Stephen Hinde

459 total citations
47 papers, 258 citations indexed

About

Stephen Hinde is a scholar working on Information Systems, Computer Vision and Pattern Recognition and Sociology and Political Science. According to data from OpenAlex, Stephen Hinde has authored 47 papers receiving a total of 258 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Information Systems, 5 papers in Computer Vision and Pattern Recognition and 4 papers in Sociology and Political Science. Recurrent topics in Stephen Hinde's work include Cybercrime and Law Enforcement Studies (7 papers), Spam and Phishing Detection (4 papers) and Visual Attention and Saliency Detection (4 papers). Stephen Hinde is often cited by papers focused on Cybercrime and Law Enforcement Studies (7 papers), Spam and Phishing Detection (4 papers) and Visual Attention and Saliency Detection (4 papers). Stephen Hinde collaborates with scholars based in United Kingdom and United States. Stephen Hinde's co-authors include Tom Trościanko, Tim S. Meese, Iain D. Gilchrist, Tim J. Smith, David Bull, Paul Tappenden, Alison Scope, S Harnan, Mark Sculpher and Sophie Whyte and has published in prestigious journals such as Vision Research, Perception and Computers & Security.

In The Last Decade

Stephen Hinde

44 papers receiving 218 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Stephen Hinde United Kingdom 10 126 73 39 37 35 47 258
Warren Sack United States 10 137 1.1× 70 1.0× 25 0.6× 95 2.6× 44 1.3× 21 381
Ilona Posner Canada 6 108 0.9× 43 0.6× 37 0.9× 32 0.9× 18 0.5× 10 380
Brian Starr United States 8 82 0.7× 73 1.0× 41 1.1× 63 1.7× 33 0.9× 8 272
Michael Khoo United States 10 135 1.1× 49 0.7× 15 0.4× 42 1.1× 11 0.3× 37 303
Geraldo Xexéo Brazil 9 80 0.6× 53 0.7× 20 0.5× 78 2.1× 23 0.7× 100 298
Pinata Winoto China 10 201 1.6× 47 0.6× 34 0.9× 114 3.1× 64 1.8× 45 370
Tom Brinck United States 8 134 1.1× 61 0.8× 65 1.7× 72 1.9× 36 1.0× 18 382
Mark P. Graus Netherlands 8 162 1.3× 79 1.1× 8 0.2× 68 1.8× 49 1.4× 13 295
Bruno Gadelha Brazil 9 129 1.0× 54 0.7× 21 0.5× 35 0.9× 16 0.5× 94 275
Michelle Bachler United Kingdom 10 128 1.0× 39 0.5× 45 1.2× 89 2.4× 29 0.8× 22 307

Countries citing papers authored by Stephen Hinde

Since Specialization
Citations

This map shows the geographic impact of Stephen Hinde's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Stephen Hinde with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Stephen Hinde more than expected).

Fields of papers citing papers by Stephen Hinde

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Stephen Hinde. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Stephen Hinde. The network helps show where Stephen Hinde may publish in the future.

Co-authorship network of co-authors of Stephen Hinde

This figure shows the co-authorship network connecting the top 25 collaborators of Stephen Hinde. A scholar is included among the top collaborators of Stephen Hinde based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Stephen Hinde. Stephen Hinde is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Whyte, Sophie, S Harnan, Alison Scope, et al.. (2024). Early awareness interventions for cancer: colorectal cancer. White Rose Research Online (University of Leeds, The University of Sheffield, University of York).
2.
Hinde, Stephen, et al.. (2022). On the Immersive Properties of High Dynamic Range Video. ACM Transactions on Applied Perception. 19(2). 1–15. 5 indexed citations
3.
Hinde, Stephen, Tim J. Smith, & Iain D. Gilchrist. (2018). Does narrative drive dynamic attention to a prolonged stimulus?. Cognitive Research Principles and Implications. 3(1). 45–45. 11 indexed citations
4.
Hinde, Stephen, Tim J. Smith, & Iain D. Gilchrist. (2017). In search of oculomotor capture during film viewing: Implications for the balance of top-down and bottom-up control in the saccadic system. Vision Research. 134. 7–17. 9 indexed citations
5.
Trościanko, Tom, Tim S. Meese, & Stephen Hinde. (2012). Perception While Watching Movies: Effects of Physical Screen Size and Scene Type. i-Perception. 3(7). 414–425. 34 indexed citations
6.
Hinde, Stephen, et al.. (2011). What determines presence when viewing a movie. Perception. 40. 21–21. 1 indexed citations
7.
Trościanko, Tom & Stephen Hinde. (2011). Presence While Watching Movies. i-Perception. 2(4). 216–216. 1 indexed citations
8.
Hinde, Stephen. (2005). From incidents to disasters. Computer Fraud & Security. 2005(4). 17–19. 2 indexed citations
9.
Hinde, Stephen. (2004). Identity theft: the fight. Computer Fraud & Security. 2004(9). 6–7. 2 indexed citations
10.
Hinde, Stephen. (2004). “All you need to be a phisherman is patience and a worm”. Computer Fraud & Security. 2004(3). 4–6. 6 indexed citations
11.
Hinde, Stephen. (2003). FeaturesComputer security: Mapping the future. Computers & Security. 22(8). 1 indexed citations
12.
Hinde, Stephen. (2003). Privacy legislation: a comparison of the US and European approaches. Computers & Security. 22(5). 378–387. 10 indexed citations
13.
Hinde, Stephen. (2003). Spam: the evolution of a nuisance. Computers & Security. 22(6). 474–478. 19 indexed citations
14.
Hinde, Stephen. (2002). Compsec 2002: the complete security circle. Computers & Security. 21(8). 689–693. 1 indexed citations
15.
Hinde, Stephen. (2001). Cyberthreats: Perceptions, Reality and Protection. Computers & Security. 20(5). 364–371. 1 indexed citations
16.
Hinde, Stephen. (2001). If you can meet with triumph and disaster and treat those two impostors just the same…. Computers & Security. 20(8). 657–666. 1 indexed citations
17.
Hinde, Stephen. (2000). Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. Computers & Security. 19(4). 312–320. 5 indexed citations
18.
Hinde, Stephen. (1999). Are you in control?. Computers & Security. 18(3). 199–203. 1 indexed citations
19.
Hinde, Stephen. (1996). Protecting business information. Computer Audit Update. 1996(12). 2–5. 2 indexed citations
20.
Hinde, Stephen. (1995). Safety critical software. Computer Audit Update. 1995(2). 1–2. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026