Tristan Caulfield

Orcid: 0000-0002-7039-6472

According to our database1, Tristan Caulfield authored at least 30 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university.
J. Cybersecur., January, 2024

GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved?
J. Cybersecur., January, 2024

Co-designing heterogeneous models: a distributed systems approach.
CoRR, 2024

GDPR: Is it worth it? Perceptions of workers who have experienced its implementation.
CoRR, 2024

How might the GDPR evolve? A question of politics, pace and punishment.
Comput. Law Secur. Rev., 2024

2023
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Proceedings of the 32nd USENIX Security Symposium, 2023

Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

From MDP to POMDP and Back: Safety and Compositionality.
Proceedings of the European Control Conference, 2023

2022
"It may be a pain in the backside but..." Insights into the resilience of business after GDPR.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

2021
Misrepresenting Scientific Consensus on COVID-19: The Amplification of Dissenting Scientists on Twitter.
CoRR, 2021

"It may be a pain in the backside but..." Insights into the impact of GDPR on business after three years.
CoRR, 2021

Found in Translation: Co-design for Security Modelling.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

Meta-modelling for Ecosystems Security.
Proceedings of the Simulation Tools and Techniques - 13th EAI International Conference, 2021

Engineering Ecosystem Models: Semantics and Pragmatics.
Proceedings of the Simulation Tools and Techniques - 13th EAI International Conference, 2021

Modelling Organizational Recovery.
Proceedings of the Simulation Tools and Techniques - 13th EAI International Conference, 2021

2020
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

2019
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls.
Proceedings of the 11th ACM Conference on Web Science, 2019

Why Jenny can't figure out which of these messages is a covert information operation.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

2 Fast 2 Secure: A Case Study of Post-Breach Security Changes.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
On the Origins of Memes by Means of Fringe Web Communities.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources.
Proceedings of the 2017 Internet Measurement Conference, 2017

The U.S. Vulnerabilities Equities Process: An Economic Perspective.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Case study: predicting the impact of a physical access control intervention.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

On the Adoption of Privacy-enhancing Technologies.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Improving Security Policy Decisions with Models.
IEEE Secur. Priv., 2015

Optimizing time allocation for network defence.
J. Cybersecur., 2015

Modelling and simulating systems security policy.
Proceedings of the 8th International Conference on Simulation Tools and Techniques, 2015

2014
Compositional Security Modelling - Structure, Economics, and Behaviour.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014


  Loading...