default search action
John McAlaney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ceyda Kiyak, Deniz Cetinkaya, John McAlaney, Sarah Hodge, Raian Ali:
Interrupting Dissociation of Players through Real-Time Digital Tasks during Online Gambling. Int. J. Hum. Comput. Interact. 40(18): 5247-5258 (2024) - [c27]Ruijie Wang, Reece Bush-Evans, Emily Arden-Close, John McAlaney, Sarah Hodge, Elvira Bolat, Sarah Thomas, Keith Phalp:
Usability of Responsible Gambling Information on Gambling Operator' Websites: A Webcam-Based Eye Tracking Study. ETRA 2024: 50:1-50:3 - 2023
- [j6]Ruijie Wang, Reece Bush-Evans, Emily Arden-Close, Elvira Bolat, John McAlaney, Sarah Hodge, Sarah Thomas, Keith Phalp:
Transparency in persuasive technology, immersive technology, and online marketing: Facilitating users' informed decision making and practical implications. Comput. Hum. Behav. 139: 107545 (2023) - [c26]Selin Gurgun, Emily Arden-Close, John McAlaney, Keith Phalp, Raian Ali:
Can We Re-design Social Media to Persuade People to Challenge Misinformation? An Exploratory Study. PERSUASIVE 2023: 123-141 - 2022
- [c25]Dorian Lyons, Ceyda Kiyak, Deniz Cetinkaya, Sarah Hodge, John McAlaney:
Design and Development of a Mobile Application to Combat Digital Addiction and Dissociative States During Phone Usage. ICEBE 2022: 204-209 - 2021
- [j5]Abdulaziz Alblwi, John McAlaney, Dena Ahmed S. Al Thani, Keith Phalp, Raian Ali:
Procrastination on social media: predictors of types, triggers and acceptance of countermeasures. Soc. Netw. Anal. Min. 11(1): 19 (2021) - 2020
- [j4]John McAlaney, Mohamed Basel Almourad, Georgina Powell, Raian Ali:
Perceptions and Misperceptions of Smartphone Use: Applying the Social Norms Approach. Inf. 11(11): 513 (2020) - [c24]Sarah Eileen Hodge, Jacqui Taylor, John McAlaney:
Designing Meta-choices in a Purpose Made Game to Explore Anti-social Choices. BESC 2020: 1-5 - [c23]John McAlaney, Sarah Hambidge, Emily Kimpton, Helen Thackray:
Knowledge is power: An analysis of discussions on hacking forums. EuroS&P Workshops 2020: 477-483 - [c22]Jacqui Taylor-Jackson, John McAlaney, Jeffrey L. Foster, Abubakar Bello, Alana Maurushat, John Dale:
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach. Financial Cryptography Workshops 2020: 207-217 - [c21]Manal Aldhayan, Mohammad Naiseh, John McAlaney, Raian Ali:
Online Peer Support Groups for Behavior Change: Moderation Requirements. RCIS 2020: 157-173 - [c20]John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, Raian Ali:
Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool. WorldCIST (3) 2020: 95-107 - [c19]John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, Raian Ali:
On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison. WorldCIST (2) 2020: 723-733
2010 – 2019
- 2019
- [j3]Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto:
A normative decision-making model for cyber security. Inf. Comput. Secur. 27(5) (2019) - [c18]Aarif Alutaybi, John McAlaney, Emily Arden-Close, Angelos Stefanidis, Keith Phalp, Raian Ali:
Fear of Missing Out (FoMO) as Really Lived: Five Classifications and one Ecology. BESC 2019: 1-6 - [c17]Sainabou Cham, Abdullah Algashami, John McAlaney, Angelos Stefanidis, Keith Phalp, Raian Ali:
Goal Setting for Persuasive Information Systems: Five Reference Checklists. PERSUASIVE 2019: 237-253 - [c16]Aarif Alutaybi, Emily Arden-Close, John McAlaney, Angelos Stefanidis, Keith Phalp, Raian Ali:
How Can Social Networks Design Trigger Fear of Missing Out? SMC 2019: 3758-3765 - [c15]John McAlaney, Emily Arden-Close, Raian Ali:
Gender Differences in Attitudes Towards Prevention and Intervention Messages for Digital Addiction. WorldCIST (2) 2019: 806-818 - [c14]Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, Raian Ali:
Digital Addiction: Negative Life Experiences and Potential for Technology-Assisted Solutions. WorldCIST (2) 2019: 921-931 - 2018
- [j2]George Drosatos, Fotis Nalbadis, Emily Arden-Close, Victoria Baines, Elvira Bolat, Laura Vuillier, Theodoros Kostoulas, Marcin Budka, Sonia Wasowska, Maris Bonello, Jamie Brown, Tessa Corner, John McAlaney, Keith Phalp, Raian Ali:
Enabling Responsible Online Gambling by Real-time Persuasive Technologies. Complex Syst. Informatics Model. Q. 17: 44-68 (2018) - [c13]Andrew M'manga, Shamal Faily, Chris Williams, John McAlaney:
Rationalising Decision Making about Risk: A Normative Approach. HAISA 2018: 263-271 - [c12]George Drosatos, Fotis Nalbadis, Emily Arden-Close, Victoria Baines, Elvira Bolat, Laura Vuillier, Theodoros Kostoulas, Sonia Wasowska, Maris Bonello, Jane Palles, John McAlaney, Keith Phalp, Raian Ali:
Empowering responsible online gambling by real-time persuasive information systems. RCIS 2018: 1-11 - 2017
- [c11]Jacqui Taylor, John McAlaney, Sarah Hodge, Helen Thackray, Christopher Richardson, Susie James, John Dale:
Teaching psychological principles to cybersecurity students. EDUCON 2017: 1782-1789 - [c10]Abdullah Algashami, Alimohammad Shahri, John McAlaney, Jacqui Taylor, Keith Phalp, Raian Ali:
Strategies and Design Principles to Minimize Negative Side-Effects of Digital Motivation on Teamwork. PERSUASIVE 2017: 267-278 - [c9]Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
System design considerations for risk perception. RCIS 2017: 322-327 - [c8]Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk. SOUPS 2017 - 2016
- [j1]Amen Alrobai, John McAlaney, Keith Phalp, Raian Ali:
Exploring the Risk Factors of Interactive E-Health Interventions for Digital Addiction. Int. J. Sociotechnology Knowl. Dev. 8(2): 1-15 (2016) - [c7]Sarah Hodge, Jacqui Taylor, John McAlaney, Christos Gatzidis:
Design of a Videogame to Explore Morality. BCS HCI 2016 - [c6]Helen Thackray, John McAlaney, Huseyin Dogan, Jacqui Taylor, Christopher Richardson:
Social Psychology: An under-used tool in Cybersecurity. BCS HCI 2016 - [c5]Amen Alrobai, John McAlaney, Huseyin Dogan, Keith Phalp, Raian Ali:
Exploring the Requirements and Design of Persuasive Intervention Technology to Combat Digital Addiction. HCSE/HESSD 2016: 130-150 - [c4]Amen Alrobai, John McAlaney, Keith Phalp, Raian Ali:
Online Peer Groups as a Persuasive Tool to Combat Digital Addiction. PERSUASIVE 2016: 288-300 - 2015
- [c3]Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos:
Mitigating Circumstances in Cybercrime: A Position Paper. CIT/IUCC/DASC/PICom 2015: 1972-1976 - [c2]Shamal Faily, John McAlaney, Claudia Iacob:
Ethical Dilemmas and Dimensions in Penetration Testing. HAISA 2015: 233-242 - [c1]Raian Ali, Nan Jiang, Keith Phalp, Sarah Muir, John McAlaney:
The Emerging Requirement for Digital Addiction Labels. REFSQ 2015: 198-213
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint