
The Library
Browse by Warwick Author
![]() | Up a level |
Number of items: 12.
2017
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, Duncan (2017) A picture tells a thousand words : what Facebook and Twitter images convey about our personality. Personality and Individual Differences, 133 . pp. 109-114. doi:10.1016/j.paid.2016.12.050
2015
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, David (2015) Individual differences in cyber security behaviors : an examination of who is sharing passwords. Cyberpsychology, Behavior, and Social Networking, 18 (1). pp. 3-7. cyber.2014.0179. doi:10.1089/cyber.2014.0179
2014
Nurse, Jason R. C., Buckley, Oliver, Legg, Philip A., Goldsmith, Michael, Creese, Sadie, Wright, Gordon R. T. and Whitty, Monica T. (2014) Understanding insider threat : a framework for characterising attacks. In: IEEE Security & Privacy Workshop, San Jose, CA, 17-18 May 2014. Published in: 2014 IEEE Security and Privacy Workshops (SPW) pp. 214-228. ISBN 9781479951048. doi:10.1109/SPW.2014.38
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, David (2014) Image choice to represent the self in different online environments. Lecture Notes in Computer Science, 8531 . pp. 528-537. doi:10.1007/978-3-319-07632-4_50
Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, George, Whitty, Monica T., Upton, David, Goldsmith, Michael and Creese, Sadie (2014) A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches. Lecture Notes in Computer Science, 8533 . pp. 270-281. doi:10.1007/978-3-319-07620-1_24
2013
Creese, Sadie, Hodges, Duncan, Jamison-Powell, Sue and Whitty, Monica T. (2013) Relationships between password choices, perceptions of risk and security expertise. Lecture Notes in Computer Science, 8030 (8030). pp. 80-89. doi:10.1007/978-3-642-39345-7_9
2012
Jackson, Jennifer T. and Creese, Sadie (2012) Virus propagation in heterogeneous bluetooth networks with human behaviors. IEEE Transactions on Dependable and Secure Computing, Vol.9 (No.6). pp. 930-943. doi:10.1109/TDSC.2012.72
Papanikolaou, Nikolaos K., Creese, Sadie and Goldsmith, M. (2012) Refinement checking for privacy policies. Science of Computer Programming, Volume 77 (Number 10-11). pp. 1198-1209. doi:10.1016/j.scico.2011.07.009
2011
Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, M. and Papanikolaou, Nick (2011) Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. Privacy and Identity Management for Life, Vol. 352 . pp. 271-282. doi:10.1007/978-3-642-20769-3_22
2009
Creese, Sadie and Lamberts, Koen (2009) Can cognitive science help us make online risk more tangible? IEEE Intelligent Systems, Vol.24 (No.6). pp. 32-36. doi:10.1109/MIS.2009.111
Creese, Sadie, Hopkins, Paul, Pearson, Siani and Shen, Yun (2009) Data protection-aware design for cloud services. In: 1st International Conference on Cloud Computing (CloudCom 2009), Beijing, People's Republic of China, December 01-04, 2009. Published in: Lecture Notes in Computer Science, Vol.5931 pp. 119-130. ISBN 978-3-642-10664-4. ISSN 0302-9743. doi:10.1007/978-3-642-10665-1_11
2008
Creese, Sadie and Goldsmith, M. (Michael) (2008) Requirements and concepts for information assurance and pervasive adaptation co-design. In: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Venice, Italy, Oct 20-24, 2008. Published in: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, Proceedings pp. 73-77. ISBN 978-1-4244-3468-8. doi:10.1109/SASOW.2008.68
This list was generated on Fri Dec 6 12:06:13 2019 GMT.