Browse by Warwick Author
|Up a level|
Number of items: 8.
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, David. (2015) Individual differences in cyber security behaviors : an examination of who is sharing passwords. Cyberpsychology, Behavior, and Social Networking, 18 (1). pp. 3-7. cyber.2014.0179. ISSN 2152-2715
Whitty, Monica T., Doodson, James, Creese, Sadie and Hodges, David. (2014) Image choice to represent the self in different online environments. Lecture Notes in Computer Science, 8531 . pp. 528-537. ISSN 0302-9743
Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, George, Whitty, Monica T., Upton, David, Goldsmith, Michael and Creese, Sadie. (2014) A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches. Lecture Notes in Computer Science, 8533 . pp. 270-281. ISSN 0302-9743
Jackson, Jennifer T. and Creese, Sadie. (2012) Virus propagation in heterogeneous bluetooth networks with human behaviors. IEEE Transactions on Dependable and Secure Computing, Vol.9 (No.6). pp. 930-943. ISSN 1545-5971
Papanikolaou, Nikolaos K., Creese, Sadie and Goldsmith, M.. (2012) Refinement checking for privacy policies. Science of Computer Programming, Volume 77 (Number 10-11). pp. 1198-1209. ISSN 0167-6423
Creese, Sadie and Lamberts, Koen (2009) Can cognitive science help us make online risk more tangible? IEEE Intelligent Systems, Vol.24 (No.6). pp. 32-36. ISSN 1541-1672
Creese, Sadie, Hopkins, Paul, Pearson, Siani and Shen, Yun (2009) Data protection-aware design for cloud services. In: 1st International Conference on Cloud Computing (CloudCom 2009), Beijing, People's Republic of China, December 01-04, 2009. Published in: Lecture Notes in Computer Science, Vol.5931 pp. 119-130.
Creese, Sadie and Goldsmith, M. (Michael) (2008) Requirements and concepts for information assurance and pervasive adaptation co-design. In: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Venice, Italy, Oct 20-24, 2008. Published in: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, Proceedings pp. 73-77.
This list was generated on Wed Dec 7 20:52:14 2016 GMT.