Robert Biddle
YOU?
Author Swipe
View article: Grok Hackspeak? Communicating Cybersecurity With Figurative Language
Grok Hackspeak? Communicating Cybersecurity With Figurative Language Open
This paper investigates how non-experts understand figurative language created by computer scientists to describe cybersecurity incidents. Its method is informed by applied linguistics, crisis communication, and cybersecurity research. Usi…
View article: Exploring Content Concealment in Email
Exploring Content Concealment in Email Open
The never-ending barrage of malicious emails, such as spam and phishing, is of constant concern for users, who rely on countermeasures such as email filters to keep the intended recipient safe. Modern email filters, one of our few defence …
View article: Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection
Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection Open
Phishing emails typically masquerade themselves as reputable identities to\ntrick people into providing sensitive information and credentials. Despite\nadvancements in cybersecurity, attackers continuously adapt, posing ongoing\nthreats to…
View article: Reducing Workload in Using AI-based API REST Test Generation
Reducing Workload in Using AI-based API REST Test Generation Open
Modern software applications, notably those utilizing microservices architectures, rely heavily on REST API technology for communication. Testing these APIs is challenging, time-consuming, and prone to errors. This paper introduces Pulse-U…
View article: programmingLanguage as Language;
programmingLanguage as Language; Open
Programming languages are languages --- "unnatural" languages because they are constructed explicitly; "formal" languages because they rely on mathematical notations and are described mathematically; "machine" languages because they are us…
View article: What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility
What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility Open
Phishing is one of the most prevalent social engineering attacks that targets both organizations and individuals. It is crucial to understand how email presentation impacts users' reactions to phishing attacks. We speculated that the devic…
View article: "This is different from the Western world": Understanding Password Sharing Among Young Bangladeshis
"This is different from the Western world": Understanding Password Sharing Among Young Bangladeshis Open
This paper explores how cultural factors impact the password-sharing attitudes and practices of young Bangladeshi adults.We conducted semi-structured interviews with 24 Bangladeshi participants aged between 18 and 39 about how, why, and wi…
View article: Waste Self-reporting for Software Development Productivity Improvement
Waste Self-reporting for Software Development Productivity Improvement Open
Little research has been done on enabling software development teams to self-report waste to assist in productivity improvement. This study created a waste categorization and survey for teams to identify and quantify wasteful activities. D…
View article: SoK: Human-centered Phishing Susceptibility
SoK: Human-centered Phishing Susceptibility Open
Phishing is recognized as a serious threat to organizations and individuals. While there have been significant technical advances in blocking phishing attacks, end-users remain the last line of defence after phishing emails reach their ema…
View article: SoK: Human-Centered Phishing Susceptibility
SoK: Human-Centered Phishing Susceptibility Open
Phishing is recognised as a serious threat to organisations and individuals. While there have been significant technical advances in blocking phishing attacks, people remain the last line of defence after phishing emails reach their email …
View article: We're Here to Help: Company Image Repair and User Perception of Data Breaches
We're Here to Help: Company Image Repair and User Perception of Data Breaches Open
Data breaches involve information being accessed by unauthorized parties. Our research concerns user perception of data breaches, especially issues relating to accountability. A preliminary study indicated many people had weak understandin…
View article: COLLABORATIVE LEARNING OF USABILITY EXPERIENCES: IMPROVING UX TRAINING THROUGH EXPERIENTIAL LEARNING
COLLABORATIVE LEARNING OF USABILITY EXPERIENCES: IMPROVING UX TRAINING THROUGH EXPERIENTIAL LEARNING Open
The Collaborative Learning of Usability Experiences (CLUE) training program1 is an NSERC CREATE grant that trains Canada's leaders in HCI. We aim to improve our trainees' capabilities across the disciplinary boundaries (Information Technol…
View article: The influence of expectations on usability and visual appeal in a web environment
The influence of expectations on usability and visual appeal in a web environment Open
The impact of verbal and textual influences that create expectations on the perceived and objective usability and visual appeal of a website was examined. A computer laboratory study, in the form of a user-based usability test, was done to…
View article: User Study of Emotional Visualization Dashboard for Educational Software
User Study of Emotional Visualization Dashboard for Educational Software Open
This paper describes a user study on the MADE Dashboard, our proposed data visualization dashboard that supports educators to inspect and reflect on the emotional states of students using web learning applications. Our goal was to support …
View article: Secure Comics: An Interactive Comic Series for Improving Cyber Security and Privacy
Secure Comics: An Interactive Comic Series for Improving Cyber Security and Privacy Open
© Zhang-Kennedy et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2017 – Digital Make-Believe. Sunderland, UK.
View article: Hacking with multi-touch for Java (MT4j)
Hacking with multi-touch for Java (MT4j) Open
Developing applications for touch devices is hard. Developing touch based applications for multi-user input is harder. The Multi-Touch for Java (MT4j) toolkit supports developing touch based applications for multiple users. In this paper, …
View article: MADE Ratio: Affective Multimodal Software for Mathematical Concepts
MADE Ratio: Affective Multimodal Software for Mathematical Concepts Open
This paper addresses the use of multiple sensory modalities and affective strategies in learning mathematics. A case study is presented where these domains are used to design a mathematical ratio system. We adopted a multimodal approach us…