Skip to content

Dr Emma J WilliamsBSc (Hons), PhD(Cardiff)

Lecturer in Marketing

1 - 10 out of 23Page size: 10
  1. 2020
  2. Published

    Developing a Measure of Information Seeking about Phishing

    Williams, E. J. & Joinson, A., 22 Feb 2020, In : Journal of Cybersecurity. 6, 1, 16 p., tyaa001.

    Research output: Contribution to journalArticle

  3. 2019
  4. Published

    Managing the Risk of Aggressive Dog Behavior: Investigating the Influence of Owner Threat and Efficacy Perceptions

    Williams, E. J. & Blackwell, E., 6 Nov 2019, In : Risk Analysis. 39, 11, p. 2528-2542 15 p.

    Research output: Contribution to journalArticle

  5. Accepted/In press

    "Some might freak out" – What if your dog’s activity tracker were to have a data breach?

    van der Linden, D., Williams, E., Hadar, I. & Zamansky, A., 6 Sep 2019, (Accepted/In press) Proceedings of the Sixth International Conference on Animal-Computer Interaction. Association for Computing Machinery (ACM)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published
  7. Published

    How persuasive is phishing email? The role of authentic design, influence and current events in email judgements

    Williams, E. J. & Polage, D., Feb 2019, In : Behaviour and Information Technology. 38, 2, p. 184-197 14 p.

    Research output: Contribution to journalArticle

  8. 2018
  9. Published

    Exploring susceptibility to phishing in the workplace

    Williams, E. J., Hinds, J. & Joinson, A., Dec 2018, In : International Journal of Human-Computer Studies. 120, p. 1-13 13 p.

    Research output: Contribution to journalArticle

  10. Published

    Safe cryptography for all: towards visual metaphor driven cryptography building blocks

    van der Linden, D., Rashid, A., Williams, E. J. & Warinschi, B., 1 Oct 2018, 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD 2018): Proceedings of a meeting held 27 May - 3 June 2018, Gothenburg, Sweden.. Association for Computing Machinery (ACM), p. 41-44 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Unpublished

    PHISHTRAY: A modifiable, open-source email sorting task for research and training applications

    Joinson, A., Williams, E. J. & Levordashka, A., Jul 2018, (Unpublished).

    Research output: Contribution to conferenceOther

  12. Published

    Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions

    Morgan, P., Williams, E. J., Zook, N. & Christopher, G., 24 Jun 2018, Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. Ahram, T. Z. & Nicholson, D. (eds.). Springer, Cham, p. 56-68 13 p. (Advances in Intelligent Systems and Computing; vol. 782).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Accepted/In press

    Phishing Expeditions: The Role of Authenticity, Influence and Current Events in Phishing Email Judgments

    Polage, D. & Williams, E. J., 7 Feb 2018, (Accepted/In press).

    Research output: Contribution to conferencePoster

Previous 1 2 3 Next