Follow
Matt Dixon
Title
Cited by
Cited by
Year
Investigating teenagers’ ability to detect phishing messages
J Nicholson, Y Javed, M Dixon, L Coventry, OD Ajayi, P Anderson
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
332020
Training and Embedding Cybersecurity Guardians in Older Communities.
J Nicholson, B Morrison, M Dixon, J Holt, L Coventry, J McGlasson
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
282021
Phishing simulation exercise in a large hospital: A case study
F Rizzoni, S Magalini, A Casaroli, P Mari, M Dixon, L Coventry
Digital Health 8, 20552076221081716, 2022
262022
Engaging users with educational games: The case of phishing
M Dixon, NA Gamagedara Arachchilage, J Nicholson
Extended abstracts of the 2019 CHI conference on human factors in computing …, 2019
222019
Exploring age and gender differences in ICT cybersecurity behaviour
D Branley-Bell, L Coventry, M Dixon, A Joinson, P Briggs
Human Behavior and Emerging Technologies 2022, 2022
162022
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop
M Dixon, J Nicholson, D Branley-Bell, P Briggs, L Coventry
Proceedings of the ACM on Human-Computer Interaction 6, 2022
32022
Better the devil you know: using lost-smartphone scenarios to explore user perceptions of unauthorised access
M Dixon, E Sillence, J Nicholson, L Coventry
Proceedings of the 2023 European Symposium on Usable Security, 86-96, 2023
2023
“It's the one thing that makes my life tick”: Security Perspectives of the Smartphone Era
M Dixon, E Sillence, J Nicholson, L Coventry
Proceedings of the 2023 European Symposium on Usable Security, 97-111, 2023
2023
Development of a new ‘human cyber-resilience scale’
AN Joinson, M Dixon, L Coventry, P Briggs
Journal of Cybersecurity 9 (1), tyad007, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–9