Home > Publications

Publications

38651 - 38675 out of 39,915Page size: 25
  1. Poster › Research › Not peer-reviewed
  2. Published
  3. Published
  4. Unpublished

    Counterfeit Goods: Exploring and Enjoying the Risks of Consumption

    Ferreira, M. C., 16 Aug 2012, (Unpublished).

    Research output: Contribution to conferencePoster

  5. Unpublished
  6. Published
  7. Published

    Cyber Security for Small Businesses: A Review Of the Advice

    Agha, D., Rowell, J. & Choudhury, R., 13 Jun 2019.

    Research output: Contribution to conferencePoster

  8. Published

    Dangerous and Severe Personality Disorder: do high risk patients remain high risk over time?

    Windley, S., Draycott, S., Glorney, E. & O'Neill, D., 30 Nov 2012.

    Research output: Contribution to conferencePoster

  9. Published
  10. Published

    Developing a measure of HRM system strength

    Chacko, S. & Conway, N., 2011.

    Research output: Contribution to conferencePoster

  11. Published

    Dispersal and timing of major eruptive events at Ischia (Italy), insights from distal tephra records

    Albert, P., Tomlinson, E., Civetta, L., Wulf, S., Brown, R., Smith, V. C., Orsi, G., Bourne, A. & Menzies, M., 7 Jan 2013.

    Research output: Contribution to conferencePoster

  12. Unpublished

    Dynamic and Interactive Scientific Posters: Visualising 3D Models and Simulation Data Using AR

    Payton, R., May 2020, (Unpublished).

    Research output: Contribution to conferencePoster

  13. Published
  14. Published

    Exploring child HIV testing decisions in mothers with HIV

    Evangeli, M., Stamatelatou, A., Majewska, W., Ghosh, S., Webb, H., Donaghy, S. & Prime, K., 2014.

    Research output: Contribution to conferencePoster

  15. Published

    Exploring the meaning and process of violence and aggression: perspectives of perpetrators detained in HMP Service

    West, L., Glorney, E. & Horvath, M., 28 Nov 2008.

    Research output: Contribution to conferencePoster

  16. Published

    Extending trusted computing as a security service

    Chen, C., Mitchell, C. J. & Tang, S., Dec 2010. 1 p.

    Research output: Contribution to conferencePoster

  17. Published

    Field data and numerical models on the emplacement of sill complexes

    Barnett, Z. & Gudmundsson, A., 23 Apr 2012.

    Research output: Contribution to conferencePoster

  18. Unpublished

    From Herbarium to Battlefield: Fields of interpretation in the early years of aerial photography

    Haines, E., 17 Sep 2012, (Unpublished).

    Research output: Contribution to conferencePoster

  19. Published
  20. Published
  21. Published
  22. Unpublished

    It's fake! An Interpretative Analysis on Possession through Consumption of Counterfeit Products

    Ferreira, M. C., 14 Jun 2009, (Unpublished).

    Research output: Contribution to conferencePoster

  23. Published

    Mentoring within a high secure forensic inpatient service: service user perspectives on developing a mentor service

    Boehm, B., Moore, E., Tapp, J. & Glorney, E., 25 Nov 2011.

    Research output: Contribution to conferencePoster

  24. Published

    Non-offenders’ constructs of violence

    Carrington-Watts, N., Glorney, E. & Horvath, M., 25 Nov 2008.

    Research output: Contribution to conferencePoster

  25. Unpublished

    Perceived quality of health care for patients with macular conditions: where are we now?

    Boxell, E. & Bradley, C., 2014, (Unpublished).

    Research output: Contribution to conferencePoster

  26. Unpublished

    Pore Scale Analysis of Suitability for Geological Carbon Storage, Implications for the UK Geoenergy Observatories Project

    Payton, R., Fellgett, M., Kingdon, A., Clark, B. & Hier-Majumder, S., May 2020, (Unpublished).

    Research output: Contribution to conferencePoster