James Nicholson
James Nicholson
Verified email at northumbria.ac.uk - Homepage
TitleCited byYear
Multi-touch authentication on tabletops
D Kim, P Dunphy, P Briggs, J Hook, JW Nicholson, J Nicholson, P Olivier
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1502010
Securing passfaces for description
P Dunphy, J Nicholson, P Olivier
Proceedings of the 4th symposium on Usable privacy and security, 24-35, 2008
722008
Occupancy monitoring using environmental & context sensors and a hierarchical analysis framework
A Khan, J Nicholson, S Mellor, D Jackson, K Ladha, C Ladha, J Hand, ...
502014
Age-related performance issues for PIN and face-based authentication systems
J Nicholson, L Coventry, P Briggs
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
322013
Invisible design: exploring insights and ideas through ambiguous film scenarios
P Briggs, M Blythe, J Vines, S Lindsay, P Dunphy, J Nicholson, D Green, ...
Proceedings of the Designing Interactive Systems Conference, 534-543, 2012
302012
Panopticon: A parallel video overview system
D Jackson, J Nicholson, G Stoeckigt, R Wrobel, A Thieme, P Olivier
Proceedings of the 26th annual ACM symposium on User interface software and …, 2013
262013
Location tracking: views from the older adult population
L Thomas, L Little, P Briggs, L McInnes, E Jones, J Nicholson
Age and ageing 42 (6), 758-763, 2013
262013
Faces and Pictures: Understanding age differences in two types of graphical authentications
J Nicholson, L Coventry, P Briggs
International Journal of Human-Computer Studies 71 (10), 958-966, 2013
132013
A security assessment of tiles: a new portfolio-based graphical authentication system
J Nicholson, P Dunphy, L Coventry, P Briggs, P Olivier
Proceedings of the 2012 ACM annual conference extended abstracts on Human …, 2012
122012
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection
J Nicholson, L Coventry, P Briggs
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 285-298, 2017
92017
Activity recognition for quality assessment of batting shots in cricket using a hierarchical representation
A Khan, J Nicholson, T Plötz
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2017
72017
Panopticon as an elearning support search tool
J Nicholson, M Huber, D Jackson, P Olivier
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
72014
Using IMUs to identify supervisors on touch devices
A Kharrufa, J Nicholson, P Dunphy, S Hodges, P Briggs, P Olivier
IFIP Conference on Human-Computer Interaction, 565-583, 2015
62015
Social media as a resource for understanding security experiences: A qualitative analysis of# password tweets
P Dunphy, V Vlachokyriakos, A Thieme, J Nicholson, J McCarthy, ...
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 141-150, 2015
62015
Everyday surveillance
P Briggs, E Churchill, M Levine, J Nicholson, GW Pritchard, P Olivier
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016
32016
Lynne Coventry, and Pam Briggs. 2018. Introducing the cybersurvival task: assessing and addressing staff beliefs about effective cyber protection
J Nicholson
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 443-457, 2018
22018
If It's Important It Will Be A Headline: Cybersecurity Information Seeking in Older Adults
J Nicholson, L Coventry, P Briggs
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
12019
Crowdsourcing and CCTV: the Effect of Interface, Financial Bonus and Video Type
P Dunphy, J Nicholson, V Vlachokyriakos, P Briggs, P Olivier
12015
Engaging Users with Educational Games: The Case of Phishing
M Dixon, NA Gamagedara Arachchilage, J Nicholson
Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing …, 2019
2019
Simple nudges for better password creation
J Nicholson, V Vlachokyriakos, L Coventry, P Briggs, P Olivier
2018
The system can't perform the operation now. Try again later.
Articles 1–20