James Nicholson
YOU?
Author Swipe
View article: Human and digital ecosystems in the modern household
Human and digital ecosystems in the modern household Open
Despite a growing number of studies describing the digital ecosystems of the home, few have explored the human component of this ecosystem and fewer have accounted for household and relationship diversity. We asked the inhabitants of nine …
View article: Post-mortem information management: exploring contextual factors in appropriate personal data access after death
Post-mortem information management: exploring contextual factors in appropriate personal data access after death Open
With the increasing size and complexity of personal information and data landscapes, there is a need for guidance and support in the appropriate management of a deceased person's postmortem privacy and digital legacy. However, most people …
View article: Privacy-Aware Decision Making: The Effect of Privacy Nudges on Privacy Awareness and the Monetary Assessment of Personal Information
Privacy-Aware Decision Making: The Effect of Privacy Nudges on Privacy Awareness and the Monetary Assessment of Personal Information Open
Nowadays, smartphones are equipped with various sensors collecting a huge amount of sensitive personal information about their users. However, for smartphone users, it remains hidden, and sensitive information is accessed by used applicati…
View article: <i>Shama</i> , an insider looking in: a community-centred collaborative documentary production
<i>Shama</i> , an insider looking in: a community-centred collaborative documentary production Open
In this article, we analyse and reflect on the complex interweaving of documentary strategies and the five levels of performance that we designed in a small-scale community-centred collaborative documentary project entitled Shama. Shama Et…
View article: Life after lockdown: The experiences of older adults in a contactless digital world
Life after lockdown: The experiences of older adults in a contactless digital world Open
Introduction The digital response to the Coronavirus (COVID-19) pandemic and its effects on the lives of older adults has been well-documented, but less is known about how they experienced the post-lockdown re-emergence into a relatively c…
View article: Understanding Young People's Experiences of Cybersecurity
Understanding Young People's Experiences of Cybersecurity Open
Young people are increasingly becoming responsible for the security of their devices, yet do not appear to have the knowledge to protect themselves online. In this paper, we explore young people’s knowledge of cybersecurity through a serie…
View article: From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data
From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data Open
As digital technologies become more prevalent there is a growing awareness of\nthe importance of good security and privacy practices. The tools and techniques\nused to achieve this are typically designed with the living user in mind, with\…
View article: Exploring the Acceptability of Graphical Passwords for People with Dyslexia
Exploring the Acceptability of Graphical Passwords for People with Dyslexia Open
View article: Engaging Users with Educational Games: The Case of Phishing
Engaging Users with Educational Games: The Case of Phishing Open
Phishing continues to be a difficult problem for individuals and organisations. Educational games and simulations have been increasingly acknowledged as enormous and powerful teaching tools, yet little work has examined how to engage users…
View article: Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection Open
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to comply with information security policies and engage in effective cyber prevention. Here we introduce and evalua…
View article: Simple Nudges for Better Password Creation
Simple Nudges for Better Password Creation Open
Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for g…
View article: Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection Open
Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges – more specifically social saliency nudges that aim to highlight important information to the…
View article: Hydrographic processing considerations in the “Big Data” age: An overview of technology trends in ocean and coastal surveys
Hydrographic processing considerations in the “Big Data” age: An overview of technology trends in ocean and coastal surveys Open
The quantity of information generated by survey sensors for ocean and coastal zone mapping has reached the "Big Data" age. This is influenced by the number of survey sensors available to conduct a survey, high data resolution, commercial a…
View article: Using IMUs to Identify Supervisors on Touch Devices
Using IMUs to Identify Supervisors on Touch Devices Open