Home > Publications

Publications

41226 - 41250 out of 42,622Page size: 25
  1. Poster › Research › Not peer-reviewed
  2. Unpublished
  3. Published
  4. Published
  5. Unpublished

    Counterfeit Goods: Exploring and Enjoying the Risks of Consumption

    Ferreira, M. C., 16 Aug 2012, (Unpublished).

    Research output: Contribution to conferencePoster

  6. Unpublished
  7. Published
  8. Published

    Cyber Security for Small Businesses: A Review Of the Advice

    Agha, D., Rowell, J. & Choudhury, R., 13 Jun 2019.

    Research output: Contribution to conferencePoster

  9. Published

    Dangerous and Severe Personality Disorder: do high risk patients remain high risk over time?

    Windley, S., Draycott, S., Glorney, E. & O'Neill, D., 30 Nov 2012.

    Research output: Contribution to conferencePoster

  10. Published
  11. Published

    Developing a measure of HRM system strength

    Chacko, S. & Conway, N., 2011.

    Research output: Contribution to conferencePoster

  12. Published

    Dispersal and timing of major eruptive events at Ischia (Italy), insights from distal tephra records

    Albert, P., Tomlinson, E., Civetta, L., Wulf, S., Brown, R., Smith, V. C., Orsi, G., Bourne, A. & Menzies, M., 7 Jan 2013.

    Research output: Contribution to conferencePoster

  13. Unpublished

    Dynamic and Interactive Scientific Posters: Visualising 3D Models and Simulation Data Using AR

    Payton, R., May 2020, (Unpublished).

    Research output: Contribution to conferencePoster

  14. Published
  15. Published

    Exploring child HIV testing decisions in mothers with HIV

    Evangeli, M., Stamatelatou, A., Majewska, W., Ghosh, S., Webb, H., Donaghy, S. & Prime, K., 2014.

    Research output: Contribution to conferencePoster

  16. Published

    Exploring the meaning and process of violence and aggression: perspectives of perpetrators detained in HMP Service

    West, L., Glorney, E. & Horvath, M., 28 Nov 2008.

    Research output: Contribution to conferencePoster

  17. Published

    Extending trusted computing as a security service

    Chen, C., Mitchell, C. J. & Tang, S., Dec 2010. 1 p.

    Research output: Contribution to conferencePoster

  18. Published

    Field data and numerical models on the emplacement of sill complexes

    Barnett, Z. & Gudmundsson, A., 23 Apr 2012.

    Research output: Contribution to conferencePoster

  19. Published

    FiVu: Using Design Fiction to Identify Future Vulnerabilities in Bio-IOT

    Loureiro-Koechlin, C., Weir, C., Córdoba-Pachón, J-R. & Demetriou, S., 10 Apr 2022, p. 1.

    Research output: Contribution to conferencePoster

  20. Unpublished

    From Herbarium to Battlefield: Fields of interpretation in the early years of aerial photography

    Haines, E., 17 Sep 2012, (Unpublished).

    Research output: Contribution to conferencePoster

  21. Published
  22. Published
  23. Published
  24. Unpublished

    It's fake! An Interpretative Analysis on Possession through Consumption of Counterfeit Products

    Ferreira, M. C., 14 Jun 2009, (Unpublished).

    Research output: Contribution to conferencePoster

  25. Published

    Mentoring within a high secure forensic inpatient service: service user perspectives on developing a mentor service

    Boehm, B., Moore, E., Tapp, J. & Glorney, E., 25 Nov 2011.

    Research output: Contribution to conferencePoster

  26. Published

    Non-offenders’ constructs of violence

    Carrington-Watts, N., Glorney, E. & Horvath, M., 25 Nov 2008.

    Research output: Contribution to conferencePoster