49 results on '"Prior, Suzanne"'
Search Results
2. A Cyber Peers Framework for Primary Schools
3. Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children
4. Investigating the Accessibility and Usability of Multi-factor Authentication for Young People
5. Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?
6. Privacy policy analysis: A scoping review and research agenda
7. The Impact of Financial Deprivation on Children's Cybersecurity Knowledge & Abilities
8. Children's Password-Related Books: Efficacious, Vexatious 'and' Incongruous
9. The “three M’s” counter-measures to children’s risky online behaviors: mentor, mitigate and monitor
10. Parents Unwittingly Leak Their Children’s Data: A GDPR Time Bomb?
11. Age-appropriate password “best practice” ontologies for early educators and parents
12. Towards the full inclusion of people with severe speech and physical impairments in the design of Augmentative and Alternative Communication software
13. Study of diodes and transistors for organic circuits
14. Parents Unwittingly Leak Their Children’s Data: A GDPR Time Bomb?
15. Who Is Best Placed to Support Cyber Responsibilized UK Parents?
16. "Oh yeah, they're looking": A thematic analysis of indoor UV tanning industry advertising and articles
17. Chronicles: Supporting Conversational Narrative in Alternative and Augmentative Communication
18. Improving the Debugging Skills of a Novice Programmer Through Enhanced Knowledge of Interactive Debugging
19. Comprehension after Oral and Silent Reading: Does Grade Level Matter?
20. SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review
21. SOK : young children's cybersecurity knowledge and skills
22. 'Read in Your Head': A Vygotskian Analysis of the Transition from Oral to Silent Reading.
23. Field Dependence as a Factor in Second Language Communicative Production.
24. KidzPass : authenticating pre-literate children
25. How listeners shape what tellers tell
26. Chronicles: Supporting Conversational Narrative in Alternative and Augmentative Communication
27. Children’s Password-Related Books: Efficacious, Vexatious and Incongruous
28. From Gold E. Locks to gangsters.
29. “Passwords protect my stuff”—a study of children’s password practices
30. Case Study – Exploring Children’s Password Knowledge and Practices
31. Understanding text in a second language: a psychological approach to an SLA problem
32. Sharing the Vision: representing the matters of concern for design-led fledgling companies in Scotland
33. Adolescents’ reasons for tanning and appearance motives: A preliminary study
34. “Oh yeah, they’re looking”: A thematic analysis of indoor UV tanning industry advertising and articles
35. Acquisition of the Non-Generic Definite Article in English: The Influence of Cognitive Style
36. The pop-up ethnographer: Roles of the researcher in temporary spaces
37. Focus groups as a requirements gathering method with adults with severe speech and physical impairments
38. Use of an agile bridge in the development of assistive technology
39. The CHAMPION software project
40. A straight-talking case study
41. HCI methods for including adults with disabilities in the design of CHAMPION
42. Interface metaphor design and instant messaging for older adults
43. Nip, Tuck, or Not? Objectification and Cosmetic Surgery
44. HCI methods for including adults with disabilities in the design of CHAMPION.
45. The CHAMPION software project.
46. A straight-talking case study.
47. Student project of the year.
48. Establishing a hybrid-methodology model for co-designing behaviour change : within the context of adventure sport participation in Scotland
49. letters.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.