Dan Conway

Orcid: 0009-0007-9963-9611

According to our database1, Dan Conway authored at least 35 papers between 1980 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2018
Do I Trust a Machine? Differences in User Trust Based on System Performance.
Proceedings of the Human and Machine Learning, 2018

For Good Measure: Between a Block and a Hard Place.
login Usenix Mag., 2018

A tutorial of integrating duality and branch and bound in earliness-tardiness scheduling with idle insertion time problems.
Int. J. Prod. Res., 2018

2017
A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

User Trust Dynamics: An Investigation Driven by Differences in System Performance.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017

How to Recommend?: User Trust Factors in Movie Recommender Systems.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017

2016
Robust Multimodal Cognitive Load Measurement
Human-Computer Interaction Series, Springer, ISBN: 978-3-319-31700-7, 2016

Trust and Reliance Based on System Accuracy.
Proceedings of the 2016 Conference on User Modeling Adaptation and Personalization, 2016

Misplaced Trust: A Bias in Human-Machine Trust Attribution - In Contradiction to Learning Theory.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
For Good Measure: Much Ado about Metadata.
login Usenix Mag., 2015

2013
For Good Measure: The Price of Anything Is the Foregone Alternative.
login Usenix Mag., 2013

The Times, They Are a Changin'.
IEEE Secur. Priv., 2013

The Effect of Stress on Cognitive Load Measurement.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

2010
Nothing Ventured, Nothing Gained.
IEEE Secur. Priv., 2010

A Life Is Short, a Half-Life Is Forever.
IEEE Secur. Priv., 2010

2009
Patch Grief with Proverbs.
IEEE Secur. Priv., 2009

Risk Concentration.
IEEE Secur. Priv., 2009

A Doubt of the Benefit.
IEEE Secur. Priv., 2009

Hard Data Is Good to Find.
IEEE Secur. Priv., 2009

The 0wned Price Index.
IEEE Secur. Priv., 2009

Security as a Systems Property.
IEEE Secur. Priv., 2009

2008
Security Is a Subset of Reliability.
IEEE Secur. Priv., 2008

Type II Reverse Engineering [For Good Measure].
IEEE Secur. Priv., 2008

Strong Attractors.
IEEE Secur. Priv., 2008

Beware the IDs of March.
IEEE Secur. Priv., 2008

What We Got for Christmas.
IEEE Secur. Priv., 2008

Caveat mercator in electronic commerce: An update.
Decis. Support Syst., 2008

2006
An application of interdependent lot size and consolidation point choice.
Math. Comput. Model., 2006

2000
Supplier Affiliated Extended Supply Chain Backbones.
Inf. Syst. Frontiers, 2000

Interface agents: caveat mercator in electronic commerce.
Decis. Support Syst., 2000

Electronic Commerce: Privacy, Security, and Control.
Proceedings of the Handbook on Electronic Commerce, 2000

1998
A genetic algorithm for discriminant analysis.
Ann. Oper. Res., 1998

1994
Genetic search and the dynamic facility layout problem.
Comput. Oper. Res., 1994

1980
The primacy of the user - from user's perspective.
Proceedings of the seventeenth annual computer personnel research conference, 1980


  Loading...