Zobrazeno 1 - 10
of 65
pro vyhledávání: '"John N Towse"'
Publikováno v:
PLoS ONE, Vol 14, Iss 1, p e0209684 (2019)
Decisions that we make about email legitimacy can result in a pernicious threat to security of both individuals and organisations. Yet user response to phishing emails is far from uniform; some respond while others do not. What is the source of this
Externí odkaz:
https://doaj.org/article/683e2d25aa8c42b4a533372be358e1d0
Autor:
James M Stone, John N Towse
Publikováno v:
Journal of Open Research Software, Vol 3, Iss 1, Pp e5-e5 (2015)
Working memory is a key construct within cognitive science. It is an important theory in its own right, but the influence of working memory is enriched due to the widespread evidence that measures of its capacity are linked to a variety of functions
Externí odkaz:
https://doaj.org/article/2afc50df220941a2998385449c8c7723
Publikováno v:
The Journal of Social Psychology. 161:395-402
In the most recent editorial for the The Journal of Social Psychology (JSP), J. Grahe (2021) set out and justified a new journal policy: publishing papers now requires authors to make available all...
Publikováno v:
Behavior Research Methods
Open data-sharing is a valuable practice that ought to enhance the impact, reach, and transparency of a research project. While widely advocated by many researchers and mandated by some journals and funding agencies, little is known about detailed pr
Autor:
Mark Levine, Irum Rauf, Bashar Nuseibeh, John N. Towse, Awais Rashid, Helen Sharp, Thein Than Tun, Dirk van der Linden, Paul Lunn, Tamara Lopez, Marian Petre
Publikováno v:
Rauf, I, Petre, M, Tun, T, Lopez, T, Lunn, P, van der Linden, D, Towse, J, Sharp, H, Levine, M, Rashid, A & Nuseibeh, B 2021, ' The Case for Adaptive Security Interventions ', ACM Transactions on Software Engineering and Methodology, vol. 31, no. 1, 9, pp. 1-52 . https://doi.org/10.1145/3471930
Despite the availability of various methods and tools to facilitate secure coding, developers continue to write code that contains common vulnerabilities. It is important to understand why technological advances do not sufficiently facilitate develop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::211a0e38d53cd8337bf4e4c0d671c78c
https://research-information.bris.ac.uk/ws/files/313645753/The_case_for_Adaptive_Security_Interventions.pdf
https://research-information.bris.ac.uk/ws/files/313645753/The_case_for_Adaptive_Security_Interventions.pdf
Autor:
John N. Towse
Publikováno v:
Journal of Numerical Cognition, Vol 5, Iss 1, Pp 1-4 (2019)
Publikováno v:
Memory & Cognition
Working memory capacity is commonly measured in terms of its item span, and much less often in terms of its time span, or "period." The former measures how many items can be stored in working memory when carrying out episodes of concurrent processing
Autor:
Mark Levine, John N. Towse, Awais Rashid, Pauline Anthonysamy, Marian Petre, Dirk van der Linden, Thein Than Tun, Bashar Nuseibeh
Publikováno v:
Van Der Linden, D, Anthonysamy, P, Nuseibeh, B, Tun, T T, Petre, M, Levine, M, Towse, J N & Rashid, A 2020, Schrödinger's Security : Opening the Box on App Developers' Security Rationale . in ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering . Institute of Electrical and Electronics Engineers (IEEE), pp. 149-160, The 42nd International Conference on Software Engineering, Seoul, Korea, Republic of, 23/05/20 . https://doi.org/10.1145/3377811.3380394
ICSE
ICSE
Research has established the wide variety of security failures in mobile apps, their consequences, and how app developers introduce or exacerbate them. What is not well known is why developers do so—what is the rationale underpinning the decisions
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc1d9463a80ed663f17457467e4279f9
https://research-information.bris.ac.uk/en/publications/f43803de-4ade-488f-be1a-a2e8ba30c201
https://research-information.bris.ac.uk/en/publications/f43803de-4ade-488f-be1a-a2e8ba30c201
Publikováno v:
Quarterly Journal of Experimental Psychology (2006)
Measures of working memory capacity (WMC) are extremely popular, yet we know relatively little about the specific processes that support recall. We focused on children’s and adults’ ability to use contextual support to access working memory repre
Autor:
John N. Towse
Publikováno v:
Journal of Numerical Cognition, Vol 2, Iss 3, Pp 166-169 (2017)