Mr Mark Whittington

Mr Mark Whittington

Senior Lecturer

Overview

Contact Details

Telephone
work +44 (0)1224 274360
Email
Publications

Publications 

Currently viewing:

Page 1 of 3 Results 1 to 10 of 30

  • Helfaya, A & Whittington, M 2019, 'Does designing environmental sustainability disclosure quality measures make a difference?', Business Strategy and the Environment, vol. 28, no. 4, pp. 525-541. [Online] DOI: https://doi.org/10.1002/bse.2262
  • Helfaya, A, Whittington, M & Alawattage, C 2019, 'Exploring the quality of corporate environmental reporting: Surveying Preparers’ and Users’ Perceptions', Accounting, Auditing & Accountability Journal, vol. 32, no. 1, pp. 163-193. [Online] DOI: https://doi.org/10.1108/AAAJ-04-2015-2023
  • Al-Haddad, L & Whittington, M 2019, 'The impact of corporate governance mechanisms on real and accrual earnings management practices: evidence from Jordan', Corporate Governance: The International Journal of Business in Society, vol. 19, no. 6, CG-05-2018-0183, pp. 1167-1186. [Online] DOI: https://doi.org/10.1108/CG-05-2018-0183
  • Duncan, B & Whittington, M 2018, Can Forensic Audit Help Address the Cloud Forensic Problem in Light of the Requirements of the Forthcoming European Union General Data Protection Regulation? in B Duncan, YW Lee & A Olmsted (eds), The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization., 28013, Cloud Computing 2018, IARIA, pp. 84-89, The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, Barcelon, Spain, 18/02/18. <> [Online] DOI: https://www.google.com/url?q=https://thinkmind.org/download.php%3Farticleid%3Dcloud_computing_2018_4_30_28013&sa=U&ved=0ahUKEwiS1taT-vffAhUHnxQKHasFCHoQFggEMAA&client=internal-uds-cse&cx=016414469947898432502:-hnzqf1l_ic&usg=AOvVaw0qCNxhymsup0dBSGRizfs5
  • Duncan, B, Whittington, M & Chang, V 2018, Enterprise security and privacy: Why adding IoT and big data makes it so much more difficult. in Proceedings of 2017 International Conference on Engineering and Technology, ICET 2017. vol. 2018-January, Institute of Electrical and Electronics Engineers Inc., pp. 1-7, 2017 International Conference on Engineering and Technology, ICET 2017, Antalya, Turkey, 21/08/17. [Online] DOI: https://doi.org/10.1109/ICEngTechnol.2017.8308189
  • Stewart, M, Bertram-Smith, N, Heywood, I, McEwan, G, McLennan, NDR, Robb, A, Urquhart, C & Whittington, M 2018, The Authentic Leadership Guide: What is an Authentic Leader and How Can You Become One? University of Aberdeen.
  • Duncan, B, Zhao, Y & Whittington, M 2017, Corporate Governance, Risk Appetite and Cloud Security Risk: A Little Known Paradox. How Do We Square the Circle? in CB Westphall, YW Lee, B Duncan, A Olmsted, M Vassilakopoulos, C Lambrinoudakis, SK Katsikas & R Ege (eds), Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017)., 28008, IARIA, Athens, pp. 139-144, The Eighth International Conferences on Cloud Computing, GRIDs, and Virtualization, Athens, Greece, 19/02/17.
  • Duncan, B, Whittington, M, Jaatun, MG & Zuniga, ARR 2017, Could the Outsourcing of Incident Response Management provide a Blueprint for Managing Other Cloud Security Requirements? in V Chang, M Ramachandran, RJ Walters & G Wills (eds), Enterprise Security . Lecture Notes in Computer Science, vol. 10131, Springer , pp. 19-39, Second International Workshop, Vancouver, BC, Canada, 30/11/15. [Online] DOI: https://doi.org/10.1007/978-3-319-54380-2_2
  • Duncan, RAK & Whittington, M 2017, Creating an Immutable Database for Secure Cloud Audit Trail and System Logging. in Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 19 February 2017 - 23 February 2017, Athens, Greece ., 28009, IARIA, Athens, Greece, pp. 54-59, Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 19 February 2017 - 23 February 2017, Athens, Greece , Athens, Greece, 19/02/17.
  • Duncan, RAK & Whittington, M 2016, 'Cloud cyber-security: Empowering the audit trail', International Journal on Advances in Security, vol. 9, no. 3 & 4, 8, pp. 169-183. <> [Online] DOI: https://www.iariajournals.org/security/tocv9n34.html
Show 10 | 25 | 50 | 100 results per page