Home > Research > Security Lancaster (Sociology) > Publications & Outputs
View graph of relations

Security Lancaster (Sociology)

  1. Published

    Unpacking tacit knowledge for requirements engineering

    Gervasi, V., Gacitua, R., Rouncefield, M., Sawyer, P., Kof, L., Li, M., Piwek, P., De Roeck, A., Willis, A., Hui, Y. & Nuseibeh, B., 2013, Managing requirements knowledge. Maalej, W. & Thurimella, A. K. (eds.). Berlin: Springer, p. 23-47 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  2. Published

    Understanding the Role of Healthy Eating and Fitness Mobile Apps in the Formation of Maladaptive Eating and Exercise Behaviors in Young People

    Honary, M., Bell, B. T., Clinch, S., Wild, S. & McNaney, R., 18/06/2019, In: JMIR mHealth and uHealth. 7, 6, 19 p., e14239.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Understanding the ecological validity of relying practice as a basis for risk identification

    Anderson, T., Busby, J. & Rouncefield, M., 1/07/2020, In: Risk Analysis. 40, 7, p. 1383-1398 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Understanding criminal careers in organised crime

    Francis, B., Humphreys, L., Kirby, S. & Soothill, K., 7/10/2013, London: Home Office. 120 p. (Crime research and analysis; no. 74)

    Research output: Book/Report/ProceedingsCommissioned report

  5. Published

    Turning Philosophy with a Speculative Lathe: Object Oriented Ontology, Carpentry, and Design Fiction

    Lindley, J. G., Coulton, P. & Akmal, H., 25/06/2018, Proceedings of the Design Research Society Conference 2018. Storni, C., Leahy, K., McMahon, M., Lloyd, P. & Bohemia, E. (eds.). Limerick: Design Research Society, Vol. 1. p. 229-243 15 p. (Design Research Society Conference Proceedings 2018; vol. 1).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Trustworthy by design

    Knowles, B., Harding, M., Blair, L., Davies, N., Hannon, J., Rouncefield, M. & Walden, J., 2014, CSCW '14 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. New York: ACM, p. 1060-1071 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Transitional criminal justice at the ECtHR: implications for the universality of human rights

    Sweeney, J., 2012, Baltic yearbook of international law. Leiden: Martinus Nijhoff, Vol. 12. p. 183-210 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  8. Published

    Towards a master narrative for trust in autonomous systems: Trust as a distributed concern

    Lindley, J., Green, D. P., McGarry, G., Pilling, F., Coulton, P. & Crabtree, A., 30/04/2023, In: Journal of Responsible Technology. 13

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Touchless interaction in surgery

    O'Hara, K., Gonzalez, G., Sellen, A., Penney, G., Varnavas, A., Mentis, H., Criminisi, A., Corish, R., Rouncefield, M., Dastur, N. & Carrell, T., 01/2014, In: Communications of the ACM. 57, 1, p. 70-77 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...31 Next

Back to top