default search action
Kovila P. L. Coopamootoo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e1]Shujun Li, Kovila P. L. Coopamootoo, Michael Sirivianos:
European Interdisciplinary Cybersecurity Conference, EICC 2024, Xanthi, Greece, June 5-6, 2024. ACM 2024 [contents] - 2023
- [c19]Magdalene Ng, Maria Bada, Kovila P. L. Coopamootoo:
What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices? EuroS&P Workshops 2023: 659-672 - [c18]Kovila P. L. Coopamootoo, Magdalene Ng:
"Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns. USENIX Security Symposium 2023: 5611-5628 - [i10]Kovila P. L. Coopamootoo, Magdalene Ng:
"Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns. CoRR abs/2305.03680 (2023) - 2022
- [j3]Maryam Mehrnezhad, Kovila P. L. Coopamootoo, Ehsan Toreini:
How Can and Would People Protect From Online Tracking? Proc. Priv. Enhancing Technol. 2022(1): 105-125 (2022) - [c17]Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. USENIX Security Symposium 2022: 287-304 - [i9]Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. CoRR abs/2202.04682 (2022) - [i8]Magdalene Ng, Kovila P. L. Coopamootoo, Tasos Spiliotopoulos, Dave Horsfall, Mhairi Aitken, Ehsan Toreini, Karen Elliott, Aad van Moorsel:
In Private, Secure, Conversational FinBots We Trust. CoRR abs/2204.10344 (2022) - 2021
- [i7]Tasos Spiliotopoulos, Dave Horsfall, Magdalene Ng, Kovila P. L. Coopamootoo, Aad van Moorsel, Karen Elliott:
Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials. CoRR abs/2106.06053 (2021) - [i6]Karen Elliott, Kovila P. L. Coopamootoo, Edward Curran, Paul D. Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel:
Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion. CoRR abs/2112.09767 (2021) - 2020
- [j2]Mhairi Aitken, Ehsan Toreini, Peter Carmichael, Kovila P. L. Coopamootoo, Karen Elliott, Aad van Moorsel:
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data Soc. 7(1): 205395172090889 (2020) - [c16]Kovila P. L. Coopamootoo:
Usage Patterns of Privacy-Enhancing Technologies. CCS 2020: 1371-1390 - [c15]Mhairi Aitken, Magdalene Ng, Ehsan Toreini, Aad van Moorsel, Kovila P. L. Coopamootoo, Karen Elliott:
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 21-38 - [c14]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. EuroS&P Workshops 2020: 190-199 - [c13]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. FAT* 2020: 272-283 - [c12]Kovila P. L. Coopamootoo:
Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method Preferences. Financial Cryptography Workshops 2020: 71-83 - [c11]Kovila P. L. Coopamootoo:
Empathy as a Response to Frustration in Password Choice. Financial Cryptography Workshops 2020: 177-191 - [c10]Laheem Khan, Kovila P. L. Coopamootoo, Magdalene Ng:
Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice. HCI (30) 2020: 143-161 - [i5]Kovila P. L. Coopamootoo:
Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions & Method Preferences. CoRR abs/2003.08990 (2020) - [i4]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for Finance. CoRR abs/2006.15449 (2020) - [i3]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Vladimiro González-Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel:
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context. CoRR abs/2007.08911 (2020) - [i2]Kovila P. L. Coopamootoo:
Usage Patterns of Privacy-Enhancing Technologies. CoRR abs/2009.10278 (2020)
2010 – 2019
- 2019
- [i1]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. CoRR abs/1912.00782 (2019) - 2018
- [c9]Kovila P. L. Coopamootoo:
Towards Empowering the Human for Privacy Online. Privacy and Identity Management 2018: 67-80 - 2017
- [j1]Kovila P. L. Coopamootoo, Thomas Groß:
Why Privacy Is All But Forgotten. Proc. Priv. Enhancing Technol. 2017(4): 97-118 (2017) - [c8]Kovila P. L. Coopamootoo, Thomas Groß:
Cyber Security and Privacy Experiments: A Design and Reporting Toolkit. Privacy and Identity Management 2017: 243-262 - [c7]Kovila P. L. Coopamootoo:
Work in progress: Fearful users' privacy intentions: an empirical investigation. STAST 2017: 82-89 - 2016
- [c6]Kovila P. L. Coopamootoo, Thomas Groß:
Evidence-Based Methods for Privacy and Identity Management. Privacy and Identity Management 2016: 105-121 - [c5]Uchechi Phyllis Nwadike, Thomas Groß, Kovila P. L. Coopamootoo:
Evaluating Users' Affect States: Towards a Study on Privacy Concerns. Privacy and Identity Management 2016: 248-262 - [c4]Thomas Groß, Kovila P. L. Coopamootoo, Amina Al-Jabri:
Effect of Cognitive Effort on Password Choice. WAY@SOUPS 2016 - 2014
- [c3]Kovila P. L. Coopamootoo, Thomas Groß:
Mental Models of Online Privacy: Structural Properties with Cognitive Maps. BCS HCI 2014 - [c2]Kovila P. L. Coopamootoo, Thomas Groß:
Mental Models for Usable Privacy: A Position Paper. HCI (24) 2014: 410-421 - [c1]Budi Arief, Kovila P. L. Coopamootoo, Martin Emms, Aad P. A. van Moorsel:
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. WPES 2014: 201-204
Coauthor Index
aka: Aad van Moorsel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint