Oliver Buckley

Orcid: 0000-0003-1502-5721

According to our database1, Oliver Buckley authored at least 24 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Supply Chain 5.0: Redesigning Supply Chains as Resilient, Sustainable, and Human-Centric Systems in a Post-pandemic World.
Oper. Res. Forum, September, 2023

Understanding User Preferences for Gaining Trust, When Utilising Conversational Agents for Mental Health Data Disclosures.
Proceedings of the HCI International 2023 Posters, 2023

Investigating Longitudinal Effects of Physical Inoculation Interventions Against Disinformation.
Proceedings of the HCI International 2023 Posters, 2023

2022
CLICKA: Collecting and leveraging identity cues with keystroke dynamics.
Comput. Secur., 2022

2021
Understanding Trust in Social Media: Twitter.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Investigating What You Share: Privacy Perceptions of Behavioural Biometrics.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Sharing Secrets with Agents: Improving Sensitive Disclosures Using Chatbots.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Identifying Soft Biometric Features from a Combination of Keystroke and Mouse Dynamics.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021

2020
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
Reconstructing What You Said: Text Inference Using Smartphone Motion.
IEEE Trans. Mob. Comput., 2019

The language of biometrics: Analysing public perceptions.
J. Inf. Secur. Appl., 2019

2018
Deconstructing who you play: Character choice in online gaming.
Entertain. Comput., 2018

2017
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
IEEE Syst. J., 2017

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem.
Hum. centric Comput. Inf. Sci., 2017

Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Keystroke Inference Using Smartphone Kinematics.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
User Identification Using Games.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2014
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis.
J. Internet Serv. Inf. Secur., 2014

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Understanding Insider Threat: A Framework for Characterising Attacks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2008
Efficient Soft Tissue Deformation Using Charged Particles.
Proceedings of the Medicine Meets Virtual Reality 16, 2008

Efficient Soft Tissue Modelling Using Charged Particle Control Points.
Proceedings of the 29th Annual Conference of the European Association for Computer Graphics, 2008

2007
Efficient Modelling of Soft Tissue using Particle Systems.
Proceedings of the Medicine Meets Virtual Reality 15, 2007


  Loading...