Showing 1 - 8 results of 8 for search 'Whitty, M', query time: 0.02s
Refine Results
-
1
Who's Making Security Risks Online ? by Whitty, M, Creese, S, Hodges, D
Published 2013Conference item -
2
-
3
Individual differences in cyber security behaviours: An examination of who’s sharing passwords by Whitty, M, Doodson, J, Creese, S, Hodges, D
Published 2015Journal article -
4
Image Choice to Represent the Self in Different Online Environments by Whitty, M, Doodson, J, Creese, S, Hodges, D
Published 2014Book -
5
Image Choice to represent the Self in Different Online Environments by Whitty, M, Doodson, J, Creese, S, Hodges, D
Published 2014Conference item -
6
Understanding insider threat: a framework for characterising attacks by Nurse, J, Buckley, O, Legg, P, Goldsmith, M, Creese, S, Wright, G, Whitty, M
Published 2014Conference item -
7
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches by Nurse, J, Legg, P, Buckley, O, Agrafiotis, I, Wright, G, Whitty, M, Upton, D, Goldsmith, M, Creese, S
Published 2014Conference item -
8
The SuperIdentity Stimulus Dataset − a Multi−Modal Biometric and Cybermetric Resource by Neil, G, Stevenage, S, Black, S, Meadows, H, Creese, S, Hodges, D, He, H, Pike, W, Love, O, Saxby, S, Knight, A, Hamlin, I, Schultz, J, Stanton−Fraser, D, Bevan, C, Emanuel, L, Whitty, M, Jamison−Powell, S
Published 2015Journal article