Debi Ashenden

Orcid: 0000-0003-4105-1755

According to our database1, Debi Ashenden authored at least 15 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data.
Proceedings of the Human Aspects of Information Security and Assurance, 2024

2023
POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
Design Thinking for Cyber Deception.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

2018
In their own words: employee attitudes towards information security.
Inf. Comput. Secur., 2018

2017
What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Security Dialogues: Building Better Relationships between Security and Business.
IEEE Secur. Priv., 2016

2013
CISOs and organisational culture: Their own worst enemy?
Comput. Secur., 2013

Can we sell security like soap?: a new approach to behaviour change.
Proceedings of the New Security Paradigms Workshop, 2013

2011
A Systematic Evaluation of the Communicability of Online Privacy Mechanisms with Respect to Communication Privacy Management.
Proceedings of the Design, User Experience, and Usability. Theory, Methods, Tools and Practice, 2011

2010
Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?
Proceedings of the Privacy and Identity Management for Life, 2010

2008
Information Security management: A human challenge?
Inf. Secur. Tech. Rep., 2008

2005
Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Risk Management for Computer Security - Protecting Your Network and Information Assets.
Elsevier, ISBN: 978-0-7506-7795-0, 2005


  Loading...