Dr. John M Blythe
Dr. John M Blythe
Director of Cyber Psychology, Immersive Labs
Verified email at
Cited by
Cited by
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors
JM Blythe, L Coventry, L Little
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015
Costly but effective: Comparing the factors that influence employee anti-malware behaviours
JM Blythe, L Coventry
Computers in Human Behavior 87, 87-97, 2018
Using behavioural insights to improve the public’s use of cyber security best practices
L Coventry, P Briggs, J Blythe, M Tran …, 2014
The impact of IoT security labelling on consumer product choice and willingness to pay
SD Johnson, JM Blythe, M Manning, GTW Wong
PloS one 15 (1), e0227800, 2020
Personality and social framing in privacy decision-making: A study on cookie acceptance
LM Coventry, D Jeske, JM Blythe, J Turland, P Briggs
Frontiers in psychology 7, 1341, 2016
Cyber security in the workplace: Understanding and promoting behaviour change
JM Blythe
CHItaly 2013, 1-10, 2013
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
JM Blythe, N Sombatruang, SD Johnson
Journal of Cybersecurity 5 (1), tyz005, 2019
A systematic review of crime facilitated by the consumer Internet of Things
JM Blythe, SD Johnson
Security Journal 34, 97-125, 2021
What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices
JM Blythe, SD Johnson, M Manning
Crime Science 9 (1), 1-9, 2020
A Revised Model of Trust in Internet-Based Health Information and Advice: Cross-Sectional Questionnaire Study
E Sillence, J Blythe, P Briggs, M Moss
Journal of Medical Internet Research 21 (11), 2019
The Consumer Security Index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices
JM Blythe, SD Johnson
Living in the Internet of Things: Cybersecurity of the IoT, 2018
Remote working pre-and post-COVID-19: an analysis of new threats and risks to security and privacy
JRC Nurse, N Williams, E Collins, N Panteli, J Blythe, B Koppelman
HCI International 2021-Posters: 23rd HCI International Conference, HCII 2021 …, 2021
Computer-Based Phonological Skills Training for Primary Students with Mild to Moderate Dyslexia--A Pilot Study.
JM Blythe
Australian Journal of Educational & Developmental Psychology 6, 39-49, 2006
Rapid evidence assessment on labelling schemes and implications for consumer IoT security
J Blythe, S Johnson
Report for the Department for Digital, Culture, Media and Sport (https …, 2018
Collecting and sharing self-generated health and lifestyle data: Understanding barriers for people living with long-term health conditions–a survey study
R Brown, L Coventry, E Sillence, J Blythe, S Stumpf, J Bird, AC Durrant
Digital health 8, 20552076221084458, 2022
Cyber security games: a new line of risk
JM Blythe, L Coventry
Entertainment Computing-ICEC 2012: 11th International Conference, ICEC 2012 …, 2012
Summary literature review of industry recommendations and international developments on IoT security
L Tanczer, J Blythe, F Yahya, I Brass, M Elsden, J Blackstock
Report for the Department for Digital, Culture, Media and Sport (https://www …, 2018
Human cyber risk management by security awareness professionals: Carrots or sticks to drive behaviour change?
JM Blythe, A Gray, E Collins
HCI for Cybersecurity, Privacy and Trust: Second International Conference …, 2020
Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours
JM Blythe, S Michie, J Watson, CE Lefevre
Frontiers in Public Health, 2017
Information security in the workplace: A mixed-methods approach to understanding and improving security behaviours
JM Blythe
PQDT-Global, 2015
The system can't perform the operation now. Try again later.
Articles 1–20