Technology Adoption and User Behaviour
- Social Media and Politics
- Mobile Health and mHealth Applications
- Hate Speech and Cyberbullying Detection
- Internet Traffic Analysis and Secure E-voting
- Innovative Approaches in Technology and Social Development
- Knowledge Management and Sharing
- Impact of Technology on Adolescents
- COVID-19 and Mental Health
- HIV/AIDS Research and Interventions
- Risk Perception and Management
- Persona Design and Applications
- Health Literacy and Information Accessibility
Abertay University
2022-2024
Northumbria University
2014-2023
iDEAL Technology (United States)
2005
University of Dundee
2003-2005
NCR (United States)
2001
Heriot-Watt University Malaysia
1994
University of Stirling
1989-1993
Multiple Sclerosis Society
1989
American Bankers Association
1989
Lombard Medical (United Kingdom)
1989
To address increasing demand of mental healthcare treatments for older adults and the need to reduce delivery costs, providers are turning mobile applications. The importance psychological barriers have been highlighted in uptake mobile-based health interventions efforts made identify these order facilitate initial acceptance. However, limited research has focused on adults' awareness applications factors that might be hindering their use.The purpose this study was explore perceived...
The connection of home electronic devices to the internet allows remote control physical and involves collection large volumes data. With increase in uptake Internet-of-Things devices, it becomes critical understand digital harms smart homes. We present a systematic literature review on security privacy PRISMA methodology is used systematically 63 studies published between January 2011 October 2021; known cases undertaken illustrate findings with real-world scenarios. Published identifies...
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, information-seeking behaviours, trusted sources information advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older order explore seeking behaviours. Following a thematic analysis these interviews, developed access framework that highlights shortcomings adults' choice resources. Specifically, find users...
Background Phishing is a major threat to the data and infrastructure of healthcare organizations many cyberattacks utilize this socially engineered pathway. simulation used identify weaknesses risks in human defences organizations. There are factors influencing difficulty detecting phishing email including fatigue nature deceptive message. Method A Italian Hospital with over 6000 staff performed as part its annual training risk assessment. Three campaigns were launched at approx. 4-month...
This paper describes some of the consumer-driven usability research conducted by NCR Self Service Strategic Solutions in development an understanding and user acceptance leading-edge biometrics verification techniques. We discuss biometric techniques general focus upon phases issues, associated with iris technology at Automated Teller Machine (ATM) interface. The concludes a review major issues encountered, outline future work area.
This paper presents a method and results of an ethnographic study aimed at building understanding Automatic Teller Machine (ATM) adoption in Mumbai, India. The combined field observations semi-structured interviews (N=43) early ATM adopters, bank customers who do not use ATMs, people used the for first time as part our research. Data were analysed to identify specific cultural traits that may affect ATMs urban Results demonstrated unique role context affecting users' expectations behavioural...
People make security choices on a daily basis without fully considering the implications of those choices. In this paper we present prototype application which promotes choice secure wireless network options, specifically when users are unfamiliar with networks available. The app was developed based behavioural theory, architecture and good practices informed by HCI design. includes several options to 'nudge' towards selecting more public networks. This outlines development results an...
Technologies designed to support ageing can be deemed ageist in that they often exhibit a benevolent paternalism tries 'protect' older people. Often this involves gathering extensive data monitor physical and cognitive decline at the expense of an individual's privacy, with underlying, implicit, assumption adults no longer need much privacy. We consider such issues context project which seeks promote well-being adults. conducted interviews 20 (10 males, 10 females, mean age=73) ask, under...
Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, literacy. Less is known about cybersecurity risks associated behaviours. Using an online survey, this study analyses data from 579 participants investigate across four key behaviours: device securement, password generation, proactive checking, software updating. Significant were found; however, not a straightforward relationship. Older users appear less likely secure their...
Background Chatbots are increasingly being used across a wide range of contexts. Medical chatbots have the potential to improve healthcare capacity and provide timely patient access health information. may also be useful for encouraging individuals seek an initial consultation embarrassing or stigmatizing conditions. Method This experimental study series vignettes test impact different scenarios (experiencing vs. conditions, sexual non-sexual symptoms) on preferences (chatbot doctor),...
Industrial time and space produce marginalities resistance: Queer rejects linearity potentiates alternate experiences (Halbertsam, 2005). Today, many experience phones or smartwatches as mediating temporal ruptures in daily lives (Mowlabocus, 2016), hookup app industries monetise intimacies. Given permanent online connectivity, work leisure are more porous than a factory, yet corporate mediate marginal socialities. Industrious rural queers wrestle control of spatiotemporal intimacies from...
This paper addresses knowledge-based authentication systems in self-service technology, presenting the design and evaluation of Visual Identification Protocol (VIP). The basic idea behind it is to use pictures instead numbers as a means for user authentication. Three different based on images visual memory were designed compared with traditional Personal Number (PIN) approach longitudinal study involving 61 users. experiment addressed performance criteria subjective evaluation. associated...
Graphical authentication systems typically claim to be more usable than PIN or password-based systems, but these claims often follow limited, single-stage paradigm testing on a young, student population. We present demanding test in which multiple codes are learned and tested over three-week period. use this with two user populations, comparing the performance of younger older adults. first establish baseline study populations adults learn we second face-based graphical employing young faces...
Older adults are increasingly a target for cyber-attacks; however, very little research has investigated how they feel about engaging in protective cyber-security behaviors. We developed and applied novel card-sorting task to elicit older behaviors identify the factors that impact their confidence executing these Nineteen task-assisted interviews were conducted with UK adults. A thematic analysis revealed see online as important, but reasons disengagement fell into three categories: I do not...