Take a look at our expanse of multidisciplinary research publications.
The Internet of Things? Potential to Achieve Supply Chain Integration : A Case Study
Wakenshaw S Masi D, Micillo R, Godsell J, Maple C.(2017). 21st Annual CIM Symposium - Globalisation 2.0.
Privacy, Vulnerability, and Willingness to Share : An Empirical Investigation Using Latent Growth Curve Model
Wakenshaw S, Dhamotharan L, Ignatius J, Ng I, Ma X, Chen D, Maple C.(2017). Data for Policy Conference. http://wrap.warwick.ac.uk/93828/.
Mechanisms for Meaningful Consent in Internet of Things
Wakenshaw S, Maple C, Schraefel M, Gomer R, Ghirardello K.(2018). Living in the Internet of Things. https://doi.org/10.1049/cp.2018.0014
Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation
Wachter S, Mittelstadt B, Floridi L.(2017). International Data Privacy Law 7(2). p.76-99. 10.1093/idpl/ipx005
The GDPR and the Internet of Things: a three-step transparency model
Wachter S.(2018). Law, Innovation and Technology 10(2). p.266-294. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3130392
Ethical and Normative Challenges of Identification in the Internet of Things
Wachter S.(2018). Computer Law & Security Review 34(3). p.436-449. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3083554
Transparent, explainable, and accountable AI for robotics
Wachter S, Mittelstadt B, Floridi L.(2017). Science Robotics. 10.1126/scirobotics.aan6080
When Data Protection by Design and Data Subject Rights Clash
Veale M, Binns R, Ausloos J.(2018). International Data Privacy Law 8(2). p.105-123. 10.1093/idpl/ipy002
Some HCI Priorities for GDPR-Compliant Machine Learning
Veale M, Binns R, Van Kleek M.(2018). CHI Conference on Human Factors in Computing Systems: Workshop: CHI-GDPR.
X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps
Van Kleek M, Binns R, Zhao J, Slack A, Lee S, Ottewell D, Shadbolt N.(2018). Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3173574.3173967