Home > Research > Browse

Results for privacy

Publications & Outputs

  1. Building trust in digital policing: a scoping review of community policing apps

    Elphick, C., Philpot, R., Zhang, M., Stuart, A., Walkington, Z., Frumkin, L. A., Pike, G., Gardner, K., Lacey, M., Levine, M., Price, B., Bandara, A. & Nuseibeh, B., 7/02/2021, In: Police Practice and Research.

    Research output: Contribution to journalJournal articlepeer-review

  2. Consumers and Artificial Intelligence: An Experiential Perspective

    Puntoni, S., Reczek, R. W., Giesler, M. & Botti, S., 1/01/2021, In: Journal of Marketing. 85, 1, p. 131-151 21 p.

    Research output: Contribution to journalJournal articlepeer-review

  3. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal articlepeer-review

  4. Living Room of the Future: PlayUk Skopje

    Gradinar, A. I. & Coulton, P., 2/11/2018

    Research output: Exhibits, objects and web-based outputsExhibition

  5. The Magaluf Girl: a public sex scandal and the digital class relations of social contagion

    Wood, H., 4/07/2018, In: Feminist Media Studies. 18, 4, p. 626-642 17 p.

    Research output: Contribution to journalJournal articlepeer-review

  6. From “a fair game” to “a form of covert research”: Research Ethics Committee Members differing notions of consent and potential risk to participants within social media research.

    Hibbin, R. A., Samuel, S. & Derrick, G. E., 1/04/2018, In: Journal of Empirical Research on Human Research Ethics. 13, 2, p. 149-159 11 p.

    Research output: Contribution to journalJournal articlepeer-review

  7. Beyond ‘nothing to hide’: When identity is key to privacy threat under surveillance

    Stuart, A. & Levine, M., 1/10/2017, In: European Journal of Social Psychology. 47, 6, p. 694-707 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  8. (Un)ethical practices: intimacy and Internet in the media coverage of the Ashley Madison hack

    Gauthier, M., 26/04/2017, In: Feminist Media Studies. 16 p.

    Research output: Contribution to journalJournal articlepeer-review

  9. Privacy-Protected Facial Biometric Verification Using Fuzzy Forest Learning

    Jiang, R., Bouridane, A., Crookes, D., Celebi, M. E. & Wei, H-L., 1/08/2016, In: IEEE Transactions on Fuzzy Systems. 24, 4, p. 779-790 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  10. D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to journalJournal articlepeer-review

More results »