Home > Research > Cyber Security Research Centre (Psychology) > Publications & Outputs
View graph of relations

Cyber Security Research Centre (Psychology)

  1. 2020
  2. Forthcoming

    Security but not for security’s sake: The impact of social considerations on app developers’ choices

    Rauf, I., van der Linden, D., Levine, M., Towse, J., Nuseibeh, B. & Rashid, A., 27/02/2020, (Accepted/In press) 42nd International Conference on Software Engineering Workshops (ICSEW’20). New York: Association for Computing Machinery (ACM)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. Forthcoming

    Schrödinger’s Security: Opening the Box on App Developers’ Security Rationale

    van der Linden, D., Anthonysamy, P., Nuseibeh, B., Tun, T. T., Petre, M., Levine, M., Towse, J. & Rashid, A., 8/01/2020, (Accepted/In press) 42nd International Conference on Software Engineering (ICSE ’20), May 23–29, 2020, Seoul, Republic of Korea. New York: Association for Computing Machinery (ACM)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. 2019
  5. Published

    Do smartphone usage scales predict behavior?

    Ellis, D., Davidson, B., Shaw, H. & Geyer, K., 1/10/2019, In : International Journal of Human-Computer Studies. 130, p. 86-92 7 p.

    Research output: Contribution to journalJournal article

  6. Published

    Whose tweets? The rhetorical functions of social media use in developing the Black Lives Matter movement

    Wilkins, D. J., Livingstone, A. G. & Levine, M., 1/10/2019, In : British Journal of Social Psychology. 58, 4, p. 786-805 20 p.

    Research output: Contribution to journalJournal article

  7. Published

    Unexpected questions in deception detection interviews: Does question order matter?

    Warmelink, L. N., Subramanian, A., Tkacheva, D. & McLatchie, N. M., 1/09/2019, In : Legal and Criminological Psychology. 24, 2, p. 258-272 15 p.

    Research output: Contribution to journalJournal article

  8. Published

    Charting the trajectory of forgetting: Insights from a working memory period paradigm

    Towse, J. N., Hitch, G. & Horton, N. J., 15/08/2019, In : Memory and Cognition. 47, 6, p. 1063-1075 13 p.

    Research output: Contribution to journalJournal article

  9. Published

    Are smartphones really that bad? Improving the psychological measurement of technology-related behaviors

    Ellis, D. A., 1/08/2019, In : Computers in Human Behavior. 97, p. 60-66 7 p.

    Research output: Contribution to journalJournal article

  10. Published

    Should smartphones be banned for children or does cyberpsychology have a bigger problem?

    Ellis, D. A., Davidson, B. & Kaye, L., 10/07/2019, In : Cyberpsychology, Behavior, and Social Networking. 27, 7, p. 508-509 2 p.

    Research output: Contribution to journalLetter

  11. Published

    Capturing violence in the night-time economy: A review of established and emerging methodologies

    Philpot, R., Liebst, L. S., Møller, K. K., Lindegaard, M. R. & Levine, M., 1/05/2019, In : Aggression and Violent Behavior. 46, p. 56-65 10 p.

    Research output: Contribution to journalJournal article

  12. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In : PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to journalJournal article

Previous 1 2 3 Next

Back to top