Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors JM Blythe, L Coventry, L Little Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015 | 87 | 2015 |
Using behavioural insights to improve the public’s use of cyber security best practices L Coventry, P Briggs, J Blythe, M Tran https://www.gov.uk/government/uploads/system/uploads/attachment_data/file …, 2014 | 57 | 2014 |
Costly but effective: Comparing the factors that influence employee anti-malware behaviours JM Blythe, L Coventry Computers in Human Behavior 87, 87-97, 2018 | 44 | 2018 |
The Consumer Security Index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices JM Blythe, SD Johnson Living in the Internet of Things: Cybersecurity of the IoT, 2018 | 36 | 2018 |
Cyber security in the workplace: Understanding and promoting behaviour change JM Blythe CHItaly 2013, 1-10, 2013 | 36 | 2013 |
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? JM Blythe, N Sombatruang, SD Johnson Journal of Cybersecurity 5 (1), tyz005, 2019 | 32 | 2019 |
Personality and social framing in privacy decision-making: A study on cookie acceptance LM Coventry, D Jeske, JM Blythe, J Turland, P Briggs Frontiers in psychology 7, 1341, 2016 | 32 | 2016 |
The impact of IoT security labelling on consumer product choice and willingness to pay SD Johnson, JM Blythe, M Manning, GTW Wong PloS one 15 (1), e0227800, 2020 | 28 | 2020 |
A systematic review of crime facilitated by the consumer Internet of Things JM Blythe, SD Johnson Security Journal 34 (1), 97-125, 2021 | 22 | 2021 |
A Revised Model of Trust in Internet-Based Health Information and Advice: Cross-Sectional Questionnaire Study E Sillence, J Blythe, P Briggs, M Moss Journal of Medical Internet Research 21 (11), 2019 | 19 | 2019 |
What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices JM Blythe, SD Johnson, M Manning Crime Science 9 (1), 1-9, 2020 | 18 | 2020 |
Cyber security games: a new line of risk JM Blythe, L Coventry International Conference on Entertainment Computing, 600-603, 2012 | 12 | 2012 |
Summary literature review of industry recommendations and international developments on IoT security L Tanczer, J Blythe, F Yahya, I Brass, M Elsden, J Blackstock Report for the Department for Digital, Culture, Media and Sport (https://www …, 2018 | 11 | 2018 |
Rapid evidence assessment on labelling schemes and implications for consumer IoT security J Blythe, S Johnson Report for the Department for Digital, Culture, Media and Sport (https …, 2018 | 9 | 2018 |
Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours JM Blythe, S Michie, J Watson, CE Lefevre Frontiers in Public Health, 2017 | 8 | 2017 |
Remote working pre-and post-COVID-19: an analysis of new threats and risks to security and privacy JRC Nurse, N Williams, E Collins, N Panteli, J Blythe, B Koppelman International Conference on Human-Computer Interaction, 583-590, 2021 | 5 | 2021 |
Lynne Coventry, and Linda Little. Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors JM Blythe Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 103-122, 2015 | 5 | 2015 |
Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours JM Blythe PQDT-Global, 2015 | 5 | 2015 |
Cyberhygiene Insight Report JM Blythe, C Lefevre https://iotuk.org.uk/wp-content/uploads/2018/01/PETRAS-IoTUK-Cyberhygiene …, 2017 | 4 | 2017 |
The role of trust in eHealth websites: The enduring power of impartiality JM Blythe, E Sillence, P Briggs Frontiers in Public Health. Conference Abstract: 3rd UCL Centre for …, 2017 | 3 | 2017 |