default search action
Lynne M. Coventry
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Kiersten Hay, Abigail C. Durrant, Shema Tariq, Lynne M. Coventry, Helen Anderson:
Zineography: A Community-Based Research-through-Design Method of Zine Making for Unequal Contexts. NordiCHI 2024: 54:1-54:17 - [i4]Mark Warner, Angelika Strohmayer, Matthew Higgs, Husnain Rafiq, Liying Yang, Lynne M. Coventry:
Key to Kindness: Reducing Toxicity In Online Discourse Through Proactive Content Moderation in a Mobile Keyboard. CoRR abs/2401.10627 (2024) - [i3]Mark Warner, Angelika Strohmayer, Matthew Higgs, Lynne M. Coventry:
A Critical Reflection on the Use of Toxicity Detection Algorithms in Proactive Content Moderation Systems. CoRR abs/2401.10629 (2024) - 2023
- [j16]David Buil-Gil, Steven Kemp, Stefanie Kuenzel, Lynne M. Coventry, Sameh Zakhary, Daniel Tilley, James Nicholson:
The digital harms of smart home devices: A systematic literature review. Comput. Hum. Behav. 145: 107770 (2023) - [j15]Adam N. Joinson, Matt Dixon, Lynne M. Coventry, Pam Briggs:
Development of a new 'human cyber-resilience scale'. J. Cybersecur. 9(1) (2023) - [c44]Lauren Scott, Lynne M. Coventry, Marta E. Cecchinato, Mark Warner:
"I figured her feeling a little bit bad was worth it to not spread that kind of hate": Exploring how UK families discuss and challenge misinformation. CHI 2023: 660:1-660:15 - [c43]Matt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry:
Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access. EuroUSEC 2023: 86-96 - [c42]Matt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry:
"It's the one thing that makes my life tick": Security Perspectives of the Smartphone Era. EuroUSEC 2023: 97-111 - [c41]Neeranjan Chitare, Lynne M. Coventry, James Nicholson:
"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations. EuroUSEC 2023: 344-355 - [c40]Benjamin Alan Morrison, James Nicholson, Lynne M. Coventry, Pam Briggs:
Recognising Diversity in Older Adults' Cybersecurity Needs. GoodIT 2023: 437-445 - [c39]Lauren Scott, Marta E. Cecchinato, Lynne M. Coventry, Mark Warner:
Evaluating the Effects of Culture and Relationship Strength on Misinformation Challenging Behaviours Within the UK. INTERACT (3) 2023: 429-438 - 2022
- [j14]Matt Dixon, James Nicholson, Dawn Branley-Bell, Pam Briggs, Lynne M. Coventry:
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop. Proc. ACM Hum. Comput. Interact. 6(MHCI): 1-22 (2022) - [c38]Cecilia Loureiro-Koechlin, José-Rodrigo Córdoba-Pachón, Lynne M. Coventry, Soteris Demetriou, Charles Weir:
Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems. EuroUSEC 2022: 79-84 - [c37]Dawn Branley-Bell, Lynne M. Coventry, Pam Briggs:
Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption. EuroUSEC 2022: 151-159 - [i2]David Buil-Gil, Steven Kemp, Stefanie Kuenzel, Lynne M. Coventry, Sameh Zakhary, Daniel Tilley, James Nicholson:
The digital harms of smart home devices: A systematic literature review. CoRR abs/2209.05458 (2022) - 2021
- [j13]Mladan Jovanovic, Antonella De Angeli, Andrew R. McNeill, Lynne M. Coventry:
User Requirements for Inclusive Technology for Older Adults. Int. J. Hum. Comput. Interact. 37(20): 1947-1965 (2021) - [c36]James Nicholson, Benjamin Alan Morrison, Matt Dixon, Jack Holt, Lynne M. Coventry, Jill McGlasson:
Training and Embedding Cybersecurity Guardians in Older Communities. CHI 2021: 86:1-86:15 - [c35]Dawn Branley-Bell, Lynne M. Coventry, Elizabeth Sillence:
Promoting Cybersecurity Culture Change in Healthcare. PETRA 2021: 544-549 - [i1]Mladjan Jovanovic, Antonella De Angeli, Andrew R. McNeill, Lynne M. Coventry:
User requirements for inclusive technology for older adults. CoRR abs/2105.05729 (2021) - 2020
- [j12]Antonella De Angeli, Mladjan Jovanovic, Andrew R. McNeill, Lynne M. Coventry:
Desires for active ageing technology. Int. J. Hum. Comput. Stud. 138: 102412 (2020) - [c34]James Nicholson, Yousra Javed, Matt Dixon, Lynne M. Coventry, Opeyemi Dele-Ajayi, Philip Anderson:
Investigating Teenagers' Ability to Detect Phishing Messages. EuroS&P Workshops 2020: 140-149 - [c33]Lynne M. Coventry, Dawn Branley-Bell, Elizabeth Sillence, Sabina Magalini, Pasquale Mari, Aimilia Magkanaraki, Kalliopi Anastasopoulou:
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour. HCI (30) 2020: 105-122 - [c32]Dawn Branley-Bell, Rebecca Whitworth, Lynne M. Coventry:
User Trust and Understanding of Explainable AI: Exploring Algorithm Visualisations and User Biases. HCI (3) 2020: 382-399
2010 – 2019
- 2019
- [c31]James Nicholson, Lynne M. Coventry, Pamela Briggs:
"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults. CHI 2019: 349 - [c30]Andrew R. McNeill, Miglena Campbell, Lynne M. Coventry:
The quantified older adult as design requirements for accessible wellbeing interventions. PETRA 2019: 59-68 - 2018
- [j11]John M. Blythe, Lynne M. Coventry:
Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Comput. Hum. Behav. 87: 87-97 (2018) - [c29]K. Tara Smith, Lynne M. Coventry, Robert GreenSmith:
An Initial Generic Assessment Framework for the Consideration of Risk in the Implementation of Autonomous Systems. HWID 2018: 186-199 - [c28]James Nicholson, Lynne M. Coventry, Pam Briggs:
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. SOUPS @ USENIX Security Symposium 2018: 443-457 - 2017
- [j10]Paul van Schaik, Debora Jeske, Joseph A. Onibokun, Lynne M. Coventry, Jurjen Jansen, Petko Kusev:
Risk perceptions of cyber-security and precautionary behaviour. Comput. Hum. Behav. 75: 547-559 (2017) - [j9]Debora Jeske, Andrew R. McNeill, Lynne M. Coventry, Pam Briggs:
Security information sharing via Twitter: 'Heartbleed' as a case study. Int. J. Web Based Communities 13(2): 172-192 (2017) - [c27]Andrew R. McNeill, Lynne M. Coventry, Jake Pywell, Pam Briggs:
Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. CHI 2017: 6425-6437 - [c26]Pam Briggs, Debora Jeske, Lynne M. Coventry:
The Design of Messages to Improve Cybersecurity Incident Reporting. HCI (22) 2017: 3-13 - [c25]Andrew R. McNeill, Pamela Briggs, Jake Pywell, Lynne M. Coventry:
Functional privacy concerns of older adults about pervasive health-monitoring systems. PETRA 2017: 96-102 - [c24]James Nicholson, Lynne M. Coventry, Pam Briggs:
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. SOUPS 2017: 285-298 - 2016
- [j8]Debora Jeske, Pam Briggs, Lynne M. Coventry:
Exploring the relationship between impulsivity and decision-making on mobile devices. Pers. Ubiquitous Comput. 20(4): 545-557 (2016) - [c23]Lynne M. Coventry, Pam Briggs:
Mobile Technology for Older Adults: Protector, Motivator or Threat? HCI (24) 2016: 424-434 - 2015
- [c22]James Turland, Lynne M. Coventry, Debora Jeske, Pam Briggs, Aad P. A. van Moorsel:
Nudging towards security: developing an application for wireless network selection for android phones. BCS HCI 2015: 193-201 - [c21]Ana Ferreira, Lynne M. Coventry, Gabriele Lenzini:
Principles of Persuasion in Social Engineering and Their Use in Phishing. HCI (22) 2015: 36-47 - [c20]Andrew R. McNeill, Lynne M. Coventry:
An Appraisal-Based Approach to the Stigma of Walker-Use. HCI (25) 2015: 250-261 - [c19]John M. Blythe, Lynne M. Coventry, Linda Little:
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors. SOUPS 2015: 103-122 - 2014
- [c18]Lynne M. Coventry, Pam Briggs, Debora Jeske, Aad P. A. van Moorsel:
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. HCI (8) 2014: 229-239 - [c17]Claire Sutherland, Lynne M. Coventry, Elizabeth Sillence:
Using animated scenarios to explore severity of cyberbullying and reporting readiness. OZCHI 2014: 448-451 - [c16]Debora Jeske, Lynne M. Coventry, Pamela Briggs:
Decision Justifications for Wireless Network Selection. STAST 2014: 1-7 - 2013
- [j7]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Faces and Pictures: Understanding age differences in two types of graphical authentications. Int. J. Hum. Comput. Stud. 71(10): 958-966 (2013) - [c15]Brendan Cassidy, Gilbert Cockton, Lynne M. Coventry:
A haptic ATM interface to assist visually impaired users. ASSETS 2013: 1:1-1:8 - [c14]James Nicholson, Lynne M. Coventry, Pamela Briggs:
Age-related performance issues for PIN and face-based authentication systems. CHI 2013: 323-332 - [c13]Aimée K. Bright, Lynne M. Coventry:
Assistive technology for older adults: psychological and socio-emotional design requirements. PETRA 2013: 9:1-9:4 - 2012
- [c12]David Greathead, Lynne M. Coventry, Budi Arief, Aad P. A. van Moorsel:
Deriving requirements for an online community interaction scheme: indications from older adults. CHI Extended Abstracts 2012: 1541-1546 - [c11]James Nicholson, Paul Dunphy, Lynne M. Coventry, Pamela Briggs, Patrick Olivier:
A security assessment of tiles: a new portfolio-based graphical authentication system. CHI Extended Abstracts 2012: 1967-1972 - [c10]John M. Blythe, Lynne M. Coventry:
Cyber Security Games: A New Line of Risk. ICEC 2012: 600-603 - [c9]Lynne M. Coventry, Emma Jones:
The role of tea parties to elicit technology requirements to support the mobility of older adults. PETRA 2012: 16 - 2011
- [c8]Linda Little, Pamela Briggs, Lynne M. Coventry:
Who knows about me?: an analysis of age-related disclosure preferences. BCS HCI 2011: 84-87 - [c7]Budi Arief, Aad P. A. van Moorsel, David Greathead, Lynne M. Coventry:
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies. CASoN 2011: 25-30 - [e1]Linda Little, Lynne M. Coventry:
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, BCS-HCI 2011, Newcastle-upon-Tyne, UK, July 4-8, 2011. ACM 2011 [contents] - 2010
- [c6]Alison J. Pickard, Pat Gannon-Leary, Lynne M. Coventry:
Trust in 'E': Users' Trust in Information Resources in the Web Environment. CENTERIS (2) 2010: 305-314 - [r1]Lynne M. Coventry:
Human Factors. Handbook of Financial Cryptography and Security 2010: 497-519
2000 – 2009
- 2009
- [c5]Lynne M. Coventry, Graham I. Johnson, Tom McEwan, Chris Riley:
Biometrics in Practice: What Does HCI Have to Say? INTERACT (2) 2009: 920-921 - 2005
- [j6]Antonella De Angeli, Lynne M. Coventry, Graham Johnson, Karen Renaud:
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1-2): 128-152 (2005) - [j5]Linda Little, Pamela Briggs, Lynne M. Coventry:
Public space systems: Designing for privacy? Int. J. Hum. Comput. Stud. 63(1-2): 254-268 (2005) - 2004
- [j4]Antonella De Angeli, Uday Athavankar, Anirudha Joshi, Lynne M. Coventry, Graham Johnson:
Introducing ATMs in India: a contextual inquiry. Interact. Comput. 16(1): 29-44 (2004) - 2003
- [c4]Lynne M. Coventry, Antonella De Angeli, Graham Johnson:
Usability and biometric verification at the ATM interface. CHI 2003: 153-160 - 2002
- [c3]Antonella De Angeli, Mike Coutts, Lynne M. Coventry, Graham I. Johnson, David Cameron, Martin H. Fischer:
VIP: a visual approach to user authentication. AVI 2002: 316-323 - 2001
- [j3]Graham Johnson, Lynne M. Coventry:
"You Talking to Me?" Exploring Voice in Self-Service User Interfaces. Int. J. Hum. Comput. Interact. 13(2): 161-186 (2001)
1990 – 1999
- 1998
- [j2]David Grayson, Lynne M. Coventry:
The effects of visual proxemic information in video mediated communication. ACM SIGCHI Bull. 30(3): 30-39 (1998) - 1993
- [c2]Lynne M. Coventry, T. B. Kane:
The automation of helpdesks. IUI 1993: 219-222 - 1990
- [c1]Lynne M. Coventry:
Cognitive style and intelligent help. INTERACT 1990: 1007-1008
1980 – 1989
- 1989
- [j1]Lynne M. Coventry:
Some Effects of Cognitive Style on Learning UNIX. Int. J. Man Mach. Stud. 31(3): 349-365 (1989)
Coauthor Index
aka: Pam Briggs
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint