Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 46.

Article

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2019) Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior, . ISSN 0747-5632. (doi:https://doi.org/10.1016/j.chb.2019.04.026) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Agrafiotis, Ioannis and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:https://doi.org/10.1093/cybsec/tyy006) (Full text available)
[img]
Preview
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and De Roure, David (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional (IT Pro), 19 (5). pp. 20-26. ISSN 1520-9202. E-ISSN 1941-045X. (doi:https://doi.org/10.1109/MITP.2017.3680959) (Full text available)
[img]
Preview

Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason R. C. and Creese, Sadie (2017) Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms. Journal of Internet Services and Applications, 8 (8). ISSN 1867-4828. (doi:https://doi.org/10.1186/s13174-017-0059-y) (Full text available)
[img]
Preview

Axon, Louise and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy salience: Taxonomies and research opportunities. Privacy and Identity Management – Facing Up To Next Steps, IFIP Advances in Information and Communication Technology, . (doi:https://doi.org/10.1007/978-3-319-55783-0_18) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie (2016) Analytics for characterising and measuring the naturalness of online personae. Security Informatics Journal, 5 (3). ISSN 2190-8532. (doi:https://doi.org/10.1186/s13388-016-0028-1) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:https://doi.org/10.1186/s40493-015-0021-5) (Full text available)
[img]
Preview

Agrafiotis, Ioannis and Nurse, Jason R. C. and Buckley, Oliver and Legg, Phil and Creese, Sadie and Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:https://doi.org/10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Erola, Arnau and Goldsmith, Michael and Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:https://doi.org/10.22667/JISIS.2015.02.31.070) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:https://doi.org/10.1186/2196-064X-1-5) (Full text available)
[img]
Preview

Legg, Philip A. and Moffat, Nick and Nurse, Jason R. C. and Happa, Jassim and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:https://doi.org/10.22667/JOWUA.2013.12.31.020) (Full text available)
[img]
Preview

Monograph

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford (Full text available)
[img]
Preview

Conference or workshop item

Axon, Louise M. and Alahmadi, Bushra and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). Internet Society ISBN 1-891562-53-3. (doi:https://doi.org/10.14722/usec.2018.23024) (Full text available)
[img]
Preview

Happa, Jassim and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0026) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Radanliev, Petar and Creese, Sadie and Roure, David De (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0001) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2017) An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. In: Tryfonas, Theo, ed. Lecture Notes in Computer Science. Human Aspects of Information Security, Privacy and Trust. HAS 2017. Springer ISBN 978-3-319-58459-1. (doi:https://doi.org/10.1007/978-3-319-58460-7_26) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada. (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:https://doi.org/10.1109/ARES.2016.25) (Full text available)
[img]
Preview

Williams, Meredydd and Axon, Louise and Nurse, Jason R. C. and Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:https://doi.org/10.1109/RTSI.2016.7740625) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: 2015 International Workshop on Secure Internet of Things (SIoT). IEEE, Germany pp. 5-14. ISBN 978-1-4673-7769-0. (doi:https://doi.org/10.1109/SIOT.2015.10) (Full text available)
[img]
Preview

Happa, Jassim and Fairclough, Graham and Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. (Full text available)
[img]
Preview

Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: ThinkMind. IARIA pp. 254-261. ISBN 978-1-61208-493-0. (Full text available)
[img]
Preview

Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE pp. 461-468. E-ISBN 978-1-5090-0154-5. (doi:https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Devlin, Matthieu and Nurse, Jason R. C. and Hodges, Duncan and Goldsmith, Michael and Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190. Springer pp. 23-35. ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:https://doi.org/10.1007/978-3-319-20376-8_3) (Full text available)
[img]
Preview

Phillips, Elizabeth and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phillips, Elizabeth and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. IEEE E-ISBN 978-1-4799-7901-1. (doi:https://doi.org/10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Buckley, Oliver and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie and Wright, Gordon R.T. and Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: 2014 IEEE Security and Privacy Workshops. IEEE E-ISBN 978-1-4799-5103-1. (doi:https://doi.org/10.1109/SPW.2014.38) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Pumphrey, Jess and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust. IEEE 40 - 47. ISBN 978-1-4799-3502-4. E-ISBN 978-1-4799-3503-1. (doi:https://doi.org/10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE E-ISBN 978-1-4799-1535-4. (doi:https://doi.org/10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: HAS 2014: Human Aspects of Information Security, Privacy, and Trust. Springer ISBN 978-3-319-07619-5. E-ISBN 978-3-319-07620-1. (doi:https://doi.org/10.1007/978-3-319-07620-1_24) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2013) Building Confidence in Information-Trustworthiness Metrics for Decision Support. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE E-ISBN 978-0-7695-5022-0. (doi:https://doi.org/10.1109/TrustCom.2013.6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2013) Communicating Trustworthiness using Radar Graphs: A Detailed Look. In: 2013 Eleventh Annual Conference on Privacy, Security and Trust. IEEE E-ISBN 978-1-4673-5839-2. (doi:https://doi.org/10.1109/PST.2013.6596085) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael (2013) At the Crossroads: Cybersecurity and Psychology. In: Annual Cyberpsychology Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Rahman, Syed S. (2013) Supporting Human Decision-Making Online using Information Trustworthiness Metrics. In: HAS 2013: Human Aspects of Information Security, Privacy, and Trust. Springer pp. 316-325. ISBN 978-3-642-39344-0. E-ISBN 978-3-642-39345-7. (doi:https://doi.org/10.1007/978-3-642-39345-7_33) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2012) Using Information Trustworthiness Advice in Decision-Making. In: 2012 Workshop on Socio-Technical Aspects in Security and Trust. IEEE pp. 35-42. ISBN 978-1-4673-2748-0. (doi:https://doi.org/10.1109/STAST.2012.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE pp. 1124-1131. ISBN 978-1-4673-2172-3. (doi:https://doi.org/10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn (2012) An Initial Usability Evaluation of the Secure Situation Awareness System. In: The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). (Full text available)
[img]
Preview

Black, Sue and Creese, Sadie and Guest, Richard and Pike, Bill and Saxby, Steve J. and Stanton Fraser, Danae and Stevenage, Sarah V. and Whitty, Monica T. (2012) Superidentity: Fusion of Identity across Real and Cyber Domains. In: The Global Forum on Identity,, 23 - 24 Apr 2012, Austin, US,. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: 2011 Third International Workshop on Cyberspace Safety and Security (CSS). 2011 Third International Workshop on Cyberspace Safety and Security (CSS). IEEE pp. 21-26. ISBN 978-1-4577-1035-3. (doi:https://doi.org/10.1109/CSS.2011.6058566) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Rahman, Syed Sadiqur and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Information Quality and Trustworthiness: A Topical State-of-the-Art Review. In: The International Conference on Computer Applications and Network Security (ICCANS) 2011. (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Trustworthy and Effective Communication of Cybersecurity Risks: A Review. In: The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:https://doi.org/10.1109/STAST.2011.6059257) (Full text available)
[img]
Preview

This list was generated on Sat May 25 16:05:25 2019 BST.