Follow
Kovila PL Coopamootoo
Title
Cited by
Cited by
Year
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A Van Moorsel
Proceedings of the 2020 conference on fairness, accountability, and …, 2020
2652020
Towards an equitable digital society: artificial intelligence (AI) and corporate digital responsibility (CDR)
K Elliott, R Price, P Shaw, T Spiliotopoulos, M Ng, K Coopamootoo, ...
Society 58 (3), 179-188, 2021
762021
Simulating the effects of social presence on trust, privacy concerns & usage intentions in automated bots for finance
M Ng, KPL Coopamootoo, E Toreini, M Aitken, K Elliot, A van Moorsel
2020 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2020
652020
Why Privacy Is All But Forgotten: An Empirical Study of Privacy & Sharing Attitude
KPL Coopamootoo, T Groß
Proceedings on Privacy Enhancing Technologies 2017 (4), 97-118, 2017
452017
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
442020
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
382014
Effect of cognitive depletion on password choice
T Groß, K Coopamootoo, A Al-Jabri
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
282016
Usage patterns of privacy-enhancing technologies
KPL Coopamootoo
CCS: ACM SIGSAC Conference on Computer and Communications Security, 1371-1390, 2020
242020
In pursuit of socially-minded data-intensive innovation in banking: A focus group study of public expectations of digital innovation in banking
M Aitken, M Ng, D Horsfall, KPL Coopamootoo, A van Moorsel, K Elliott
Technology in Society 66, 101666, 2021
202021
How can and would people protect from online tracking?
M Mehrnezhad, K Coopamootoo, E Toreini
Proceedings on Privacy Enhancing Technologies 1, 105-125, 2022
192022
Mental models for usable privacy: A position paper
KPL Coopamootoo, T Groß
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
182014
Technologies for trustworthy machine learning: A survey in a socio-technical context
E Toreini, M Aitken, KPL Coopamootoo, K Elliott, VG Zelaya, P Missier, ...
arXiv preprint arXiv:2007.08911, 2020
172020
Cyber security and privacy experiments: a design and reporting toolkit
KPL Coopamootoo, T Groß
Privacy and Identity Management. The Smart Revolution: 12th IFIP WG 9.2, 9.5 …, 2018
152018
Evidence-based methods for privacy and identity management
KPL Coopamootoo, T Groß
Privacy and Identity Management. Facing up to Next Steps: 11th IFIP WG 9.2 …, 2016
152016
“I feel invaded, annoyed, anxious and I may protect myself”: Individuals’ Feelings about Online Tracking and their Protective Behaviour across Gender and Country
KPL Coopamootoo, M Mehrnezhad, E Toreini
Usenix Security Symposium 2022, 2022
142022
Designing usable online privacy mechanisms: what can we learn from real world behaviour?
PL Coopamootoo, D Ashenden
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4 …, 2011
122011
A Codebook for Evidence-Based Research: The Nifty Nine Completeness Indicators v1. 1
K Coopamootoo, T Groß
School of Computing Technical Report Series, 2017
11*2017
Evaluating users’ affect states: towards a study on privacy concerns
U Nwadike, T Groß, KPL Coopamootoo
Privacy and Identity Management. Facing up to Next Steps: 11th IFIP WG 9.2 …, 2016
102016
Mental models: an approach to identify privacy concern and behavior
KPL Coopamootoo, T Groß
Symposium on Usable Privacy and Security (SOUPS), 9-11, 2014
102014
Mental models of online privacy: Structural properties with cognitive maps
KPL Coopamootoo, T Groß
Proceedings of the 28th International BCS Human Computer Interaction …, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20