Pamela Briggs

Pamela Briggs
Northumbria University · Department of Psychology

About

201
Publications
86,162
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,392
Citations
Citations since 2017
57 Research Items
2337 Citations
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
Additional affiliations
September 2013 - present
Newcastle University
Position
  • Professor
Description
  • Visiting Professor at the Open Lab working with the Digital Civics team

Publications

Publications (201)
Article
This study provides one of the first examples of de-platforming’s direct emotional and financial impact on Instagram and TikTok content creators at the margins. Both platforms provide significant opportunities toward creative and flexible work, allowing creators to maintain networks, promote work, express themselves and earn a living. However, thei...
Article
Full-text available
Introduction: The digital response to the Coronavirus (COVID-19) pandemic and its effects on the lives of older adults has been well-documented, but less is known about how they experienced the post-lockdown re-emergence into a relatively contactless digital society. Methods: We report the findings from a qualitative survey (n = 93) and subseque...
Article
Full-text available
Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, and literacy. Less is known about age differences in relation to cybersecurity risks and associated cybersecurity behaviours. Using an online survey, this study analyses data from 579 participants to investigate age differences across f...
Article
Full-text available
Phishing emails continue to be a major cause of cybersecurity breaches despite the development of technical measures designed to thwart these attacks. Most phishing studies have investigated desktop email platforms, but the use of mobile devices for email exchanges has soared in recent years, especially amongst young adults. In this paper, we explo...
Article
Full-text available
A growing body of research has shown that people with dementia are using digital technologies to enhance lived experience. The COVID-19 pandemic has brought new digital opportunities and challenges and so provides a unique opportunity to understand how people with dementia have adapted to this new digital landscape. Semi-structured interviews were...
Article
Full-text available
New students face challenges when they make the transition from school to university. Existing digital technologies used during this transition can sometimes increase the stressors associated with change. In order to explore ways forward for technology design in this space, we developed a brochure of questionable concepts. The concepts were grounde...
Article
Full-text available
A Correction to this paper has been published: https://doi.org/10.1007/s00779-021-01601-9
Article
Full-text available
Older adults are increasingly a target for cyber-attacks; however, very little research has investigated how they feel about engaging in protective cyber-security behaviors. We developed and applied a novel card-sorting task to elicit how older adults feel about protective cyber-security behaviors and to identify the factors that impact their confi...
Article
Full-text available
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Be...
Article
A growing body of work explores the well-being of students. However, little work has addressed the experiences of student mothers, who must juggle the demands of study and childcare simultaneously. The rise of the student mother is taking place at a time when student learning and engagement as well as childcare has become highly digitised. Existing...
Article
Full-text available
Video games are hugely popular, generating more than twice the revenue of global movie and music industries combined. Whilst technically illegal and often carrying negative connotations, modding constitutes a moral grey area that is commonly accepted, often encouraged by proprietary owners and forum-centred gaming communities. Literature reflects a...
Preprint
A growing body of research has shown that people with dementia are using digital technologies to enhance lived experience. The COVID-19 pandemic has brought new digital opportunities and challenges and so provides a unique opportunity to understand how people with dementia have adapted to this new digital landscape. Semi-structured interviews were...
Article
Full-text available
People with dementia can experience a shrinkage of their social worlds, leading to a loss of independence, control, and reduced wellbeing. We used “the shrinking world” theory to examine how the COVID 19 pandemic has impacted the lives of people with early-middle stage dementia and what longer-term impacts may result. Interviews were conducted with...
Article
Full-text available
Social media can be used to both enhance and diminish students’ experiences of university and its influence is strong for lesbian, gay, bisexual, transgender, queer and other non-heterosexual and gender-diverse (LGBTQ+) people facing stigma and discrimination. Students may feel exposed when identifying as LGBTQ+, particularly while transitioning to...
Article
Full-text available
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, c...
Article
There are organizational and individual problems associated with the excessive accumulation of digital material, but little is known about why people hoard digital information in the workplace. We interviewed 20 participants from two large knowledge-intensive organizations (one academic, one commercial). These participants scored highly on the Digi...
Conference Paper
Full-text available
We aim to bring together a number of designers, researchers, and practitioners to share their experience of the influence of crime and legality on their work. Through these discussions, we aspire to highlight the existing knowledge base for discussions of crime within HCI, provide a space for sharing researcher's personal experiences in their work...
Article
Full-text available
Retirement is a major life transition, which leads to substantial changes across almost all aspects of day-to-day life. Although this transition has previously been seen as the normative marker for entry into older adulthood, its influence on later life has remained relatively unstudied in terms of technology use and cybersecurity behaviours. This...
Preprint
Full-text available
Employee voice and workplace democracy have a positive impact on employee wellbeing and the performance of organizations. In this paper, we conducted interviews with employees to identify facilitators and inhibitors for the voice within the workplace and a corresponding set of appropriate qualities: Civility, Validity, Safety and Egalitarianism. We...
Chapter
Full-text available
Book chapter on our H2020 cybersecurity project, CYBECO. Published in this book on European Research around cybersecurity: Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical...
Conference Paper
Full-text available
Public services are being increasingly scrutinised for their ability to be responsive and adaptive to their service users' needs. For service delivery in domestic violence, many aspire to include feedback from service users on their practice, to drive change in their organisation and performance. Current approaches for capturing and using feedback...
Conference Paper
Full-text available
Public commentary related to reality TV can be overwhelmed by thoughtless reactions and negative sentiments, which often problematically reinforce the cultural stereotyping typically employed in such media. We describe the design and month-long evaluation of a mobile "second-screening" application , Screenr, which uses co-voting and live textual ta...
Conference Paper
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to e...
Conference Paper
We describe the iterative design, development and learning process we undertook to produce Gabber, a digital platform that aims to support distributed capture of spoken interviews and discussions, and their qualitative analysis. Our aim is to reduce both expertise and cost barriers associated with existing technologies, making the process more incl...
Article
The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising...
Preprint
Full-text available
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to e...
Article
Full-text available
Mobility in older adults is associated with better quality of life. However, evidence suggests that older people spend less time out-of-home than younger adults. Traditional methods for assessing mobility have serious limitations. Wearable technologies provide the possibility of objectively assessing mobility over extended periods enabling better e...
Article
Full-text available
We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highl...
Conference Paper
Full-text available
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to comply with information security policies and engage in effective cyber prevention. Here we introduce and evaluate The Cybersurvival Task, a ranking task that highlights cybersecurity misconceptions amongst employees and th...
Article
Full-text available
Many social media platforms support the curation of personal digital data, and, more recently, the use of that data for review and reflection. We explored the process of reflection by asking users to create a meaningful ‘triptych’ of photographs drawn from their Facebook accounts. In a first study, we asked participants to manually trawl their own...
Conference Paper
Full-text available
Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudg...
Article
It is now easier than ever before to access digital health information. Individuals can monitor and record information about their own health, gather information online, and share personal experiences with those in a similar position. In fact, this shift towards peer-to-peer sharing sites represents a significant change in the way people think abou...
Preprint
BACKGROUND The internet continues to offer new forms of support for health decision making. Government, charity, and commercial websites increasingly offer a platform for shared personal health experiences, and these are just some of the opportunities that have arisen in a largely unregulated arena. Understanding how people trust and act on this in...
Article
Background The internet continues to offer new forms of support for health decision making. Government, charity, and commercial websites increasingly offer a platform for shared personal health experiences, and these are just some of the opportunities that have arisen in a largely unregulated arena. Understanding how people trust and act on this in...
Conference Paper
Full-text available
HCI draws on a variety of traditions but recently there have been calls to consolidate contributions around the problems researchers set out to solve. However, with this comes the assumption that problems are tractable and certain, rather than constructed and framed by researchers. We take as a case study a Tumblr community of teen shoplifters who...
Article
The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as “Heartbleed” in the first few days after this threat was exposed. The case study explored which professional groups appeared to lead the debate about Heartblee...
Article
Full-text available
Increasingly our digital traces are providing new opportunities for self-reflection. In particular, social media (SM) data can be used to support self-reflection, but to what extent is this affected by the form in which SM data is presented? Here, we present three studies where we work with individuals to transform or remediate their SM data into a...
Article
Social media (SM) are a core component of young people's lives and have been researched in relation to relationship building and maintenance. While SM are known to be useful in supporting life transitions for young people, we know little about the specific use patterns or activities associated with social adjustment during the specific transition t...
Conference Paper
Full-text available
Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges-more specifically social saliency nudges-that aim to highlight important information to the user when evaluating emails. We used Signal Detection Theory to assess the effects of both sender saliency (high...
Conference Paper
Technologies designed to support ageing can be deemed to be ageist in that they often exhibit a benevolent paternalism that tries to 'protect' older people. Often this involves gathering extensive data to monitor physical and cognitive decline at the expense of an individual's privacy, with an underlying, often implicit, assumption that older adult...
Conference Paper
Crime scripts are becoming an increasingly popular method for understanding crime by turning a crime from a static event into a process, whereby every phase of the crime is scripted. It is based on the work relating to cognitive scripts and rational-choice theory. With the exponential growth of cyber-crime, and more specifically cloud-crime, polici...
Conference Paper
Cybersecurity suffers from the problem of poor incident reporting. We explored message influences on incident reporting rate. Participants were presented with messages that differed in terms of (i) whether the problem was framed as a technical or a security issue and (ii) the perceived beneficiaries of making a report (benefit to the user, to other...
Conference Paper
Full-text available
HCI has multidisciplinary roots and has drawn from and contributed to different disciplines, including computer science, psychology, sociology, and medicine. There is a natural overlap between health and HCI researchers, given their joint focus on utilising technologies to better support people's health and wellbeing. However, the best digital heal...
Conference Paper
A number of interventions exist to support older adults in ageing well and these typically involve support for an active and sociable ageing process. We set out to examine the privacy implications of an intervention that would monitor mobility and share lifestyle and health data with a community of trusted others. We took a privacy-by-design approa...
Conference Paper
This paper considers how parents use the social media platform Instagram to facilitate the capture, curation and sharing of 'family snapshots'. Our work draws upon established cross-disciplinary literature relating to film photography and the composition of family albums in order to establish whether social media has changed the way parents visuall...
Chapter
While behavior change methods have become relatively commonplace in the health domain, they have only recently been applied to the cybersecurity field. In this chapter we review two fundamentally different approaches to behavior change in cybersecurity. First we explore “nudging” and behavioral interventions arising from the MINDSPACE framework. Se...
Article
Background Traditional health information has been based on facts and figures and not on patient experience (PEx). Websites featuring people’s accounts of their experiences of health and illness are popular as a source of information, support and much else. However, there are concerns that experiential information on the internet might have adverse...
Article
Full-text available
Access article is available for free (the article is open access!). Abstract: Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which mak...
Article
Full-text available
The article has open access status and freely available from the Springer website! Mobile devices offer a common platform for both leisure and work-related tasks, but this has resulted in a blurred boundary between home and work. In this paper, we explore the security implications of this blurred boundary, both for the worker and the employer. Mob...
Conference Paper
New technologies offer an opportunity to improve the wellbeing and independence of older adults, but many of the potential benefits, have not yet been realised. Some technologies suggest a lifestyle of constant monitoring, controlling and nudging - transformations that could be perceived as threatening. To better understand older adult perceptions...
Article
Full-text available
Reminiscence is used to support and create new social bonds and give meaning to life. Originally perceived as a preoccupation of the aged, we now recognize that reminiscence has value throughout the lifespan. Increasingly, social media can be used to both support and prompt reminiscence, with Facebook’s Lookback or Year in Review as recent examples...
Conference Paper
A number of digital platforms and services have recently emerged that allow users to create posthumous forms of communication, effectively arranging for the delivery of messages from "beyond the grave". Despite some evidence of interest and popularity of these services, little is known about how posthumous messages may impact the people who receive...
Conference Paper
Social media has begun to migrate from a predominantly text-based medium, through photography and into cinematography and edited video. Film is a vital medium through which we not only capture our world, but also seek to understand it. This workshop explores an emerging area of research within the CHI community that focuses on applying filmic techn...
Conference Paper
Full-text available
Surveillance, literally the 'close watching over' of a person or a group, was historically carried out to monitor adversaries and criminals. The digital era of sensor-rich, connected devices means that new forms of everyday surveillance -- what some are calling 'dataveillance' -- are emerging. These are changing the power structures that link peopl...
Article
Full-text available
Objective: Information exchange via Twitter and other forms of social media make public health communication more complex as citizens play an increasingly influential role in shaping acceptable or desired health behaviors. Taking the case of the 2009-2010 H1N1 pandemic, we explore in detail the dissemination of H1N1-related advice in the UK throug...
Article
Full-text available
New systems have been introduced that support the visualisation and sharing of personal digital data, but relatively little work has been done to establish how such systems support reminiscence and personal reflection. In this paper, we explore Intel’s Museum of Me, a tool that collates and presents Facebook data in the form of a virtual museum, by...
Article
Full-text available
The Internet supports the peer-to-peer healthcare and the promotion of shared patient narratives. Websites incorporating these narratives or personal accounts are known to offer support to carers of people with multiple sclerosis, but little is known about how carers make choices about what websites to visit and why. In total, 20 carers viewed a ra...
Conference Paper
Social media is a common place for people to post and share digital reflections of their life events, including major events such as getting married, having children, graduating, etc. Although the creation of such posts is straightforward, the identification of events on online media remains a challenge. Much research in recent years focused on ext...
Conference Paper
Full-text available
In addition to their popularity as personal devices, tablets, are becoming increasingly prevalent in work and public settings. In many of these application domains a supervisor user – such as the teacher in a classroom – oversees the function of one or more devices. Access to supervisory functions is typically controlled through the use of a passco...
Article
Full-text available
Identity technologies constitute one of the fastest growing areas for research and development, driven by both commercial and administrative imperatives. Crucially, they constitute the means by which we include or exclude individuals and groups in terms of access to goods, services or information -- yet few developments in this space embrace an inc...
Conference Paper
Full-text available
People make security choices on a daily basis without fully considering the security implications of those choices. In this paper we present a prototype application which promotes the choice of secure wireless network options, specifically when users are unfamiliar with the wireless networks available. The app was developed based on behavioural the...
Conference Paper
New social media has led to an explosion in personal digital data that encompasses both those expressions of self chosen by the individual as well as reflections of self provided by other, third parties. The resulting Digital Personhood (DP) data is complex and for many users it is too easy to become lost in the mire of digital data. This paper stu...
Conference Paper
Full-text available
Patients will often resist campaigns to promote healthier behavior but the digital health revolution allows the creation of a much more nuanced set of health messages that can be tailored to the patient or end user. In this study we explore the effects of patient preference on message acceptance and also explore what happens when messages are frame...
Article
Full-text available
This paper examines how London bus drivers have responded to performance monitoring via a telematics device called Drivewell. This device calculates a score based on various recordable driving-related events like abrupt braking or irregular turning actions. Our qualitative methodology incorporated semi-structured interviews and ethnographic fieldwo...
Conference Paper
Crowdsourcing has been widely leveraged for the tagging of video material; recently this has included the monitoring of surveillance video footage. However, the relative advantages and disadvantages of crowdsourcing watchers of surveillance video are not well articulated, nor has there been any significant work on the efficacy of different tools fo...