default search action
Monica T. Whitty
Person information
- affiliation: Monash University, Melbourne, Australia
- affiliation: University of Warwick, Cyber Security Centre, Coventry, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Monica T. Whitty, Nour Moustafa, Marthie Grobler:
Cybersecurity when working from home during COVID-19: considering the human factors. J. Cybersecur. 10(1) (2024) - [j22]Monica T. Whitty, Christopher Ruddy, David A. Keatley, Marcus A. Butavicius, Marthie Grobler:
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks. Inf. Comput. Secur. 32(4): 509-522 (2024) - 2023
- [c10]Monica T. Whitty, Christopher Ruddy, David A. Keatley:
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks. HAISA 2023: 377-390 - 2021
- [j21]Atif Ahmad, Sean B. Maynard, Kevin C. Desouza, James Kotsias, Monica T. Whitty, Richard L. Baskerville:
How can organizations develop situation awareness for incident response: A case study of management practice. Comput. Secur. 101: 102122 (2021) - [j20]Nour Moustafa, Marwa Keshk, Kim-Kwang Raymond Choo, Timothy M. Lynar, Seyit Camtepe, Monica T. Whitty:
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks. Future Gener. Comput. Syst. 118: 240-251 (2021) - 2020
- [j19]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. IEEE Trans. Inf. Forensics Secur. 15: 1128-1137 (2020) - [c9]Rosanna Bellini, Nicola Dell, Monica T. Whitty, Debasis Bhattacharya, David Wall, Pamela Briggs:
Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI. CHI Extended Abstracts 2020: 1-8 - [c8]Atif Ahmad, Kevin C. Desouza, Sean B. Maynard, Monica T. Whitty, James Kotsias, Richard L. Baskerville:
Situation-Awareness in Incident Response: An In-depth Case Study and Process Model. ICIS 2020 - [c7]Essam Soliman Debie, Nour Moustafa, Monica T. Whitty:
A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals. IJCNN 2020: 1-8
2010 – 2019
- 2019
- [i1]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. CoRR abs/1905.12593 (2019) - 2018
- [j18]Monica T. Whitty:
Do You Love Me? Psychological Characteristics of Romance Scam Victims. Cyberpsychology Behav. Soc. Netw. 21(2): 105-109 (2018) - 2017
- [c6]Monica T. Whitty, Matthew Edwards, Michael Levi, Claudia Peersman, Awais Rashid, M. Angela Sasse, Tom Sorell, Gianluca Stringhini:
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). WWW (Companion Volume) 2017: 1311-1314 - 2016
- [b3]Monica T. Whitty, Garry Young:
Cyberpsychology - The Study of Individuals, Society and Digital Technologies. BPS textbooks, Wiley 2016, ISBN 978-0-470-97562-6, pp. I-IX, 1-247 - 2015
- [j17]Monica T. Whitty, James Doodson, Sadie Creese, Duncan Hodges:
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology Behav. Soc. Netw. 18(1): 3-7 (2015) - [j16]Monica T. Whitty:
Mass-Marketing Fraud: A Growing Concern. IEEE Secur. Priv. 13(4): 84-87 (2015) - 2014
- [j15]Lia R. Emanuel, Greg J. Neil, Chris Bevan, Danaë Stanton Fraser, Sarah V. Stevenage, Monica T. Whitty, Sue Jamison-Powell:
Who am I? Representing the self offline and in different online contexts. Comput. Hum. Behav. 41: 146-152 (2014) - [c5]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c4]Monica T. Whitty, James Doodson, Sadie Creese, Duncan Hodges:
Image Choice to Represent the Self in Different Online Environments. HCI (22) 2014: 528-537 - [c3]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - 2013
- [c2]Sadie Creese, Duncan Hodges, Sue Jamison-Powell, Monica T. Whitty:
Relationships between Password Choices, Perceptions of Risk and Security Expertise. HCI (27) 2013: 80-89 - 2012
- [b2]Garry Young, Monica T. Whitty:
Transcending Taboos - A Moral and Psychological Examination of Cyberspace. Taylor & Francis 2012, ISBN 978-0-415-57936-0, pp. I-VI, 1-226 - [j14]Monica T. Whitty, Tom Buchanan:
The Online Romance Scam: A Serious Cybercrime. Cyberpsychology Behav. Soc. Netw. 15(3): 181-183 (2012) - [j13]Catherine Millman, Monica T. Whitty, Belinda Winder, Mark D. Griffiths:
Perceived Criminality of Cyber-Harassing Behaviors among Undergraduate Students in the United Kingdom. Int. J. Cyber Behav. Psychol. Learn. 2(4): 49-59 (2012) - [j12]Monica T. Whitty, Tom Buchanan, Adam N. Joinson, Alex Meredith:
Not all lies are spontaneous: An examination of deception across different modes of communication. J. Assoc. Inf. Sci. Technol. 63(1): 208-216 (2012) - 2011
- [j11]Monica T. Whitty, Garry Young, Lewis Goodings:
What I won't do in pixels: Examining the limits of taboo violation in MMORPGs. Comput. Hum. Behav. 27(1): 268-275 (2011) - 2010
- [j10]Ellen J. Helsper, Monica T. Whitty:
Netiquette within married couples: Agreement about acceptable online behavior and surveillance between partners. Comput. Hum. Behav. 26(5): 916-926 (2010) - [j9]Garry Young, Monica T. Whitty:
Games without frontiers: On the moral and psychological implications of violating taboos within multi-player virtual spaces. Comput. Hum. Behav. 26(6): 1228-1236 (2010)
2000 – 2009
- 2009
- [b1]Monica T. Whitty, Adam N. Joinson:
Truth, Lies and Trust on the Internet. Routledge 2009, ISBN 978-1-13-887754-2, pp. I-VI, 1-176 - 2008
- [j8]Monica T. Whitty, Siobhan E. Carville:
Would I lie to you? Self-serving lies and other-oriented lies told across different media. Comput. Hum. Behav. 24(3): 1021-1031 (2008) - [j7]Monica T. Whitty:
Revealing the 'real' me, searching for the 'actual' you: Presentations of self on an internet dating site. Comput. Hum. Behav. 24(4): 1707-1723 (2008) - [j6]Monica T. Whitty:
Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the Net. Comput. Hum. Behav. 24(5): 1837-1850 (2008) - [c1]Alex Meredith, Mark Griffiths, Monica T. Whitty:
Identity in massively multiplayer online games: a qualitative pilot study. iiWAS 2008: 543-546 - 2007
- [j5]Monica T. Whitty, Deborah McLaughlin:
Online recreation: The relationship between loneliness, Internet self-efficacy and the use of the Internet for entertainment purposes. Comput. Hum. Behav. 23(3): 1435-1446 (2007) - 2006
- [j4]Monica T. Whitty, Adrian N. Carr:
New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace. Comput. Hum. Behav. 22(2): 235-250 (2006) - 2005
- [r1]Monica T. Whitty:
Ethical Implications of Investigating Internet Relationships. Encyclopedia of Information Science and Technology (II) 2005: 1116-1120 - 2003
- [j3]Monica T. Whitty:
Pushing the Wrong Buttons: Men's and Women's Attitudes toward Online and Offline Infidelity. Cyberpsychology Behav. Soc. Netw. 6(6): 569-579 (2003) - 2002
- [j2]Monica T. Whitty:
Liar, liar! An examination of how open, supportive and honest people are in chat rooms. Comput. Hum. Behav. 18(4): 343-352 (2002) - 2001
- [j1]Monica T. Whitty, Jeff Gavin:
Age/Sex/Location: Uncovering the Social Cues in the Development of Online Relationships. Cyberpsychology Behav. Soc. Netw. 4(5): 623-630 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint