Lynne Coventry

ORCID: 0000-0002-6600-8414
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Technology Use by Older Adults
  • Information and Cyber Security
  • User Authentication and Security Systems
  • Cybercrime and Law Enforcement Studies
  • Innovative Human-Technology Interaction
  • Biometric Identification and Security
  • Misinformation and Its Impacts
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Aging and Gerontology Research
  • Digital Mental Health Interventions
  • Technology Adoption and User Behaviour
  • Social Media and Politics
  • Mobile Health and mHealth Applications
  • Hate Speech and Cyberbullying Detection
  • Internet Traffic Analysis and Secure E-voting
  • Innovative Approaches in Technology and Social Development
  • Knowledge Management and Sharing
  • Impact of Technology on Adolescents
  • COVID-19 and Mental Health
  • HIV/AIDS Research and Interventions
  • Risk Perception and Management
  • Persona Design and Applications
  • Health Literacy and Information Accessibility

Abertay University
2022-2024

Northumbria University
2014-2023

iDEAL Technology (United States)
2005

University of Dundee
2003-2005

NCR (United States)
2001

Heriot-Watt University Malaysia
1994

University of Stirling
1989-1993

Multiple Sclerosis Society
1989

American Bankers Association
1989

Lombard Medical (United Kingdom)
1989

To address increasing demand of mental healthcare treatments for older adults and the need to reduce delivery costs, providers are turning mobile applications. The importance psychological barriers have been highlighted in uptake mobile-based health interventions efforts made identify these order facilitate initial acceptance. However, limited research has focused on adults' awareness applications factors that might be hindering their use.The purpose this study was explore perceived...

10.1177/2055207620905422 article EN cc-by-nc-nd Digital Health 2020-01-01

The connection of home electronic devices to the internet allows remote control physical and involves collection large volumes data. With increase in uptake Internet-of-Things devices, it becomes critical understand digital harms smart homes. We present a systematic literature review on security privacy PRISMA methodology is used systematically 63 studies published between January 2011 October 2021; known cases undertaken illustrate findings with real-world scenarios. Published identifies...

10.1016/j.chb.2023.107770 article EN cc-by Computers in Human Behavior 2023-03-28

Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, information-seeking behaviours, trusted sources information advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older order explore seeking behaviours. Following a thematic analysis these interviews, developed access framework that highlights shortcomings adults' choice resources. Specifically, find users...

10.1145/3290605.3300579 article EN 2019-04-29

Background Phishing is a major threat to the data and infrastructure of healthcare organizations many cyberattacks utilize this socially engineered pathway. simulation used identify weaknesses risks in human defences organizations. There are factors influencing difficulty detecting phishing email including fatigue nature deceptive message. Method A Italian Hospital with over 6000 staff performed as part its annual training risk assessment. Three campaigns were launched at approx. 4-month...

10.1177/20552076221081716 article EN cc-by-nc-nd Digital Health 2022-01-01

This paper describes some of the consumer-driven usability research conducted by NCR Self Service Strategic Solutions in development an understanding and user acceptance leading-edge biometrics verification techniques. We discuss biometric techniques general focus upon phases issues, associated with iris technology at Automated Teller Machine (ATM) interface. The concludes a review major issues encountered, outline future work area.

10.1145/642611.642639 article EN 2003-04-05

This paper presents a method and results of an ethnographic study aimed at building understanding Automatic Teller Machine (ATM) adoption in Mumbai, India. The combined field observations semi-structured interviews (N=43) early ATM adopters, bank customers who do not use ATMs, people used the for first time as part our research. Data were analysed to identify specific cultural traits that may affect ATMs urban Results demonstrated unique role context affecting users' expectations behavioural...

10.1016/j.intcom.2003.11.003 article EN Interacting with Computers 2003-12-30

People make security choices on a daily basis without fully considering the implications of those choices. In this paper we present prototype application which promotes choice secure wireless network options, specifically when users are unfamiliar with networks available. The app was developed based behavioural theory, architecture and good practices informed by HCI design. includes several options to 'nudge' towards selecting more public networks. This outlines development results an...

10.1145/2783446.2783588 article EN 2015-07-10

Technologies designed to support ageing can be deemed ageist in that they often exhibit a benevolent paternalism tries 'protect' older people. Often this involves gathering extensive data monitor physical and cognitive decline at the expense of an individual's privacy, with underlying, implicit, assumption adults no longer need much privacy. We consider such issues context project which seeks promote well-being adults. conducted interviews 20 (10 males, 10 females, mean age=73) ask, under...

10.1145/3056540.3056559 article EN 2017-06-21

Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, literacy. Less is known about cybersecurity risks associated behaviours. Using an online survey, this study analyses data from 579 participants investigate across four key behaviours: device securement, password generation, proactive checking, software updating. Significant were found; however, not a straightforward relationship. Older users appear less likely secure their...

10.1155/2022/2693080 article EN cc-by Human Behavior and Emerging Technologies 2022-10-21

Background Chatbots are increasingly being used across a wide range of contexts. Medical chatbots have the potential to improve healthcare capacity and provide timely patient access health information. may also be useful for encouraging individuals seek an initial consultation embarrassing or stigmatizing conditions. Method This experimental study series vignettes test impact different scenarios (experiencing vs. conditions, sexual non-sexual symptoms) on preferences (chatbot doctor),...

10.3389/fcomm.2023.1275127 article EN cc-by Frontiers in Communication 2023-09-27

Industrial time and space produce marginalities resistance: Queer rejects linearity potentiates alternate experiences (Halbertsam, 2005). Today, many experience phones or smartwatches as mediating temporal ruptures in daily lives (Mowlabocus, 2016), hookup app industries monetise intimacies. Given permanent online connectivity, work leisure are more porous than a factory, yet corporate mediate marginal socialities. Industrious rural queers wrestle control of spatiotemporal intimacies from...

10.5210/spir.v2024i0.14039 article EN AoIR Selected Papers of Internet Research 2025-01-02

This paper addresses knowledge-based authentication systems in self-service technology, presenting the design and evaluation of Visual Identification Protocol (VIP). The basic idea behind it is to use pictures instead numbers as a means for user authentication. Three different based on images visual memory were designed compared with traditional Personal Number (PIN) approach longitudinal study involving 61 users. experiment addressed performance criteria subjective evaluation. associated...

10.1145/1556262.1556312 article EN 2002-05-22

Graphical authentication systems typically claim to be more usable than PIN or password-based systems, but these claims often follow limited, single-stage paradigm testing on a young, student population. We present demanding test in which multiple codes are learned and tested over three-week period. use this with two user populations, comparing the performance of younger older adults. first establish baseline study populations adults learn we second face-based graphical employing young faces...

10.1145/2470654.2470701 article EN 2013-04-27

10.1016/j.ijhcs.2020.102412 article EN International Journal of Human-Computer Studies 2020-02-08

Older adults are increasingly a target for cyber-attacks; however, very little research has investigated how they feel about engaging in protective cyber-security behaviors. We developed and applied novel card-sorting task to elicit older behaviors identify the factors that impact their confidence executing these Nineteen task-assisted interviews were conducted with UK adults. A thematic analysis revealed see online as important, but reasons disengagement fell into three categories: I do not...

10.1002/hbe2.291 article EN Human Behavior and Emerging Technologies 2021-10-17
Coming Soon ...