Pamela Briggs

Orcid: 0000-0001-5028-4601

According to our database1, Pamela Briggs authored at least 102 papers between 1987 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Digital accumulation behaviours and information management in the workplace: exploring the tensions between digital data hoarding, organisational culture and policy.
Behav. Inf. Technol., April, 2024

Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024

Design Implications for a Social and Collaborative Understanding of online Information Assessment Practices, Challenges and Heuristics.
Proceedings of 22nd European Conference on Computer-Supported Cooperative Work, 2024

Exploring Behavioural Strategies in Cyberinsurance Adoption.
Proceedings of the European Conference on Cognitive Ergonomics 2024, 2024

Adaptive Incentive Engineering in Citizen-Centric AI.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
Designing for the Embedding of Employee Voice.
Proc. ACM Hum. Comput. Interact., April, 2023

Development of a new 'human cyber-resilience scale'.
J. Cybersecur., January, 2023

Recognising Diversity in Older Adults' Cybersecurity Needs.
Proceedings of the 2023 ACM Conference on Information Technology for Social Good, 2023

2022
Correction to: Exploring digital support for the student transition to university through questionable concepts.
Pers. Ubiquitous Comput., 2022

Exploring digital support for the student transition to university through questionable concepts.
Pers. Ubiquitous Comput., 2022

Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop.
Proc. ACM Hum. Comput. Interact., 2022

The management of LGBTQ+ identities on social media: A student perspective.
New Media Soc., 2022

Heroes and Hooligans: The Heterogeneity of Video Game Modders.
Games Cult., 2022

Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Exploring the Role of Paradata in Digitally Supported Qualitative Co-Research.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
The Digital Lives of Student Mothers: A Consideration of Technologies That Support or Erode the Student/Parent Boundary.
Int. J. Hum. Comput. Stud., 2021

2020
Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Designing for Employee Voice.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

TalkFutures: Supporting Qualitative Practices in Distributed Community Engagements.
Proceedings of the DIS '20: Designing Interactive Systems Conference 2020, 2020

2019
Using protection motivation theory in the design of nudges to improve online security behavior.
Int. J. Hum. Comput. Stud., 2019

Digital hoarding behaviours: Measurement and evaluation.
Comput. Hum. Behav., 2019

Gabber: Supporting Voice in Participatory Qualitative Practices.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Designing Second-Screening Experiences for Social Co-Selection and Critical Co-Viewing of Reality TV.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Digital Design Considerations for Volunteer Recruitment: Making the Implicit Promises of Volunteering More Explicit.
Proceedings of the 9th International Conference on Communities & Technologies, 2019

Vocalising Violence: Using Violent Mens' Voices for Service Delivery and Feedback.
Proceedings of the 9th International Conference on Communities & Technologies, 2019

2018
A life story in three parts: the use of triptychs to make sense of personal digital data.
Pers. Ubiquitous Comput., 2018

Exploring digital remediation in support of personal reflection.
Int. J. Hum. Comput. Stud., 2018

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Making Problems in Design Research: The Case of Teen Shoplifters on Tumblr.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Security information sharing via Twitter: 'Heartbleed' as a case study.
Int. J. Web Based Communities, 2017

Understanding social media and identity work in young people transitioning to university.
Comput. Hum. Behav., 2017

Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Functional privacy concerns of older adults about pervasive health-monitoring systems.
Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments, 2017

How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime?
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

The Design of Messages to Improve Cybersecurity Incident Reporting.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

HCI and Health: Learning from Interdisciplinary Interactions.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Has Instagram Fundamentally Altered the 'Family Snapshot'?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Privacy Considerations when Designing Social Network Systems to Support Successful Ageing.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Assessing the value of brief automated biographies.
Pers. Ubiquitous Comput., 2016

Exploring the relationship between impulsivity and decision-making on mobile devices.
Pers. Ubiquitous Comput., 2016

How do carers of people with multiple sclerosis engage with websites containing the personal experiences of other carers and patients?
Health Informatics J., 2016

Mobile Technology for Older Adults: Protector, Motivator or Threat?
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2016

"PS. I Love You": Understanding the Impact of Posthumous Digital Messages.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Everyday Surveillance.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

My Life On Film.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Self-Compassion, Psychological Resilience and Social Media Use in Thai Students.
Proceedings of the HCI 2016, 2016

2015
An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies.
ACM Trans. Comput. Hum. Interact., 2015

Automatic Identification of Personal Life Events in Twitter.
Proceedings of the ACM Web Science Conference, 2015

Identifying Prominent Life Events on Twitter.
Proceedings of the 8th International Conference on Knowledge Capture, 2015

Using IMUs to Identify Supervisors on Touch Devices.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

Assessing Patient Experience and Patient Preference when Designing Web Support for Smoking Cessation.
Proceedings of the 5th International Conference on Digital Health 2015, 2015

How to Drive a London Bus: Measuring Performance in a Mobile and Remote Workplace.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Nudging towards security: developing an application for wireless network selection for android phones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Modeling patient engagement in peer-to-peer healthcare.
Proceedings of the 23rd International World Wide Web Conference, 2014

Understanding Twitter influence in the health domain: a social-psychological contribution.
Proceedings of the 23rd International World Wide Web Conference, 2014

Decision Justifications for Wireless Network Selection.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

An older adult perspective on digital legacy.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment.
Proceedings of the Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience, 2014

Digitally driven: how location based services impact the work practices of London bus drivers.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Faces and Pictures: Understanding age differences in two types of graphical authentications.
Int. J. Hum. Comput. Stud., 2013

Location tracking via social networking sites.
Proceedings of the Web Science 2013 (co-located with ECRC), 2013

Why don't we trust health websites that help us help each other?: an analysis of online peer-to-peer healthcare.
Proceedings of the Web Science 2013 (co-located with ECRC), 2013

Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Age-related performance issues for PIN and face-based authentication systems.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
A security assessment of tiles: a new portfolio-based graphical authentication system.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Invisible design: exploring insights and ideas through ambiguous film scenarios.
Proceedings of the Designing Interactive Systems Conference 2012, 2012

2011
Defining and Investigating Device Comfort.
J. Inf. Process., 2011

Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

The Evolution of Trust.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Does your boss know where you are?: predicting adoption of LBS in the workplace.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

Who knows about me?: an analysis of age-related disclosure preferences.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

2010
The impact of using location-based services with a behaviour-disordered child: a case study.
Proceedings of the 6th Nordic Conference on Human-Computer Interaction 2010, 2010

Multi-touch authentication on tabletops.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Examining Trust, Forgiveness and Regret as Computational Concepts.
Proceedings of the Computing with Social Trust, 2009

Private whispers/public eyes: Is receiving highly personal information in a public place stressful?
Interact. Comput., 2009

Privacy Factors for Successful Ubiquitous Computing.
Int. J. E Bus. Res., 2009

Ubiquitous systems and the family: thoughts about the networked home.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Pervasive healthcare: the elderly perspective.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Pervasive computing and disability: designing for independence?
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Film as invisible design: the example of the biometric daemon.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Biometric Daemons: Authentication via Electronic Pets.
Proceedings of the Usability, Psychology, and Security, 2008

Secrets and lies in computer-mediated interaction: theory, methods and design.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

e-health.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

Ubiquitous healthcare: do we want it?
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

Seeding without leading: making space for participant contribution in design elicitation techniques.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

2007
Going online for health advice: Changes in usage and trust practices over the last five years.
Interact. Comput., 2007

Health Websites that people can trust - the case of hypertension.
Interact. Comput., 2007

Please advise: using the Internet for health and financial advice.
Comput. Hum. Behav., 2007

2006
A framework for understanding trust factors in web-based health advice.
Int. J. Hum. Comput. Stud., 2006

Changes in online health usage over the last 5 years.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Public space systems: Designing for privacy?
Int. J. Hum. Comput. Stud., 2005

Guidelines for developing trust in health websites.
Proceedings of the 14th international conference on World Wide Web, 2005

2004
Image Retrieval Interfaces: A User Perspective.
Proceedings of the Image and Video Retrieval: Third International Conference, 2004

Trust and mistrust of online health sites.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004

Considering trust in ambient societies.
Proceedings of the Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, 2004

Personalisation and Trust: A Reciprocal Relationship?
Proceedings of the Designing Personalized User Experiences in eCommerce, 2004

2000
Human perception of trademark images: Implications for retrieval system design.
J. Electronic Imaging, 2000

1998
Modelling self-confidence in users of a computer-based system showing unrepresentative design.
Int. J. Hum. Comput. Stud., 1998

1994
Consistency versus compatibility: a question of levels?
Int. J. Hum. Comput. Stud., 1994

1990
Do They Know What They're Doing? An Evaluation of Word-Processor Users' Implicit and Explicit Task-Relevant Knowledge, and Its Role in Self-Directed Learning.
Int. J. Man Mach. Stud., 1990

1987
The role of the user model in learning as an internally and externally directed activity.
Proceedings of the Mental Models and Human-Computer Interaction 1 [selected papers of the 6th Interdisciplinary Workshop in Informatics and Psychology, 1987


  Loading...