Emma Williams

ORCID: 0000-0002-8581-6214
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MRI Techniques and Applications
  • Spam and Phishing Detection
  • Functional Brain Connectivity Studies
  • Misinformation and Its Impacts
  • Information and Cyber Security
  • Neural and Behavioral Psychology Studies
  • Deception detection and forensic psychology
  • Advanced Neuroimaging Techniques and Applications
  • Cybercrime and Law Enforcement Studies
  • Human-Animal Interaction Studies
  • Physics of Superconductivity and Magnetism
  • Evaluation and Performance Assessment
  • Memory and Neural Mechanisms
  • ZnO doping and properties
  • Personal Information Management and User Behavior
  • Atomic and Subatomic Physics Research
  • Privacy, Security, and Data Protection
  • Gender, Security, and Conflict
  • Indigenous Health, Education, and Rights
  • Electrical and Bioimpedance Tomography
  • Language, Discourse, Communication Strategies
  • Copper Interconnects and Reliability
  • Technology Use by Older Adults
  • Advanced Malware Detection Techniques
  • Religion, Spirituality, and Psychology

University of Technology Sydney
2023

King's College London
2022

University of Bristol
2018-2020

Cabot (United States)
2016-2019

University of Bath
2017-2018

University of Cambridge
1988-2017

National Hospital for Neurology and Neurosurgery
2013

Epilepsy Society
2012-2013

University College London
2013

Cardiff University
2013

Patients sustaining lesions of the orbital prefrontal cortex (PFC) exhibit marked impairments in performance laboratory-based gambling, or risk-taking, tasks, suggesting that this part human PFC contributes to decision-making cognition. However, date, little is known about particular regions participate function. In present study, eight healthy volunteers were scanned, using H 2 15 0 PET technology, while performing a novel computerized risk-taking task. The task involved predicting which...

10.1523/jneurosci.19-20-09029.1999 article EN cc-by-nc-sa Journal of Neuroscience 1999-10-15

Abstract It is widely held that the frontal cortex plays a critical part in certain aspects of spatial and non‐spatial working memory. One unresolved issue whether there are functionally distinct subdivisions lateral subserve different The present study used positron emission tomography (PET) to demonstrate memory processes within human mid‐dorsolateral mid‐ventrolateral regions organized according type processing required rather than nature (i.e. or non‐spatial), information being...

10.1046/j.1460-9568.1999.00449.x article EN European Journal of Neuroscience 1999-02-01

Phishing emails provide a means to infiltrate the technical systems of organisations by encouraging employees click on malicious links or attachments. Despite use awareness campaigns and phishing simulations, remain vulnerable emails. The present research uses mixed methods approach explore employee susceptibility targeted emails, known as spear phishing. In study one, nine simulation sent 62,000 over six-week period were rated according presence authority urgency influence techniques....

10.1016/j.ijhcs.2018.06.004 article EN cc-by International Journal of Human-Computer Studies 2018-07-20

Telling a lie takes longer than telling the truth but precisely why remains uncertain. We investigated two processes suggested to increase response times, namely decision and construction of response. In Experiments 1 2, participants were directed or chose whether tell truth. A colored square was presented had name either true color about it by claiming different color. both experiments we found that there greater difference between lying when compared they lie. 3 4, times only one possible...

10.1371/journal.pone.0060713 article EN cc-by PLoS ONE 2013-04-03

Despite converging agreement about the definition of persistent vegetative state, recent reports have raised concerns accuracy diagnosis in some patients, and extent to which, a selection cases, residual cognitive functions may remain undetected. Objective assessment function can be extremely difficult as motor responses minimal, inconsistent, document many or undetectable others because no output is possible. Here we describe strategies for using H(2)(15)O positron emission tomography...

10.1076/neur.8.4.394.16184 article EN Neurocase 2002-10-01

Fraudulent emails, otherwise known as phishing use a range of influence techniques to persuade individuals respond, such promising monetary reward or invoking sense urgency. The current study explored number factors that may impact the persuasiveness and trustworthiness emails by examining participant judgements 20 pre-designed varied according (a) whether they used loss reward-based techniques, (b) contained particular authentic design cues, (c) referenced salient event (the Rio Olympics),...

10.1080/0144929x.2018.1519599 article EN Behaviour and Information Technology 2018-09-07

A vegan diet, which excludes all animal-derived products, has been associated with some improvements in health, while also conferring environmental benefits. Understanding the psychological determinants of successfully switching to a diet will help inform design interventions supporting long-term dietary change. Studies date have tended focus on reasoned motives underlying decision initiate such shift. Yet, focusing reasons for may overlook importance broader range factors that or hinder...

10.1016/j.appet.2022.106357 article EN cc-by Appetite 2022-10-29

Working memory is a critical building block for almost all cognitive tasks, and impairment can cause significant disruption to daily life routines. We investigated the functional connectivity (FC) of visuo-spatial working network in temporal lobe epilepsy its relationship underlying white matter tracts emanating from hippocampus. Fifty-two patients with unilateral hippocampal sclerosis (HS) (30 left) 30 healthy controls underwent MRI (fMRI) Diffusion Tensor Imaging (DTI). Six seed regions...

10.1016/j.nicl.2013.01.009 article EN cc-by NeuroImage Clinical 2013-01-01

1.Time-lapse diffusion-weighted magnetic resonance imaging (DWI) was used to detect and characterize complex waves of cortical spreading depression (CSD) evoked with KCL placed upon the suprasylvian gyrus anaesthetized cats. 2. The time-lapse representations successfully demonstrated primary CSD that propagated elliptical wavefronts selectively over ipsilateral cerebral hemispheres a velocity 3.8 +/- 0.70 mm min(-1) (mean S.E.M. 5 experiments). 3. In contrast, succeeding secondary often...

10.1111/j.1469-7793.1999.0415m.x article EN The Journal of Physiology 1999-09-01

Abstract Phishing e-mails are fraudulent used to gain access sensitive information or secure computer systems. They persuade users click on malicious links, download attachments provide information, such as usernames passwords. One approach that aims reduce people’s susceptibility phishing is the provision of regarding threat and techniques within e-mails. In line with this, awareness campaigns often organizations wider society raise encourage people engage protective information. However,...

10.1093/cybsec/tyaa001 article EN cc-by Journal of Cybersecurity 2020-01-01

This study tests the strength of Bishop David Walker’s notion belonging to God through Anglican Church participation in events, by exploring demographic profile, motivations, and experiences 1234 participants attending two afternoon Carol Services on Christmas Eve 2019 at Liverpool Cathedral, alongside 564 who completed same survey evening Holly Bough Service Fourth Sunday Advent 2019. The data confirmed importance event-belonging for 76% do not regularly attend church services but return...

10.3390/rel12020090 article EN cc-by Religions 2021-01-29

There is now converging evidence that suggests working memory processes within the dorsolateral and ventrolateral frontal cortices are organized according to type of processing required, rather than nature (i.e., domain) information being processed, as has been widely assumed. For example, recent positron emission tomography (PET) studies have demonstrated either, or both, these two lateral areas can be activated in spatial tasks, depending on precise executive called upon by task performed....

10.3758/bf03331974 article EN Psychobiology 2000-06-01

Existing research has shown that developers will use StackOverflow to answer programming questions: but what draws them one particular over any other? The choice of they select can mean the difference between a secure application and insecure one, as quality supposedly answers vary. Prior work studied people posting on Stack Overflow—a two-way communication original poster Overflow community. Instead, we study situation one-way communication, where only read thread without being actively...

10.1109/tse.2020.2981317 article EN cc-by IEEE Transactions on Software Engineering 2020-04-20

Increasingly, connected communication technologies have resulted in people being exposed to fraudulent communications by scammers and hackers attempting gain access computer systems for malicious purposes. Common influence techniques, such as mimicking authority figures or instilling a sense of urgency, are used persuade respond malevolent messages by, example, accepting urgent updates. An 'accept' response message can result severe negative consequences the user others, including...

10.1016/j.dss.2017.02.014 article EN cc-by Decision Support Systems 2017-02-28

The Holly Bough service is a unique pre-Christmas event, combining musical excellence and theological depth, crafted by the founding dean of Liverpool Cathedral in early twentieth century for Fourth Sunday Advent. Located within developing science cathedral studies, this paper analyses demographic profile, motivational intention (drawing on religious orientation theory) perceived impact spiritual wellbeing Fisher’s four dimensional model) among 564 participants who completed detailed survey...

10.3390/rel11090478 article EN cc-by Religions 2020-09-21

The increasing demand for clinical fMRI data has resulted in a need to translate research methods use.Referrals language lateralization prior epilepsy surgery are becoming more common, but time constraints make this unachievable many busy neuroimaging departments.This study examines whether single covert verbal fluency paradigm with real-time monitoring and online processing (BrainWave) could replace conventional offline (SPM) the purpose of establishing expressive dominance surgery.We...

10.1016/j.yebeh.2012.05.019 article EN cc-by Epilepsy & Behavior 2012-07-27
Coming Soon ...