A Multiple-Motive Heuristic-Systematic Model for Examining How Users Process Android Data and Service Access Notifications TL James, JL Ziegelmayer, A Schuler Scott, G Fox ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52 (1 …, 2021 | 5 | 2021 |
Wider research applications of dynamic consent A Schuler Scott, M Goldsmith, H Teare Privacy and Identity Management. Fairness, Accountability, and Transparency …, 2019 | 5 | 2019 |
Why we trust dynamic consent to deliver on privacy A Schuler Scott, M Goldsmith, H Teare, H Webb, S Creese Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019 | 5 | 2019 |
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda L Axon, K Fletcher, AS Scott, M Stolz, R Hannigan, AE Kaafarani, ... Digital Threats: Research and Practice 3 (4), 1-27, 2022 | 4 | 2022 |
Ethical Risk Assessment for Social Robots: Case Studies in Smart Robot Toys AFT Winfield, A van Maris, K Winkle, M Jirotka, P Salvini, H Webb, ... Towards Trustworthy Artificial Intelligent Systems, 61-76, 2022 | 4 | 2022 |
Dynamic consent: a mechanism for engagement A Schuler Scott University of Oxford, 2022 | 1 | 2022 |
Tutorial: Crypto-Ransomware: Analysis, Defense, and Criminal Negotiation W Song, AS Scott 2023 IEEE Secure Development Conference (SecDev), 3-4, 2023 | | 2023 |
Enemy of my enemy is my friend: War volunteer tourism JJ Simpson, A Schuler Scott Annals of Tourism Research 101 (C), 2023 | | 2023 |
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda IIoT Capability Gaps L Axon, K Fletcher, A Schuler Scott, M Stolz, R Hannigan, AE Kaafarani, ... ACM, 2022 | | 2022 |
The Best Offense is Taking Out Cyber Proxies AS Scott, M Kaminska Cranfield Online Research Data (CORD), 2017 | | 2017 |
Dynamic Consent in Cybersecurity for Health AS Scott, M Goldsmith, H Teare, S Creese, J Kaye | | |