Lynne Coventry
Lynne Coventry
Pact Lab, Department of Psychology, Northumbria University
Verified email at northumbria.ac.uk
Title
Cited by
Cited by
Year
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
A De Angeli, L Coventry, G Johnson, K Renaud
International journal of human-computer studies 63 (1-2), 128-152, 2005
2992005
Usability and biometric verification at the ATM interface
L Coventry, A De Angeli, G Johnson
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2003
1652003
Analyte testing method and system
C Stephens, L Coventry, RJ Welsh, DA Sturrock, A Strachan, M Chiba, ...
US Patent 8,958,991, 2015
1192015
VIP: a visual approach to user authentication
A De Angeli, M Coutts, L Coventry, GI Johnson, D Cameron, MH Fischer
Proceedings of the working conference on advanced visual interfaces, 316-323, 2002
1102002
Introducing ATMs in India: a contextual inquiry
A De Angeli, U Athavankar, A Joshi, L Coventry, GI Johnson
Interacting with Computers 16 (1), 29-44, 2004
1062004
Introducing ATMs in India: a contextual inquiry
A De Angeli, U Athavankar, A Joshi, L Coventry, GI Johnson
Interacting with Computers 16 (1), 29-44, 2004
1062004
The unfriendly user: exploring social reactions to chatterbots
A De Angeli, GI Johnson, L Coventry
Proceedings of The International Conference on Affective Human Factors …, 2001
1052001
Cybersecurity in healthcare: a narrative review of trends, threats and ways forward
L Coventry, D Branley
Maturitas 113, 48-52, 2018
902018
Video conferencing in higher education
L Coventry
Support Initiative for Multimedia Applications, 1995
761995
Self-service terminal
CGV Rohan, SW Swaine, LM Coventry, DC McGinn, A Colley, PN Day, ...
US Patent App. 29/375,994, 2012
622012
Risk perceptions of cyber-security and precautionary behaviour
P Van Schaik, D Jeske, J Onibokun, L Coventry, J Jansen, P Kusev
Computers in Human Behavior 75, 547-559, 2017
612017
Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors
JM Blythe, L Coventry, L Little
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 103-122, 2015
602015
Self-service terminal
CGV Rohan, SW Swaine, LM Coventry, DC McGinn, A Colley, PN Day, ...
US Patent App. 29/375,994, 2012
602012
Self-service terminal
CGV Rohan, SW Swaine, LM Coventry, DC McGinn, A Colley, PN Day, ...
US Patent App. 29/375,994, 2012
582012
Self-service terminal
CGV Rohan, SW Swaine, LM Coventry, DC McGinn, A Colley, PN Day, ...
US Patent App. 29/375,998, 2012
552012
Principles of persuasion in social engineering and their use in phishing
A Ferreira, L Coventry, G Lenzini
International Conference on Human Aspects of Information Security, Privacy …, 2015
532015
Self-service terminal
CGV Rohan, SW Swaine, LM Coventry, DC McGinn, A Colley, PN Day, ...
US Patent App. 29/376,023, 2012
522012
Some effects of cognitive style on learning UNIX
L Coventry
International Journal of Man-Machine Studies 31 (3), 349-365, 1989
471989
Self-service terminal
CGV Rohan, SW Swaine, LM Coventry, DC McGinn, A Colley, PN Day, ...
US Patent App. 29/376,016, 2012
462012
Usable biometrics
L Coventry
Designing Secure Systems that People Can Use. O’Reilly, 175-198, 2005
452005
The system can't perform the operation now. Try again later.
Articles 1–20