Home > Research > Browse

Results for privacy

Publications & Outputs

  1. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In : Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal article

  2. Living Room of the Future: PlayUk Skopje

    Gradinar, A. I. & Coulton, P., 2/11/2018

    Research output: Exhibits, objects and web-based outputsExhibition

  3. The Magaluf Girl: a public sex scandal and the digital class relations of social contagion

    Wood, H., 4/07/2018, In : Feminist Media Studies. 18, 4, p. 626-642 17 p.

    Research output: Contribution to journalJournal article

  4. From “a fair game” to “a form of covert research”: Research Ethics Committee Members differing notions of consent and potential risk to participants within social media research.

    Hibbin, R. A., Samuel, S. & Derrick, G. E., 1/04/2018, In : Journal of Empirical Research on Human Research Ethics. 13, 2, p. 149-159 11 p.

    Research output: Contribution to journalJournal article

  5. Beyond ‘nothing to hide’: When identity is key to privacy threat under surveillance

    Stuart, A. & Levine, M., 1/10/2017, In : European Journal of Social Psychology. 47, 6, p. 694-707 14 p.

    Research output: Contribution to journalJournal article

  6. (Un)ethical practices: intimacy and Internet in the media coverage of the Ashley Madison hack

    Gauthier, M., 26/04/2017, In : Feminist Media Studies. 16 p.

    Research output: Contribution to journalJournal article

  7. Privacy-Protected Facial Biometric Verification Using Fuzzy Forest Learning

    Jiang, R., Bouridane, A., Crookes, D., Celebi, M. E. & Wei, H-L., 1/08/2016, In : IEEE Transactions on Fuzzy Systems. 24, 4, p. 779-790 12 p.

    Research output: Contribution to journalJournal article

  8. D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In : IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to journalJournal article

  10. Using game design as a frame for evaluating experiences in hybrid digital/physical spaces

    Salinas, L., Coulton, P. & Dunn, N. S., 16/03/2016, In : Architecture and Culture. 4, 1, p. 115-135 21 p.

    Research output: Contribution to journalJournal article

  11. 'I make the rules on my Wall’: privacy and identity management practices on Facebook

    Georgalou, M., 02/2016, In : Discourse and Communication. 10, 1, p. 40-64 25 p.

    Research output: Contribution to journalJournal article

More results »