The Library
Browse by Warwick Author
Up a level |
Number of items: 12.
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, Duncan (2017) A picture tells a thousand words : what Facebook and Twitter images convey about our personality. Personality and Individual Differences, 133 . pp. 109-114. doi:10.1016/j.paid.2016.12.050 ISSN 0191-8869.
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, David (2015) Individual differences in cyber security behaviors : an examination of who is sharing passwords. Cyberpsychology, Behavior, and Social Networking, 18 (1). pp. 3-7. cyber.2014.0179. doi:10.1089/cyber.2014.0179 ISSN 2152-2715.
Nurse, Jason R. C., Buckley, Oliver, Legg, Philip A., Goldsmith, Michael, Creese, Sadie, Wright, Gordon R. T. and Whitty, Monica T. (2014) Understanding insider threat : a framework for characterising attacks. In: IEEE Security & Privacy Workshop, San Jose, CA, 17-18 May 2014. Published in: 2014 IEEE Security and Privacy Workshops (SPW) pp. 214-228. ISBN 9781479951048. doi:10.1109/SPW.2014.38
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, David (2014) Image choice to represent the self in different online environments. Lecture Notes in Computer Science, 8531 . pp. 528-537. doi:10.1007/978-3-319-07632-4_50 ISSN 0302-9743.
Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, George, Whitty, Monica T., Upton, David, Goldsmith, Michael and Creese, Sadie (2014) A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches. Lecture Notes in Computer Science, 8533 . pp. 270-281. doi:10.1007/978-3-319-07620-1_24 ISSN 0302-9743.
Creese, Sadie, Hodges, Duncan, Jamison-Powell, Sue and Whitty, Monica T. (2013) Relationships between password choices, perceptions of risk and security expertise. Lecture Notes in Computer Science, 8030 (8030). pp. 80-89. doi:10.1007/978-3-642-39345-7_9 ISSN 0302-9743.
Jackson, Jennifer T. and Creese, Sadie (2012) Virus propagation in heterogeneous bluetooth networks with human behaviors. IEEE Transactions on Dependable and Secure Computing, Vol.9 (No.6). pp. 930-943. doi:10.1109/TDSC.2012.72 ISSN 1545-5971.
Papanikolaou, Nikolaos K., Creese, Sadie and Goldsmith, M. (2012) Refinement checking for privacy policies. Science of Computer Programming, Volume 77 (Number 10-11). pp. 1198-1209. doi:10.1016/j.scico.2011.07.009 ISSN 0167-6423.
Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, M. and Papanikolaou, Nick (2011) Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. Privacy and Identity Management for Life, Vol. 352 . pp. 271-282. doi:10.1007/978-3-642-20769-3_22 ISSN 1868-4238.
Creese, Sadie and Lamberts, Koen (2009) Can cognitive science help us make online risk more tangible? IEEE Intelligent Systems, Vol.24 (No.6). pp. 32-36. ISSN 1541-1672 doi:10.1109/MIS.2009.111
Creese, Sadie, Hopkins, Paul, Pearson, Siani and Shen, Yun (2009) Data protection-aware design for cloud services. In: 1st International Conference on Cloud Computing (CloudCom 2009), Beijing, People's Republic of China, December 01-04, 2009. Published in: Lecture Notes in Computer Science, Vol.5931 pp. 119-130. ISBN 978-3-642-10664-4. doi:10.1007/978-3-642-10665-1_11 ISSN 0302-9743.
Creese, Sadie and Goldsmith, M. (Michael) (2008) Requirements and concepts for information assurance and pervasive adaptation co-design. In: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Venice, Italy, Oct 20-24, 2008. Published in: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, Proceedings pp. 73-77. ISBN 978-1-4244-3468-8. doi:10.1109/SASOW.2008.68
This list was generated on Thu Apr 25 00:56:57 2024 BST.