Skip to main content
Kent Academic Repository

Items where Author, Editor or other role is "Nurse, Jason"

Group by: Creator's name | Item Type | Date | No Grouping
Number of items: 166.

Radanliev, Petar, De Roure, David, Maple, Carsten, Nurse, Jason R. C., Nicolescu, Razvan, Ani, Uchenna (2024) AI security and cyber risk in IoT systems. Frontiers in Big Data, 7 . Article Number 1402745. ISSN 2624-909X. (doi:10.3389/fdata.2024.1402745) (KAR id:107598)
Format: PDF

Adriko, Rodney, Nurse, Jason R. C. (2024) Does Cyber Insurance promote Cyber Security Best Practice? An Analysis based on Insurance Application Forms. Digital Threats: Research and Practice, . ISSN 2692-1626. (doi:10.1145/3676283) (KAR id:106506)
Format: PDF Format: PDF

Sugiura, Lisa, Button, Mark, Nurse, Jason R. C., Tapley, Jacki, Belen-Saglam, Rahime, Hawkins, Chloe, Frederick, Brian, Blackbourn, Dean (2024) The Technification of Domestic Abuse: Methods, Tools, and Criminal Justice Responses. Criminology & Criminal Justice, . ISSN 1748-8958. E-ISSN 1748-8966. (doi:10.1177/17488958241266760) (KAR id:106245)
Format: PDF Format: PDF

Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., Pattnaik, Nandita, MacColl, Jamie, Huesch, Pia, Sullivan, James (2024) “There was a bit of PTSD every time I walked through the office door”: Ransomware harms and the factors that influence the victim organisation’s experience. Journal of Cybersecurity, 10 (1). Article Number tyae013. ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyae013) (KAR id:106485)
Format: PDF Format: PDF

Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2024) Security and privacy perspectives of people living in shared home environments. In: CSCW'24: Computer-Supported Cooperative Work and Social Computing. 8. (In press) (doi:10.1145/3686907) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:106798)
Format: PDF

Hüsch, Pia, Mott, Gareth, MacColl, Jamie, Nurse, Jason R. C., Sullivan, James, Turner, Sarah, Pattnaik, Nandita (2024) ‘Your data is stolen and encrypted’: the ransomware victim experience. RUSI Occasional Papers, . ISSN 2397-0286. (KAR id:106978)
Format: PDF

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2024) Unmasking Hate in the Pandemic: A Cross-Platform Study of the COVID-19 Infodemic. Big Data Research, 37 . Article Number 100481. ISSN 2214-5796. (doi:10.1016/j.bdr.2024.100481) (KAR id:106263)
Format: PDF Format: PDF

Jones, Keenan, Zahrah, Fatima, Nurse, Jason R. C. (2024) Embedding Privacy in Computational Social Science and Artificial Intelligence Research. In: International AAAI Conference on Web and Social Media (ICWSM) Workshop Proceedings. . (In press) (KAR id:106052)
Format: PDF

Khan, Neeshe, Furnell, Steven, Bada, Maria, Nurse, Jason R. C., Rand, Matthew (2024) Assessing Cyber Security Support for Small and Medium-Sized Enterprises. In: IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance. . Spinger (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:106167)
Format: PDF

Adriko, Rodney, Nurse, Jason R. C. (2024) Cybersecurity, Cyber insurance, and Small-to-Medium-sized Enterprises: A Systematic Review. Information and Computer Security, . ISSN 2056-4961. (doi:10.1108/ICS-01-2024-0025) (KAR id:105932)
Format: PDF

Patterson, Clare M., Nurse, Jason R.C., Franqueira, Virginia N.L. (2024) “I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents. Computers & Security, 139 . Article Number 103699. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103699) (KAR id:104873)
Format: PDF Format: XML Word Processing Document (DOCX)

MacColl, Jamie and Hüsch, Pia and Mott, Gareth and Sullivan, James and Nurse, Jason R. C. and Turner, Sarah and Pattnaik, Nandita (2024) The Scourge of Ransomware: Victim Insights on Harms to Individuals, Organisations and Society. Technical report. The Royal United Services Institute for Defence and Security Studies (KAR id:104628)
Format: PDF Format: PDF

Szymkowiak, Andrea and Shepherd, Lynsay and Nurse, Jason R. C. and Ziefle, Martina and Brauner, Philipp, eds. (2023) Technology For the Greater Good? The Influence of (Ir)responsible Systems on Human Emotions, Thinking and Behavior. Frontiers in Computer Science, 5 . E-ISSN 2624-9898. (doi:10.3389/fcomp.2023.1341692) (KAR id:98227)
Format: PDF

Turner, Sarah (2023) Approaches to Support Families' Engagement with Cyber Security for Home IoT Devices. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.104478) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:104478)
Format: PDF

Bada, Maria and Nurse, Jason R. C. (2023) Exploring Cybercriminal Activities, Behaviors, and Profiles. In: Mukherjee, Sumitava and Dutt, Varun and Srinivasan, Narayanan, eds. Applied Cognitive Science and Technology. Springer, pp. 109-120. ISBN 978-981-99-3965-7. E-ISBN 978-981-99-3966-4. (doi:10.1007/978-981-99-3966-4_7) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:102602)
Format: PDF

MacColl, Jamie and Sullivan, James and Nurse, Jason R. C. and Mott, Gareth and Turner, Sarah and Cartwright, Edward and Cartwright, Anna (2023) Cyber Insurance and the Ransomware Challenge. Technical report. The Royal United Services Institute for Defence and Security Studies (KAR id:104626)
Format: PDF Format: PDF

Pattnaik, Nandita, Nurse, Jason R. C., Turner, Sarah, Mott, Gareth, MacColl, Jamie, Huesch, Pia, Sullivan, James (2023) It's more than just money: The real-world harms from ransomware attacks. In: 17th International Symposium on Human Aspects of Information Security & Assurance, 4-6 July 2023, Canterbury, UK. (doi:10.1007/978-3-031-38530-8_21) (KAR id:101600)
Format: PDF

Bada, Maria, Furnell, Steven, Nurse, Jason R. C., Dymydiuk, Jason (2023) Supporting Small and Medium-sized Enterprises in using Privacy Enhancing Technologies. In: HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust. Lecture Notes in Computer Science . Springer ISBN 978-3-031-35821-0. E-ISBN 978-3-031-35822-7. (doi:10.1007/978-3-031-35822-7_19) (KAR id:100198)
Format: PDF

Mott, Gareth, Nurse, Jason R. C., Baker-Beall, Christopher (2023) Preparing for future Cyber Crises: Lessons from governance of the coronavirus pandemic. Policy Design and Practice, 6 (2). pp. 160-181. ISSN 2574-1292. (doi:10.1080/25741292.2023.2205764) (KAR id:100974)
Format: PDF Format: PDF

Altuncu, Enes, Nurse, Jason R. C., Bagriacik, Meryem, Kaleba, Sophie, Yuan, Haiyue, Bonheme, Lisa, Li, Shujun (2023) aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. In: Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media. . 27:1-27:10. Association for the Advancement of Artificial Intelligence (doi:10.36190/2023.27) (KAR id:101790)
Format: PDF

Patterson, Clare M., Nurse, Jason R. C., Franqueira, Virginia N. L. (2023) Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132 . Article Number 103309. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103309) (KAR id:101556)
Format: PDF Format: PDF

Cartwright, Anna, Cartwright, Edward, MacColl, Jamie, Mott, Gareth, Turner, Sarah, Sullivan, James, Nurse, Jason R. C. (2023) How Cyber-Insurance Influences the Ransomware Payment Decision: Theory and Evidence. The Geneva Papers on Risk and Insurance - Issues and Practice, 48 . pp. 300-331. E-ISSN 1468-0440. (doi:10.1057/s41288-023-00288-8) (KAR id:100212)
Format: PDF

Hernández Ramos, José Luis and Nurse, Jason R. C. and Bellavista, Paolo and Kambourakis, Georgios and Charalampos, Patrikakis, eds. (2023) Special Issue on Security and Data Protection during the COVID-19 Pandemic and Beyond. IEEE IT Professional, . (In press) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:98228)

Shere, Anjuli R.K., Nurse, Jason R. C., Martin, Andrew (2023) Threats to Journalists from the Consumer Internet of Things. In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media. Cyber Science 2022; 20–21 June; Wales. Springer Proceedings in Complexity . Springer ISBN 978-981-19-6413-8. (doi:10.1007/978-981-19-6414-5_17) (KAR id:94898)
Format: PDF

Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., MacColl, Jamie, Sullivan, James, Cartwright, Anna, Cartwright, Edward (2023) Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. Computers & Security, 128 . Article Number 103162. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103162) (KAR id:100308)
Format: PDF Format: PDF

Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2023) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Computing Surveys, 55 (9). 180:1-180:38. ISSN 0360-0300. E-ISSN 1557-7341. (doi:10.1145/3558095) (KAR id:98166)
Format: PDF

Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2022) Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. Computers and Security, 125 . Article Number 103008. ISSN 0167-4048. (doi:10.1016/j.cose.2022.103008) (KAR id:96259)
Format: PDF

Zahrah, Fatima and Nurse, Jason R. C. (2022) Terrorism and online extremism. In: Ceron, Andrea, ed. Elgar Encyclopedia of Technology and Politics. Elgar Encyclopedias in the Social Sciences series . Edward Elgar Publishing, pp. 62-67. ISBN 978-1-80037-425-6. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:98159)
Format: PDF

Turner, Sarah, Pattnaik, Nandita, Nurse, Jason R. C., Li, Shujun (2022) "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. Proceedings of the ACM on Human-Computer Interaction, 6 (CSCW2). Article Number 269. E-ISSN 2573-0142. (doi:10.1145/3555159) (KAR id:95346)
Format: PDF

Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2022) Trust disruption and preservation in the Covid-19 work from home context. Journal of Workplace Learning, . ISSN 1366-5626. (doi:10.1108/JWL-02-2022-0017) (KAR id:96206)
Format: PDF

Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2022) An Investigation into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective. Frontiers in Computer Science, . E-ISSN 2624-9898. (doi:10.3389/fcomp.2022.908245) (KAR id:95383)
Format: PDF

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2022) A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. In: 2022 ACM/SIGAPP Symposium On Applied Computing. . pp. 1788-1791. ACM (doi:10.1145/3477314.3507226) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92440)
Format: PDF

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2022) "It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. In: ACM Conference on Human Factors in Computing Systems (CHI). 2022 ACM CHI Conference on Human Factors in Computing Systems. . ACM ISBN 978-1-4503-9156-6. (doi:10.1145/3491101.3503577) (KAR id:92356)
Format: PDF

Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2022) Personal Information: Perceptions, Types and Evolution. Journal of Information Security and Applications, . ISSN 2214-2126. (doi:10.1016/j.jisa.2022.103163) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:93468)
Format: PDF

Erola, Arnau, Agrafiotis, Ioannis, Nurse, Jason R. C., Axon, Louise, Goldsmith, Michael, Creese, Sadie (2022) A System to Calculate Cyber-Value-at-Risk. Computers & Security, 113 . Article Number 102545. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102545) (KAR id:91647)
Format: PDF Format: PDF

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2022) Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. In: 16th International AAAI Conference on Web and Social Media (ICWSM-22), 6-9 June 2022, Atlanta, USA. (KAR id:93628)
Format: PDF

Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2021) Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges. In: 42nd International Conference on Information Systems (ICIS) TREOs. (KAR id:92838)
Format: PDF

Nurse, Jason R. C., Adamos, Konstantinos, Grammatopoulos, Athanasios, Di Franco, Fabio (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. Report number: 10.2824/033355. European Union Agency for Cybersecurity (ENISA) (doi:10.2824/033355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91977)
Format: PDF

Sugiura, Lisa, Blackbourn, Dean, Button, Mark, Hawkins, Chloe, Tapley, Jacki, Frederick, Brian, Nurse, Jason R. C., Belen Sağlam, Rahime (2021) Computer misuse as a facilitator of Domestic Abuse. University of Portsmouth, 127 pp. (KAR id:98203)
Format: PDF

Axon, Louise, Erola, Arnau, Janse van Rensburg, Alastair, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2021) Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. In: ARES 2021: The 16th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-9051-4. (doi:10.1145/3465481.3470038) (KAR id:88746)
Format: PDF Format: PDF

Sharma, Suraj, Brennan, Joseph, Nurse, Jason R. C. (2021) StockBabble: A Conversational Financial Agent to support Stock Market Investors. In: Proceedings of the 3rd Conference on Conversational User Interfaces (CUI 2021). . ACM E-ISBN 978145038998. (doi:10.1145/3469595.3469620) (KAR id:88386)
Format: PDF

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2021) Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests. In: Proceedings of the 16th International AAAI Conference on Web and Social Media (ICWSM-22). . Association for the Advancement of Artificial Intelligence, USA (KAR id:89408)
Format: PDF

Bada, Maria, Nurse, Jason R. C. (2021) Profiling the Cybercriminal: A Systematic Review of Research. In: IEEE Cyber Science 2021 Conference, June 14-18, 2021. (doi:10.1109/CyberSA52016.2021.9478246) (KAR id:87945)
Format: PDF

Jaffray, Alice, Finn, Conor, Nurse, Jason R. C. (2021) SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education. In: IFIP Advances in Information and Communication Technology. Human Aspects of Information Security and Assurance. 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. 613. Springer ISBN 978-3-030-81110-5. (doi:10.1007/978-3-030-81111-2_4) (KAR id:88345)
Format: PDF

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) When Googling it doesn’t work: The challenge of finding security advice for smart home devices. In: Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology. 613. Springer ISBN 978-3-030-81110-5. E-ISBN 978-3-030-81111-2. (doi:10.1007/978-3-030-81111-2_10) (KAR id:88357)
Format: PDF

Uchendu, Betsy, Nurse, Jason R. C., Bada, Maria, Furnell, Steven (2021) Developing a Cyber Security Culture: Current Practices and Future Needs. Computers & Security, . ISSN 0167-4048. (doi:10.1016/j.cose.2021.102387) (KAR id:88878)
Format: PDF

MacColl, Jamie and Nurse, Jason R. C. and Sullivan, James (2021) Cyber Insurance and the Cyber Security Challenge. Technical report. Royal United Services Institute for Defence and Security Studies (RUSI) (KAR id:89041)
Format: PDF

Nurse, Jason R. C., Vargas, Francielle, Hassan, Naeemul, Wang, Dakuo, Andriotis, Panagiotis, Ghenai, Amira, Jaidka, Kokil, Mustafaraj, Eni, Joseph, Kenneth, Foucault Welles, Brooke and others. (2021) Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM). In: Proceedings of the ICWSM Workshops. . Association for the Advancement of Artificial Intelligence (doi:10.36190/2021.00) (KAR id:98160)
Format: PDF

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2021) The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. In: Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media (ICWSM-21). . (KAR id:87962)
Format: PDF Format: PDF

Lallie, Harjinder Singh, Shepherd, Lynsay A., Nurse, Jason R. C., Erola, Arnau, Epiphaniou, Gregory, Maple, Carsten, Bellekens, Xavier (2021) Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Computers & Security, 105 . Article Number 102248. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102248) (KAR id:86976)
Format: PDF

Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2021) Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry. In: 23rd International Conference on Human-Computer Interaction, 24-29 Jul 2021, Online. (doi:10.1007/978-3-030-78642-7_53) (KAR id:87226)
Format: PDF

Nurse, Jason R. C., Williams, Nikki, Collins, Emily, Panteli, Niki, Blythe, John, Koppelman, Ben (2021) Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy. In: 23rd International Conference on Human-Computer Interaction, 24-29 Jul 2021, Online. (doi:10.1007/978-3-030-78645-8_74) (KAR id:87308)
Format: PDF

Buckley, Oliver, Nurse, Jason R. C., Wyer, Natalie, Dawes, Helen, Hodges, Duncan, Earl, Sally, Belen Sağlam, Rahime (2021) Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots. In: 23rd International Conference on Human-Computer Interaction, 24-29 Jul 2021, Online. (doi:10.1007/978-3-030-78642-7_54) (KAR id:87341)
Format: PDF

Nurse, Jason R. C. (2021) Cybersecurity Awareness. In: Encyclopedia of Cryptography, Security and Privacy. Springer. E-ISBN 978-3-642-27739-9. (doi:10.1007/978-3-642-27739-9_1596-1) (KAR id:86818)
Format: PDF

Sullivan, James and Nurse, Jason R. C. (2021) Cyber Security Incentives and the Role of Cyber Insurance. Technical report. Royal United Services Institute for Defence and Security Studies (RUSI) (KAR id:89042)
Format: PDF

Ani, Uchenna D., Watson, Jeremy D. McK., Green, Benjamin, Craggs, Barnaby, Nurse, Jason R. C. (2020) Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases. Journal of Cyber Security Technology, . ISSN 2374-2917. E-ISSN 2374-2925. (doi:10.1080/23742917.2020.1843822) (KAR id:84063)
Format: PDF

Stevens, Francesca, Nurse, Jason R. C., Arief, Budi (2020) Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, . ISSN 2152-2715. (doi:10.1089/cyber.2020.0253) (KAR id:83544)
Format: PDF

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2020) #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. In: 5th IEEE European Symposium on Security and Privacy Workshops. EUROS&PW 2020. . IEEE ISBN 978-1-7281-8597-2. (doi:10.1109/EuroSPW51379.2020.00065) (KAR id:81140)
Format: PDF

Knight, Richard, Nurse, Jason R. C. (2020) A Framework for Effective Corporate Communication after Cyber Security Incidents. Computers & Security, . ISSN 0167-4048. (doi:10.1016/j.cose.2020.102036) (KAR id:82836)
Format: PDF

Ani, Uchenna Daniel, Watson, Jeremy McKendrick, Carr, Madeline, Cook, Al, Nurse, Jason R. C. (2020) A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints. Journal of Defense Modeling and Simulation, . ISSN 1548-5129. E-ISSN 1557-380X. (doi:10.1177/1548512920953499) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:82405)
Format: PDF

Belen Sağlam, Rahime, Nurse, Jason R. C. (2020) Is your chatbot GDPR compliant? Open issues in agent design. In: CUI '20: Proceedings of the 2nd Conference on Conversational User Interfaces. . ACM ISBN 978-1-4503-7544-3. (doi:10.1145/3405755.3406131) (KAR id:81313)
Format: PDF

Nurse, Jason R. C., Axon, Louise, Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2020) The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). . IEEE (doi:10.1109/CyberSA49311.2020.9139703) (KAR id:80965)
Format: PDF

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2020) Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. In: 14th International AAAI Conference on Web and Social Media (ICWSM). . (KAR id:80660)
Format: PDF

Radanliev, Petar, De Roure, David, Page, Kevin, Nurse, Jason R. C., Montalvo, Rafael Mantilla, Santos, Omar, Maddox, La'Treall, Burnap, Peter (2020) Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity, . E-ISSN 2523-3246. (doi:10.1186/s42400-020-00052-8) (KAR id:81278)
Format: PDF

Shere, Anjuli R. K., Nurse, Jason R. C., Flechais, Ivan (2020) Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things. In: 5th European Workshop on Usable Security (EuroUSEC 2020). . IEEE ISBN 978-1-7281-8598-9. E-ISBN 978-1-7281-8597-2. (doi:10.1109/EuroSPW51379.2020.00039) (KAR id:80999)
Format: PDF

Axon, Louise, Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2020) Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice. Journal of Cybersecurity, 6 (1). ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyaa004) (KAR id:79587)
Format: PDF Format: PDF

Halgas, Lukas, Agrafiotis, Ioannis, Nurse, Jason R. C. (2020) Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). In: Lecture Notes in Computer Science. Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers. 11897. Springer ISBN 978-3-030-39302-1. (doi:10.1007/978-3-030-39303-8_17) (KAR id:75746)
Format: PDF

Radanliev, Petar, De Roure, David, Nurse, Jason R. C., Montalvo, Rafael Mantilla, Cannady, Stacy, Santos, Omar, Madox, La'Treall, Burnap, Peter, Maple, Carsten (2020) Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Applied Sciences, 2 . Article Number 169. ISSN 2523-3971. E-ISSN 2523-3971. (doi:10.1007/s42452-019-1931-0) (KAR id:79403)
Format: PDF

Bada, Maria and Nurse, Jason R. C. (2019) The Social and Psychological Impact of Cyberattacks. In: Benson, Vladlena and McAlaney, John, eds. Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press, London, pp. 73-92. ISBN 978-0-12-816203-3. E-ISBN 978-0-12-816594-2. (doi:10.1016/B978-0-12-816203-3.00004-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76899)
Format: PDF

Nurse, Jason R. C. (2019) Cyber Resilience: What Is It And How Do We Get It? CREST Security Review Magazine, (10). pp. 22-23. ISSN 2398-0540. E-ISSN 2398-0559. (KAR id:90293)
Format: PDF

Akinrolabu, Olusola, Nurse, Jason R. C., Martin, Andrew, New, Steve (2019) Cyber risk assessment in cloud provider environments: Current models and future needs. Computers & Security, 87 . Article Number 101600. ISSN 0167-4048. (doi:10.1016/j.cose.2019.101600) (KAR id:75979)
Format: PDF

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2019) (Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games. International Journal of Human-Computer Studies, 132 . pp. 127-137. ISSN 1071-5819. (doi:10.1016/j.ijhcs.2019.07.012) (KAR id:75624)
Format: PDF

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2019) Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. In: 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). 17th IEEE International Conference on Intelligence and Security Informatics (ISI). . IEEE (doi:10.1109/ISI.2019.8823548) (KAR id:73926)
Format: PDF

Ani, Uchenna D., Watson, Jeremy D. McK., Nurse, Jason R. C., Cook, Al, Maple, Carsten (2019) A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape. In: Living in the Internet of Things (IoT 2019). . IET ISBN 978-1-83953-089-0. (doi:10.1049/cp.2019.0131) (KAR id:73330)
Format: PDF

Bada, Maria, Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, 27 (3). pp. 393-410. ISSN 2056-4961. (doi:10.1108/ICS-07-2018-0080) (KAR id:73481)
Format: PDF

Buckley, Oliver, Nurse, Jason R. C. (2019) The Language of Biometrics: Analysing Public Perceptions. Journal of Information Security and Applications, 47 . pp. 112-119. E-ISSN 2214-2126. (doi:10.1016/j.jisa.2019.05.001) (KAR id:73743)
Format: PDF

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2019) Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior, 99 . pp. 38-54. ISSN 0747-5632. (doi:10.1016/j.chb.2019.04.026) (KAR id:73887)
Format: PDF

Webb, Helena, Nurse, Jason R. C., Bezuidenhout, Louise, Jirotka, Marina (2019) Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges. In: 2019 CHI Conference on Human Factors in Computing Systems Extended Abstracts. . ACM ISBN 978-1-4503-5971-9. (doi:10.1145/3290607.3299063) (KAR id:71381)
Format: PDF

Nouh, Mariam, Nurse, Jason R. C., Webb, Helena, Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society (KAR id:71674)
Format: PDF

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69500)
Format: PDF

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.36) (KAR id:69501)
Format: PDF

Sirur, Sean, Nurse, Jason R. C., Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS). CCS Computer and Communications Security . pp. 88-95. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267368) (KAR id:68765)
Format: PDF

Giasemidis, Georgios, Kaplis, Nikolaos, Agrafiotis, Ioannis, Nurse, Jason R. C. (2018) A semi-supervised approach to message stance classification. IEEE Transactions on Knowledge and Data Engineering, 32 (1). pp. 1-11. ISSN 1041-4347. E-ISSN 1558-2191. (doi:10.1109/TKDE.2018.2880192) (KAR id:69952)
Format: PDF

Agrafiotis, Ioannis, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyy006) (KAR id:69076)
Format: PDF Format: PDF

Axon, Louise M., Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society E-ISBN 1-891562-53-3. (doi:10.14722/usec.2018.23024) (KAR id:67468)
Format: PDF

Kingston, Charlie, Nurse, Jason R. C., Agrafiotis, Ioannis, Milich, Andrew (2018) Using semantic clustering to support situation awareness on Twitter: The case of World Views. Human-centric Computing and Information Sciences, . ISSN 2192-1962. E-ISSN 2192-1962. (doi:10.1186/s13673-018-0145-6) (KAR id:67656)
Format: PDF Format: PDF

Happa, Jassim and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0026) (KAR id:67467)
Format: PDF

Nurse, Jason R. C. and Radanliev, Petar and Creese, Sadie and De Roure, David (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0001) (KAR id:67466)
Format: PDF

Radanliev, Petar and De Roure, David and Nurse, Jason R. C. and Nicolescu, Razvan and Huth, Michael and Cannady, Stacy and Montalvo, Rafael Mantilla (2018) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0041) (KAR id:67464)
Format: PDF

Sturgess, Jack and Nurse, Jason R. C. and Zhao, Jun (2018) A capability-oriented approach to assessing privacy risk in smart home ecosystems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0037) (KAR id:67465)
Format: PDF

Nurse, Jason R. C., Buckley, Oliver (2017) Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem. Human-centric Computing and Information Sciences, 7 . Article Number 40. E-ISSN 2192-1962. (doi:10.1186/s13673-017-0121-6) (KAR id:75294)
Format: PDF

Aktypi, Angeliki, Nurse, Jason R. C., Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. CCS Computer and Communications Security . ACM, New York, USA ISBN 978-1-4503-5206-2. (doi:10.1145/3137616.3137617) (KAR id:67470)
Format: PDF

Nurse, Jason R. C., Creese, Sadie, De Roure, David (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional (IT Pro), 19 (5). pp. 20-26. ISSN 1520-9202. E-ISSN 1941-045X. (doi:10.1109/MITP.2017.3680959) (KAR id:67476)
Format: PDF

Woods, Daniel, Agrafiotis, Ioannis, Nurse, Jason R. C., Creese, Sadie (2017) Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms. Journal of Internet Services and Applications, 8 (8). ISSN 1867-4828. (doi:10.1186/s13174-017-0059-y) (KAR id:67473)
Format: PDF

Nurse, Jason R. C., Agrafiotis, Ioannis, Erola, Arnau, Bada, Maria, Roberts, Taylor, Williams, Meredydd, Goldsmith, Michael, Creese, Sadie (2017) An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. In: Tryfonas, Theo, ed. Lecture Notes in Computer Science. Human Aspects of Information Security, Privacy and Trust. HAS 2017. 10292. Springer ISBN 978-3-319-58459-1. (doi:10.1007/978-3-319-58460-7_26) (KAR id:67478)
Format: PDF

Axon, Louise, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (KAR id:67474)
Format: PDF

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2017) Towards Designing a Multipurpose Cybercrime Intelligence Framework. In: Brynielsson, Joel and Johansson, Fredrik, eds. 2016 European Intelligence and Security Informatics Conference (EISIC 2016). . IEEE ISBN 978-1-5090-2858-0. E-ISBN 978-1-5090-2857-3. (doi:10.1109/EISIC.2016.018) (KAR id:67483)
Format: PDF

Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)
Format: PDF

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy Salience: Taxonomies and Research Opportunities. In: Lehmann, Anja and Whitehouse, Diane and Fischer-Hübner, Simone and Fritsch, Lothar and Raab, Charles, eds. Privacy and Identity Management. Facing up to Next Steps. IFIP Advances in Information and Communication Technology . Springer, pp. 263-278. ISBN 978-3-319-55782-3. (doi:10.1007/978-3-319-55783-0_18) (KAR id:67477)
Format: PDF

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada. (KAR id:67472)
Format: PDF

Williams, Meredydd, Yao, Kelvin, Nurse, Jason R. C. (2017) ToARist: An Augmented Reality Tourism App created through User-Centred Design. In: Electronic Workshops in Computing. Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017). . BCS ISBN 14779358. (doi:10.14236/ewic/HCI2017.1) (KAR id:67475)
Format: PDF

Kritzinger, Elmarie, Bada, Maria, Nurse, Jason R. C. (2017) A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In: Bishop, Matt and Futcher, Lynn and Miloslavskaya, Natalia and Theocharidou, Marianthi, eds. IFIP Advances in Information and Communication Technology. Information Security Education for a Global Digital Society. 503. pp. 110-120. Springer ISBN 978-3-319-58552-9. (doi:10.1007/978-3-319-58553-6_10) (KAR id:67471)
Format: PDF

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:10.1109/ARES.2016.25) (KAR id:67485)
Format: PDF

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67479)
Format: PDF

Eggenschwiler, Jacqueline, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, 2016 (11). pp. 12-19. ISSN 1361-3723. (doi:10.1016/S1361-3723(16)30091-4) (KAR id:67480)
Format: PDF

Williams, Meredydd, Axon, Louise, Nurse, Jason R. C., Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:10.1109/RTSI.2016.7740625) (KAR id:67487)
Format: PDF

Rashid, Tabish, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models. In: MIST '16: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. CCS Computer and Communications Security . pp. 47-56. ACM, New York, USA ISBN 978-1-4503-4571-2. (doi:10.1145/2995959.2995964) (KAR id:67482)
Format: PDF

Giasemidis, Georgios, Singleton, Colin, Agrafiotis, Ioannis, Nurse, Jason R. C., Pilgrim, Alan, Willis, Chris (2016) Determining the veracity of rumours on Twitter. In: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I. Part of the Lecture Notes in Computer Science book series . pp. 185-205. Springer, Germany ISBN 978-3-319-47879-1. (doi:10.1007/978-3-319-47880-7_12) (KAR id:67488)
Format: PDF

Nurse, Jason R. C., Erola, Arnau, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2016) Analytics for characterising and measuring the naturalness of online personae. Security Informatics Journal, 5 (3). Article Number 3. ISSN 2190-8532. (doi:10.1186/s13388-016-0028-1) (KAR id:67486)
Format: PDF

Kammüller, Florian, Nurse, Jason R. C., Probst, Christian W. (2016) Attack Tree Analysis for Insider Threats on the IoT using Isabelle. In: Lecture Notes in Computer Science 9750. Lecture Notes in Computer Science . pp. 234-246. Springer, Switzerland ISBN 978-3-319-39380-3. (doi:10.1007/978-3-319-39381-0_21) (KAR id:67496)
Format: PDF

van Rensburg, Alastair Janse, Nurse, Jason R. C., Goldsmith, Michael (2016) Attacker-Parametrised Attack Graphs. In: The Tenth International Conference on Emerging Security Information, Systems and Technologies, July 24th-28th 2016, France Nice. (KAR id:67490)
Format: PDF

Farnan, Oliver, Nurse, Jason R. C. (2016) Exploring a Controls-Based Assessment of Infrastructure Vulnerability. In: 10th Risks and Security of Internet and Systems. CRiSIS 2015, July 20-22 2015, Greece. (doi:10.1007/978-3-319-31811-0_9) (KAR id:67498)
Format: PDF

Williams, Meredydd, Nurse, Jason R. C. (2016) Optional data disclosure and the online privacy paradox: A UK perspective. In: Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human?Computer Interaction (HCI)., July 17-22, Toronto, ON, Canada,. (doi:10.1007/978-3-319-39381-0_17) (KAR id:67491)
Format: PDF

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford (KAR id:67481)
Format: PDF

Nurse, Jason R. C., Atamli, Ahmad, Martin, Andrew (2016) Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. In: Human Aspects of Information Security, Privacy, and Trust. 4th International Conference, HAS 2016,. the Lecture Notes in Computer Science . pp. 255-267. Springer, Switzerland ISBN 978-3-319-39380-3. E-ISBN 978-3-319-39381-0. (doi:10.1007/978-3-319-39381-0_23) (KAR id:67497)
Format: PDF

Iuga, Cristian, Nurse, Jason R. C., Erola, Arnau (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Journal of Human-centric Computing and Information Sciences, 6 (8). ISSN 2192-1962. (doi:10.1186/s13673-016-0065-2) (KAR id:67492)
Format: PDF

Eze, Chika, Nurse, Jason R. C., Happa, Jassim (2016) Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7 (1). ISSN 2093-5382. (doi:10.22667/JOWUA.2016.03.31.039) (KAR id:67495)
Format: PDF

Nurse, Jason R. C., Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: 2015 International Workshop on Secure Internet of Things (SIoT). . pp. 5-14. IEEE E-ISBN 978-1-4673-7769-0. (doi:10.1109/SIOT.2015.10) (KAR id:67502)
Format: PDF

Everett, Richard, Nurse, Jason R. C., Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:10.1145/2851613.2851813) (KAR id:67493)
Format: PDF

Williams, Meredydd, Nurse, Jason R. C. (2016) Perspectives on privacy in the use of online systems. In: Electronic Workshops in Computing. Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI 2016). . pp. 1-3. BCS (doi:10.5555/3114770.3114797) (KAR id:67484)
Format: PDF Format: PDF

Happa, Jassim, Fairclough, Graham, Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. . (KAR id:67494)
Format: PDF

Axon, Louise, Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: ThinkMind. . pp. 254-261. IARIA ISBN 978-1-61208-493-0. (KAR id:67489)
Format: PDF

Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. . pp. 461-468. IEEE E-ISBN 978-1-5090-0154-5. (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67503)
Format: PDF

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:10.1186/s40493-015-0021-5) (KAR id:67501)
Format: PDF

Wu, Tina, Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10 (4). pp. 79-96. ISSN 1558-7215. (KAR id:67499)
Format: PDF

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:10.1109/ICDMW.2015.88) (KAR id:67500)
Format: PDF Format: PDF

Devlin, Matthieu, Nurse, Jason R. C., Hodges, Duncan, Goldsmith, Michael, Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190 . pp. 23-35. Springer ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:10.1007/978-3-319-20376-8_3) (KAR id:67509)
Format: PDF

Agrafiotis, Ioannis, Nurse, Jason R. C., Buckley, Oliver, Legg, Phil, Creese, Sadie, Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67505)

Nurse, Jason R. C. (2015) Exploring the risks to identity security and privacy in cyberspace. XRDS: Crossroads, The ACM Magazine, 21 (3). pp. 42-47. ISSN 1528-4972. E-ISSN 1528-4980. (doi:10.1145/2730912) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67507)
Format: PDF

Nurse, Jason R. C., Erola, Arnau, Goldsmith, Michael, Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:10.22667/JISIS.2015.02.31.070) (KAR id:67510)
Format: PDF

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67512)
Format: PDF

Bada, Maria, Sasse, Angela, Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society. (KAR id:67511)
Format: PDF

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67504)
Format: PDF

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67506)
Format: PDF

Carvalho, Rodrigo, Goldsmith, Michael, Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67513)

Alahmadi, Bushra A., Legg, Philip .A., Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). 2. pp. 709-720. SciTePress ISBN 978-989-758-097-0. (doi:10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67508)
Format: PDF

Buckley, Oliver, Nurse, Jason R. C., Legg, Philip A., Goldsmith, Michael, Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. . IEEE E-ISBN 978-1-4799-7901-1. (doi:10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67514)
Format: PDF

Nurse, Jason R. C., Buckley, Oliver, Legg, Philip A., Goldsmith, Michael, Creese, Sadie, Wright, Gordon R.T., Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: 2014 IEEE Security and Privacy Workshops. . IEEE E-ISBN 978-1-4799-5103-1. (doi:10.1109/SPW.2014.38) (KAR id:67518)
Format: PDF

Nurse, Jason R. C., Pumphrey, Jess, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust. . 40 - 47. IEEE ISBN 978-1-4799-3502-4. E-ISBN 978-1-4799-3503-1. (doi:10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67515)
Format: PDF

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:10.1186/2196-064X-1-5) (KAR id:67516)
Format: PDF

Creese, Sadie, Gibson-Robinson, Thomas, Goldsmith, Michael, Hodges, Duncan, Kim, Dee, Love, Oriana, Nurse, Jason R. C., Pike, Bill, Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). . IEEE E-ISBN 978-1-4799-1535-4. (doi:10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67520)

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67517)

Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, Gordon, Whitty, Monica, Upton, David, Goldsmith, Michael, Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: HAS 2014: Human Aspects of Information Security, Privacy, and Trust. . Springer ISBN 978-3-319-07619-5. E-ISBN 978-3-319-07620-1. (doi:10.1007/978-3-319-07620-1_24) (KAR id:67519)
Format: PDF

Nurse, Jason R. C., Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2013) Building Confidence in Information-Trustworthiness Metrics for Decision Support. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. . IEEE E-ISBN 978-0-7695-5022-0. (doi:10.1109/TrustCom.2013.6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67524)
Format: PDF

Legg, Philip A., Moffat, Nick, Nurse, Jason R. C., Happa, Jassim, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:10.22667/JOWUA.2013.12.31.020) (KAR id:67521)
Format: PDF

Nurse, Jason R. C., Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2013) Communicating Trustworthiness using Radar Graphs: A Detailed Look. In: 2013 Eleventh Annual Conference on Privacy, Security and Trust. . IEEE E-ISBN 978-1-4673-5839-2. (doi:10.1109/PST.2013.6596085) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67523)
Format: PDF

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael (2013) At the Crossroads: Cybersecurity and Psychology. In: Annual Cyberpsychology Conference. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67522)

Nurse, Jason R. C. (2013) Effective Communication of Cyber Security Risks. In: 7th International Scientific Conference on Security and Protection of Information (SPI 2013). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67525)

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Rahman, Syed S. (2013) Supporting Human Decision-Making Online using Information Trustworthiness Metrics. In: HAS 2013: Human Aspects of Information Security, Privacy, and Trust. . pp. 316-325. Springer ISBN 978-3-642-39344-0. E-ISBN 978-3-642-39345-7. (doi:10.1007/978-3-642-39345-7_33) (KAR id:67526)
Format: PDF

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2012) Using Information Trustworthiness Advice in Decision-Making. In: 2012 Workshop on Socio-Technical Aspects in Security and Trust. . pp. 35-42. IEEE ISBN 978-1-4673-2748-0. (doi:10.1109/STAST.2012.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67529)
Format: PDF

Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C., Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. . pp. 1124-1131. IEEE ISBN 978-1-4673-2172-3. (doi:10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67528)
Format: PDF

Hodges, D., Nurse, Jason R. C., Goldsmith, M., Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67527)

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Craddock, Rachel, Jones, Glyn (2012) An Initial Usability Evaluation of the Secure Situation Awareness System. In: The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). (KAR id:67531)
Format: PDF

Nurse, Jason R. C., Sinclair, Jane E. (2012) Towards A Model to Support the Reconciliation of Security Actions across Enterprises. In: The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). (doi:10.1109/STAST.2012.11) (KAR id:67530)
Format: PDF

Nurse, Jason R. C. and Sinclair, Jane E. (2011) A Case Study Analysis of an E-Business Security Negotiations Support Tool. In: Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, 90 . Springer. (doi:10.1007/978-94-007-1192-1_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67533)

Yang, Shanshan, Joy, Mike S., Nurse, Jason R. C. (2011) Experiences on Sharing E-Learning Resources using Service Technologies. In: 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011). (doi:10.2316/P.2011.734-060) (KAR id:67532)
Format: PDF

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: 2011 Third International Workshop on Cyberspace Safety and Security (CSS). 2011 Third International Workshop on Cyberspace Safety and Security (CSS). . pp. 21-26. IEEE ISBN 978-1-4577-1034-6. E-ISBN 978-1-4577-1035-3. (doi:10.1109/CSS.2011.6058566) (KAR id:67535)
Format: PDF

Nurse, Jason R. C., Rahman, Syed Sadiqur, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Information Quality and Trustworthiness: A Topical State-of-the-Art Review. In: The International Conference on Computer Applications and Network Security (ICCANS) 2011. (KAR id:67536)
Format: PDF

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Trustworthy and Effective Communication of Cybersecurity Risks: A Review. In: The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:10.1109/STAST.2011.6059257) (KAR id:67534)
Format: PDF

Nurse, Jason R. C., Sinclair, Jane E. (2010) A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool. International Journal of Computer Science, 37 (4). (KAR id:67537)
Format: PDF

Nurse, Jason R. C., Sinclair, Jane E. (2010) Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations. In: International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010). (KAR id:67539)
Format: PDF

Nurse, Jason R. C., Sinclair, Jane E. (2010) An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it. International Journal On Advances in Security, 3 (3&). (KAR id:67538)
Format: PDF

Nurse, Jason R. C., Sinclair, Jane E. (2010) A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations. In: 5th International Conference on Internet and Web Applications and Services (ICIW 2010). (doi:10.1109/ICIW.2010.10) (KAR id:67540)
Format: PDF

Nurse, Jason R. C. and Sinclair, Jane E. (2009) BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. In: 2009 Fourth International Conference on Internet and Web Applications and Services. IEEE. ISBN 978-1-4244-3851-8. (doi:10.1109/ICIW.2009.48) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67543)

Nurse, Jason R. C., Sinclair, Jane E. (2009) Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS. International Journal on Advances in Internet Technology, 2 (4). (KAR id:67541)
Format: PDF

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development. In: Business Information Systems. Lecture Notes in Business Information Processing, 21 . Springer-Verlag. (doi:10.1007/978-3-642-01190-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67542)

This list was generated on Fri Nov 22 20:07:56 2024 GMT.