Home > Research > Browse

Results for privacy

Publications & Outputs

  1. Building trust in digital policing: a scoping review of community policing apps

    Elphick, C., Philpot, R., Zhang, M., Stuart, A., Walkington, Z., Frumkin, L. A., Pike, G., Gardner, K., Lacey, M., Levine, M., Price, B., Bandara, A. & Nuseibeh, B., 30/09/2021, In: Police Practice and Research. 22, 5, p. 1469-1491 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Boundaries Between Research Ethics and Ethical Research Use in Artificial Intelligence Health Research

    Samuel, G., Chubb, J. & Derrick, G., 1/07/2021, In: Journal of Empirical Research on Human Research Ethics. 16, 3, p. 325-337 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Consumers and Artificial Intelligence: An Experiential Perspective

    Puntoni, S., Reczek, R. W., Giesler, M. & Botti, S., 1/01/2021, In: Journal of Marketing. 85, 1, p. 131-151 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Living Room of the Future: PlayUk Skopje

    Gradinar, A. I. & Coulton, P., 2/11/2018

    Research output: Exhibits, objects and web-based outputsExhibition

  6. The Magaluf Girl: a public sex scandal and the digital class relations of social contagion

    Wood, H., 4/07/2018, In: Feminist Media Studies. 18, 4, p. 626-642 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. From “a fair game” to “a form of covert research”: Research Ethics Committee Members differing notions of consent and potential risk to participants within social media research.

    Hibbin, R. A., Samuel, S. & Derrick, G. E., 1/04/2018, In: Journal of Empirical Research on Human Research Ethics. 13, 2, p. 149-159 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Beyond ‘nothing to hide’: When identity is key to privacy threat under surveillance

    Stuart, A. & Levine, M., 1/10/2017, In: European Journal of Social Psychology. 47, 6, p. 694-707 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. (Un)ethical practices: intimacy and Internet in the media coverage of the Ashley Madison hack

    Gauthier, M., 26/04/2017, (E-pub ahead of print) In: Feminist Media Studies. 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Privacy-Protected Facial Biometric Verification Using Fuzzy Forest Learning

    Jiang, R., Bouridane, A., Crookes, D., Celebi, M. E. & Wei, H-L., 1/08/2016, In: IEEE Transactions on Fuzzy Systems. 24, 4, p. 779-790 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

More results »