default search action
Sarah Turner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Asimina Vasalou, Laura Benton, Ana Luisa Serta, Andrea Gauthier, Ceylan Besevli, Sarah Turner, Rea Gill, Rachael Payler, Etienne B. Roesch, Kevin McAreavey, Kim Bauters, Weiru Liu, Hsueh-Ju Chen, Dennis Ivory, Manos Panaousis, Georgios Loukas:
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices. Comput. Secur. 148: 104112 (2025) - 2024
- [j9]Sarah Turner, Leonie Maria Tanczer:
In principle vs in practice: User, expert and policymaker attitudes towards the right to data portability in the internet of things. Comput. Law Secur. Rev. 52: 105912 (2024) - [j8]Gareth Mott, Sarah Turner, Jason R. C. Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan:
'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience. J. Cybersecur. 10(1) (2024) - [j7]Asimina Vasalou, Andrea Gauthier, Ana Luisa Serta, Ceylan Besevli, Sarah Turner, Rachael Payler, Rea Gill, Kevin McAreavey, George Loukas, Weiru Liu, Roser Beneito-Montagut:
In pursuit of thermal comfort: An exploration of smart heating in everyday life. Int. J. Hum. Comput. Stud. 186: 103245 (2024) - 2023
- [j6]Gareth Mott, Sarah Turner, Jason R. C. Nurse, Jamie MacColl, James Sullivan, Anna Cartwright, Edward J. Cartwright:
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. Comput. Secur. 128: 103162 (2023) - [c4]Laura Benton, Asimina Vasalou, Sarah Turner:
Location, Location, Security? Exploring Location-Based Smart Device Security Concerns and Mitigations within Low-Rent Homes. Conference on Designing Interactive Systems 2023: 1060-1077 - [c3]Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's More Than Just Money: The Real-World Harms from Ransomware Attacks. HAISA 2023: 261-274 - [i4]Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's more than just money: The real-world harms from ransomware attacks. CoRR abs/2307.02855 (2023) - 2022
- [j5]Rui Leitão, Martin Maguire, Sarah Turner, Laura Guimarães:
A systematic evaluation of game elements effects on students' motivation. Educ. Inf. Technol. 27(1): 1081-1103 (2022) - [j4]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-34 (2022) - [c2]Sarah Turner, Jason R. C. Nurse, Shujun Li:
"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CHI Extended Abstracts 2022: 34:1-34:8 - [i3]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. CoRR abs/2206.03930 (2022) - 2021
- [j3]Sarah Turner, July Galindo Quintero, Simon Turner, Jessica Lis, Leonie Maria Tanczer:
The exercisability of the right to data portability in the emerging Internet of Things (IoT) environment. New Media Soc. 23(10) (2021) - [c1]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. HAISA 2021: 115-126 - [i2]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling it doesn't work: The challenge of finding security advice for smart home devices. CoRR abs/2108.03107 (2021) - [i1]Sarah Turner, Jason R. C. Nurse, Shujun Li:
It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CoRR abs/2112.09035 (2021) - 2020
- [j2]Viktor Matkovic, Jaelle Scheuerman, Madeleine Steeds, Sarah Turner, Sarah Clinch:
Attending Doctoral Events - Experiences and Lessons. IEEE Pervasive Comput. 19(4): 29-34 (2020)
2010 – 2019
- 2014
- [j1]Jialong Zhang, Thi-Thanh-Hiên Pham, Margaret Kalacska, Sarah Turner:
Using Landsat Thematic Mapper records to map land cover change and the impacts of reforestation programmes in the borderlands of southeast Yunnan, China: 1990-2010. Int. J. Appl. Earth Obs. Geoinformation 31: 25-36 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint