Dr. John M Blythe
Dr. John M Blythe
Head of Behavioural Science, CybSafe
Verified email at ucl.ac.uk
Title
Cited by
Cited by
Year
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors
JM Blythe, L Coventry, L Little
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015
742015
Using behavioural insights to improve the public’s use of cyber security best practices
L Coventry, P Briggs, J Blythe, M Tran
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file …, 2014
412014
Cyber security in the workplace: Understanding and promoting behaviour change
JM Blythe
CHItaly 2013, 1-10, 2013
342013
Costly but effective: Comparing the factors that influence employee anti-malware behaviours
JM Blythe, L Coventry
Computers in Human Behavior 87, 87-97, 2018
322018
The Consumer Security Index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices
JM Blythe, SD Johnson
Living in the Internet of Things: Cybersecurity of the IoT, 2018
312018
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
JM Blythe, N Sombatruang, SD Johnson
Journal of Cybersecurity 5 (1), tyz005, 2019
222019
Personality and social framing in privacy decision-making: A study on cookie acceptance
LM Coventry, D Jeske, JM Blythe, J Turland, P Briggs
Frontiers in psychology 7, 1341, 2016
212016
The impact of IoT security labelling on consumer product choice and willingness to pay
SD Johnson, JM Blythe, M Manning, GTW Wong
PloS one 15 (1), e0227800, 2020
92020
A systematic review of crime facilitated by the consumer Internet of Things
JM Blythe, SD Johnson
Security Journal, 1-29, 2019
92019
Summary literature review of industry recommendations and international developments on IoT security
L Tanczer, J Blythe, F Yahya, I Brass, M Elsden, J Blackstock
Report for the Department for Digital, Culture, Media and Sport (https://www …, 2018
92018
Cyber security games: a new line of risk
JM Blythe, L Coventry
International Conference on Entertainment Computing, 600-603, 2012
92012
What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices
JM Blythe, SD Johnson, M Manning
Crime Science 9 (1), 1-9, 2020
82020
A Revised Model of Trust in Internet-Based Health Information and Advice: Cross-Sectional Questionnaire Study
E Sillence, J Blythe, P Briggs, M Moss
Journal of Medical Internet Research 21 (11), 2019
82019
Rapid evidence assessment on labelling schemes and implications for consumer IoT security
J Blythe, S Johnson
Report for the Department for Digital, Culture, Media and Sport (https …, 2018
82018
Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours
JM Blythe, S Michie, J Watson, CE Lefevre
Frontiers in Public Health, 2017
82017
Using behavioural insights to improve the public’s use of cyber security best practices improve the public’s use of cyber
L Coventry, P Briggs, J Blythe, M Tran
Project Report. Government Office for Science, 1-20, 2014
52014
Cyberhygiene Insight Report
JM Blythe, C Lefevre
https://iotuk.org.uk/wp-content/uploads/2018/01/PETRAS-IoTUK-Cyberhygiene …, 2017
42017
Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours
JM Blythe
PQDT-Global, 2015
42015
The role of trust in eHealth websites: The enduring power of impartiality
JM Blythe, E Sillence, P Briggs
Frontiers in Public Health. Conference Abstract: 3rd UCL Centre for …, 2017
32017
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change?
JM Blythe, A Gray, E Collins
International Conference on Human-Computer Interaction, 76-91, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20