
Pamela BriggsNorthumbria University · Department of Psychology
Pamela Briggs
About
201
Publications
86,162
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,392
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (201)
This study provides one of the first examples of de-platforming’s direct emotional and financial impact on Instagram and TikTok content creators at the margins. Both platforms provide significant opportunities toward creative and flexible work, allowing creators to maintain networks, promote work, express themselves and earn a living. However, thei...
Introduction:
The digital response to the Coronavirus (COVID-19) pandemic and its effects on the lives of older adults has been well-documented, but less is known about how they experienced the post-lockdown re-emergence into a relatively contactless digital society.
Methods:
We report the findings from a qualitative survey (n = 93) and subseque...
Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, and literacy. Less is known about age differences in relation to cybersecurity risks and associated cybersecurity behaviours. Using an online survey, this study analyses data from 579 participants to investigate age differences across f...
Phishing emails continue to be a major cause of cybersecurity breaches despite the development of technical measures designed to thwart these attacks. Most phishing studies have investigated desktop email platforms, but the use of mobile devices for email exchanges has soared in recent years, especially amongst young adults. In this paper, we explo...
A growing body of research has shown that people with dementia are using digital technologies to enhance lived experience. The COVID-19 pandemic has brought new digital opportunities and challenges and so provides a unique opportunity to understand how people with dementia have adapted to this new digital landscape. Semi-structured interviews were...
New students face challenges when they make the transition from school to university. Existing digital technologies used during this transition can sometimes increase the stressors associated with change. In order to explore ways forward for technology design in this space, we developed a brochure of questionable concepts. The concepts were grounde...
A Correction to this paper has been published: https://doi.org/10.1007/s00779-021-01601-9
Older adults are increasingly a target for cyber-attacks; however, very little research has investigated how they feel about engaging in protective cyber-security behaviors. We developed and applied a novel card-sorting task to elicit how older adults feel about protective cyber-security behaviors and to identify the factors that impact their confi...
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Be...
A growing body of work explores the well-being of students. However, little work has addressed the experiences of student mothers, who must juggle the demands of study and childcare simultaneously. The rise of the student mother is taking place at a time when student learning and engagement as well as childcare has become highly digitised. Existing...
Video games are hugely popular, generating more than twice the revenue of global movie and music industries combined. Whilst technically illegal and often carrying negative connotations, modding constitutes a moral grey area that is commonly accepted, often encouraged by proprietary owners and forum-centred gaming communities. Literature reflects a...
A growing body of research has shown that people with dementia are using digital technologies to enhance lived experience. The COVID-19 pandemic has brought new digital opportunities and challenges and so provides a unique opportunity to understand how people with dementia have adapted to this new digital landscape. Semi-structured interviews were...
People with dementia can experience a shrinkage of their social worlds, leading to a loss of independence, control, and reduced wellbeing. We used “the shrinking world” theory to examine how the COVID 19 pandemic has impacted the lives of people with early-middle stage dementia and what longer-term impacts may result. Interviews were conducted with...
Social media can be used to both enhance and diminish students’ experiences of university and its influence is strong for lesbian, gay, bisexual, transgender, queer and other non-heterosexual and gender-diverse (LGBTQ+) people facing stigma and discrimination. Students may feel exposed when identifying as LGBTQ+, particularly while transitioning to...
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, c...
There are organizational and individual problems associated with the excessive accumulation of digital material, but little is known about why people hoard digital information in the workplace. We interviewed 20 participants from two large knowledge-intensive organizations (one academic, one commercial). These participants scored highly on the Digi...
[This corrects the article on p. 623 in vol. 11, PMID: 32425841.].
We aim to bring together a number of designers, researchers, and practitioners to share their experience of the influence of crime and legality on their work. Through these discussions, we aspire to highlight the existing knowledge base for discussions of crime within HCI, provide a space for sharing researcher's personal experiences in their work...
Retirement is a major life transition, which leads to substantial changes across almost all aspects of day-to-day life. Although this transition has previously been seen as the normative marker for entry into older adulthood, its influence on later life has remained relatively unstudied in terms of technology use and cybersecurity behaviours. This...
Employee voice and workplace democracy have a positive impact on employee wellbeing and the performance of organizations. In this paper, we conducted interviews with employees to identify facilitators and inhibitors for the voice within the workplace and a corresponding set of appropriate qualities: Civility, Validity, Safety and Egalitarianism. We...
Book chapter on our H2020 cybersecurity project, CYBECO. Published in this book on European Research around cybersecurity:
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical...
Public services are being increasingly scrutinised for their ability to be responsive and adaptive to their service users' needs. For service delivery in domestic violence, many aspire to include feedback from service users on their practice, to drive change in their organisation and performance. Current approaches for capturing and using feedback...
Public commentary related to reality TV can be overwhelmed by thoughtless reactions and negative sentiments, which often problematically reinforce the cultural stereotyping typically employed in such media. We describe the design and month-long evaluation of a mobile "second-screening" application , Screenr, which uses co-voting and live textual ta...
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to e...
We describe the iterative design, development and learning process we undertook to produce Gabber, a digital platform that aims to support distributed capture of spoken interviews and discussions, and their qualitative analysis. Our aim is to reduce both expertise and cost barriers associated with existing technologies, making the process more incl...
The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising...
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to e...
Mobility in older adults is associated with better quality of life. However, evidence suggests that older people spend less time out-of-home than younger adults. Traditional methods for assessing mobility have serious limitations. Wearable technologies provide the possibility of objectively assessing mobility over extended periods enabling better e...
We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highl...
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to comply with information security policies and engage in effective cyber prevention. Here we introduce and evaluate The Cybersurvival Task, a ranking task that highlights cybersecurity misconceptions amongst employees and th...
Many social media platforms support the curation of personal digital data, and, more recently, the use of that data for review and reflection. We explored the process of reflection by asking users to create a meaningful ‘triptych’ of photographs drawn from their Facebook accounts. In a first study, we asked participants to manually trawl their own...
Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudg...
It is now easier than ever before to access digital health information. Individuals can monitor and record information about their own health, gather information online, and share personal experiences with those in a similar position. In fact, this shift towards peer-to-peer sharing sites represents a significant change in the way people think abou...
BACKGROUND
The internet continues to offer new forms of support for health decision making. Government, charity, and commercial websites increasingly offer a platform for shared personal health experiences, and these are just some of the opportunities that have arisen in a largely unregulated arena. Understanding how people trust and act on this in...
Background
The internet continues to offer new forms of support for health decision making. Government, charity, and commercial websites increasingly offer a platform for shared personal health experiences, and these are just some of the opportunities that have arisen in a largely unregulated arena. Understanding how people trust and act on this in...
HCI draws on a variety of traditions but recently there have been calls to consolidate contributions around the problems researchers set out to solve. However, with this comes the assumption that problems are tractable and certain, rather than constructed and framed by researchers. We take as a case study a Tumblr community of teen shoplifters who...
The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as “Heartbleed” in the first few days after this threat was exposed. The case study explored which professional groups appeared to lead the debate about Heartblee...
Increasingly our digital traces are providing new opportunities for self-reflection. In particular, social media (SM) data can be used to support self-reflection, but to what extent is this affected by the form in which SM data is presented? Here, we present three studies where we work with individuals to transform or remediate their SM data into a...
Social media (SM) are a core component of young people's lives and have been researched in relation to relationship building and maintenance. While SM are known to be useful in supporting life transitions for young people, we know little about the specific use patterns or activities associated with social adjustment during the specific transition t...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges-more specifically social saliency nudges-that aim to highlight important information to the user when evaluating emails. We used Signal Detection Theory to assess the effects of both sender saliency (high...
Technologies designed to support ageing can be deemed to be ageist in that they often exhibit a benevolent paternalism that tries to 'protect' older people. Often this involves gathering extensive data to monitor physical and cognitive decline at the expense of an individual's privacy, with an underlying, often implicit, assumption that older adult...
Crime scripts are becoming an increasingly popular method for understanding crime by turning a crime from a static event into a process, whereby every phase of the crime is scripted. It is based on the work relating to cognitive scripts and rational-choice theory. With the exponential growth of cyber-crime, and more specifically cloud-crime, polici...
Cybersecurity suffers from the problem of poor incident reporting. We explored message influences on incident reporting rate. Participants were presented with messages that differed in terms of (i) whether the problem was framed as a technical or a security issue and (ii) the perceived beneficiaries of making a report (benefit to the user, to other...
HCI has multidisciplinary roots and has drawn from and contributed to different disciplines, including computer science, psychology, sociology, and medicine. There is a natural overlap between health and HCI researchers, given their joint focus on utilising technologies to better support people's health and wellbeing. However, the best digital heal...
A number of interventions exist to support older adults in ageing well and these typically involve support for an active and sociable ageing process. We set out to examine the privacy implications of an intervention that would monitor mobility and share lifestyle and health data with a community of trusted others. We took a privacy-by-design approa...
This paper considers how parents use the social media platform Instagram to facilitate the capture, curation and sharing of 'family snapshots'. Our work draws upon established cross-disciplinary literature relating to film photography and the composition of family albums in order to establish whether social media has changed the way parents visuall...
While behavior change methods have become relatively commonplace in the health domain, they have only recently been applied to the cybersecurity field. In this chapter we review two fundamentally different approaches to behavior change in cybersecurity. First we explore “nudging” and behavioral interventions arising from the MINDSPACE framework. Se...
Background
Traditional health information has been based on facts and figures and not on patient experience (PEx). Websites featuring people’s accounts of their experiences of health and illness are popular as a source of information, support and much else. However, there are concerns that experiential information on the internet might have adverse...
Access article is available for free (the article is open access!).
Abstract: Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which mak...
The article has open access status and freely available from the Springer website!
Mobile devices offer a common platform for both leisure and work-related tasks, but this has resulted in a blurred boundary between home and work. In this paper, we explore the security implications of this blurred boundary, both for the worker and the employer. Mob...
New technologies offer an opportunity to improve the wellbeing and independence of older adults, but many of the potential benefits, have not yet been realised. Some technologies suggest a lifestyle of constant monitoring, controlling and nudging - transformations that could be perceived as threatening. To better understand older adult perceptions...
Reminiscence is used to support and create new social bonds and give meaning to life. Originally perceived as a preoccupation of the aged, we now recognize that reminiscence has value throughout the lifespan. Increasingly, social media can be used to both support and prompt reminiscence, with Facebook’s Lookback or Year in Review as recent examples...
A number of digital platforms and services have recently emerged that allow users to create posthumous forms of communication, effectively arranging for the delivery of messages from "beyond the grave". Despite some evidence of interest and popularity of these services, little is known about how posthumous messages may impact the people who receive...
Social media has begun to migrate from a predominantly text-based medium, through photography and into cinematography and edited video. Film is a vital medium through which we not only capture our world, but also seek to understand it. This workshop explores an emerging area of research within the CHI community that focuses on applying filmic techn...
Surveillance, literally the 'close watching over' of a person or a group, was historically carried out to monitor adversaries and criminals. The digital era of sensor-rich, connected devices means that new forms of everyday surveillance -- what some are calling 'dataveillance' -- are emerging. These are changing the power structures that link peopl...
Objective:
Information exchange via Twitter and other forms of social media make public health communication more complex as citizens play an increasingly influential role in shaping acceptable or desired health behaviors. Taking the case of the 2009-2010 H1N1 pandemic, we explore in detail the dissemination of H1N1-related advice in the UK throug...
New systems have been introduced that support the visualisation and sharing of personal digital data, but relatively little work has been done to establish how such systems support reminiscence and personal reflection. In this paper, we explore Intel’s Museum of Me, a tool that collates and presents Facebook data in the form of a virtual museum, by...
The Internet supports the peer-to-peer healthcare and the promotion of shared patient narratives. Websites incorporating these narratives or personal accounts are known to offer support to carers of people with multiple sclerosis, but little is known about how carers make choices about what websites to visit and why. In total, 20 carers viewed a ra...
Social media is a common place for people to post and share digital reflections of their life events, including major events such as getting married, having children, graduating, etc. Although the creation of such posts is straightforward, the identification of events on online media remains a challenge. Much research in recent years focused on ext...
In addition to their popularity as personal devices, tablets, are becoming increasingly prevalent in work and public settings. In many of these application domains a supervisor user – such as the teacher in a classroom – oversees the function of one or more devices. Access to supervisory functions is typically controlled through the use of a passco...
Identity technologies constitute one of the fastest growing areas for research and development, driven by both commercial and administrative imperatives. Crucially, they constitute the means by which we include or exclude individuals and groups in terms of access to goods, services or information -- yet few developments in this space embrace an inc...
People make security choices on a daily basis without fully considering the security implications of those choices. In this paper we present a prototype application which promotes the choice of secure wireless network options, specifically when users are unfamiliar with the wireless networks available. The app was developed based on behavioural the...
New social media has led to an explosion in personal digital data that encompasses both those expressions of self chosen by the individual as well as reflections of self provided by other, third parties. The resulting Digital Personhood (DP) data is complex and for many users it is too easy to become lost in the mire of digital data. This paper stu...
Patients will often resist campaigns to promote healthier behavior but the digital health revolution allows the creation of a much more nuanced set of health messages that can be tailored to the patient or end user. In this study we explore the effects of patient preference on message acceptance and also explore what happens when messages are frame...
This paper examines how London bus drivers have responded to performance monitoring via a telematics device called Drivewell. This device calculates a score based on various recordable driving-related events like abrupt braking or irregular turning actions. Our qualitative methodology incorporated semi-structured interviews and ethnographic fieldwo...
Crowdsourcing has been widely leveraged for the tagging of video material; recently this has included the monitoring of surveillance video footage. However, the relative advantages and disadvantages of crowdsourcing watchers of surveillance video are not well articulated, nor has there been any significant work on the efficacy of different tools fo...