Follow
Dr. John M Blythe
Dr. John M Blythe
Director of Cyber Workforce Psychology, Immersive Labs
Verified email at ucl.ac.uk
Title
Cited by
Cited by
Year
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors
JM Blythe, L Coventry, L Little
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015
872015
Using behavioural insights to improve the public’s use of cyber security best practices
L Coventry, P Briggs, J Blythe, M Tran
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file …, 2014
572014
Costly but effective: Comparing the factors that influence employee anti-malware behaviours
JM Blythe, L Coventry
Computers in Human Behavior 87, 87-97, 2018
442018
The Consumer Security Index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices
JM Blythe, SD Johnson
Living in the Internet of Things: Cybersecurity of the IoT, 2018
362018
Cyber security in the workplace: Understanding and promoting behaviour change
JM Blythe
CHItaly 2013, 1-10, 2013
362013
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
JM Blythe, N Sombatruang, SD Johnson
Journal of Cybersecurity 5 (1), tyz005, 2019
322019
Personality and social framing in privacy decision-making: A study on cookie acceptance
LM Coventry, D Jeske, JM Blythe, J Turland, P Briggs
Frontiers in psychology 7, 1341, 2016
322016
The impact of IoT security labelling on consumer product choice and willingness to pay
SD Johnson, JM Blythe, M Manning, GTW Wong
PloS one 15 (1), e0227800, 2020
282020
A systematic review of crime facilitated by the consumer Internet of Things
JM Blythe, SD Johnson
Security Journal 34 (1), 97-125, 2021
222021
A Revised Model of Trust in Internet-Based Health Information and Advice: Cross-Sectional Questionnaire Study
E Sillence, J Blythe, P Briggs, M Moss
Journal of Medical Internet Research 21 (11), 2019
192019
What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices
JM Blythe, SD Johnson, M Manning
Crime Science 9 (1), 1-9, 2020
182020
Cyber security games: a new line of risk
JM Blythe, L Coventry
International Conference on Entertainment Computing, 600-603, 2012
122012
Summary literature review of industry recommendations and international developments on IoT security
L Tanczer, J Blythe, F Yahya, I Brass, M Elsden, J Blackstock
Report for the Department for Digital, Culture, Media and Sport (https://www …, 2018
112018
Rapid evidence assessment on labelling schemes and implications for consumer IoT security
J Blythe, S Johnson
Report for the Department for Digital, Culture, Media and Sport (https …, 2018
92018
Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours
JM Blythe, S Michie, J Watson, CE Lefevre
Frontiers in Public Health, 2017
82017
Remote working pre-and post-COVID-19: an analysis of new threats and risks to security and privacy
JRC Nurse, N Williams, E Collins, N Panteli, J Blythe, B Koppelman
International Conference on Human-Computer Interaction, 583-590, 2021
52021
Lynne Coventry, and Linda Little. Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors
JM Blythe
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 103-122, 2015
52015
Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours
JM Blythe
PQDT-Global, 2015
52015
Cyberhygiene Insight Report
JM Blythe, C Lefevre
https://iotuk.org.uk/wp-content/uploads/2018/01/PETRAS-IoTUK-Cyberhygiene …, 2017
42017
The role of trust in eHealth websites: The enduring power of impartiality
JM Blythe, E Sillence, P Briggs
Frontiers in Public Health. Conference Abstract: 3rd UCL Centre for …, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20