SuperIdentity: Fusion of Identity across Real and Cyber Domains

S. Creese , S.V. Stevenage , R.M. Guest , S.M. Black
University of Texas, Austin, TX, United States(US).

11
2012
Coping with offline prohibited actions in gamespace: a psychological approach to moral well-being in gamers

Monica Whitty , Garry Young
The International Journal of Ethics 8 ( 3)

2012
Possible selves: exploring the utility of a narrative approach

Monica Whitty
Identity: An International Journal of Theory and Research 213 -230

9
2002
1
2017
Summary Final Report: ESRC Scoping Review of ‘Ways of Being in the Digital Age’

Bridgette Wessels , Claire Taylor , Simeon Yates , Stephen Crone
Ways of Being in a Digital Age

2017
Automatically Dismantling Online Dating Fraud

Guillermo Suarez-Tangil , Monica Whitty , Gianluca Stringhini , Awais Rashid
arXiv: Cryptography and Security

41
2019
9
2011
Technology and Hurt in Close Relationships

Monica Whitty
Feeling Hurt in Close Relationships 400 -416

1
2009
Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI

Rosanna Bellini , Nicola Dell , Monica Whitty , Debasis Bhattacharya
human factors in computing systems 1 -8

1
2020
Understanding Insider Threat: A Framework for Characterising Attacks

Jason RC Nurse , Oliver Buckley , Philip A Legg , Michael Goldsmith
ieee symposium on security and privacy 214 -228

110
2014
49
2002
A Critical Reflection on the Threat from Human Insiders Its Nature, Industry Perceptions, and Detection Approaches

Ioannis Agrafiotis , Oliver Buckley , Sadie Creese , Michael Goldsmith
international conference on human-computer interaction 270 -281

18
2014
Perceived Criminality of Cyber-Harassing Behaviors among Undergraduate Students in the United Kingdom

Catherine Millman , Monica Whitty , Belinda Winder , Mark D. Griffiths
International Journal of Cyber Behavior, Psychology and Learning archive 2 ( 4) 49 -59

1
2012
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

Monica Whitty , James Doodson , Sadie Creese , Duncan Hodges
Cyberpsychology, Behavior, and Social Networking 18 ( 1) 3 -7

35
2015
Online romance scams and victimhood

Tom Sorell , Monica Whitty
Security Journal 32 ( 3) 342 -361

35
2019
317
2001
Watched in the workplace

Adam Joinson , Monica Whitty
Infosecurity 5 ( 1) 38 -40

6
2008