Skip to main content

Items where Author, Editor or other role is "Nurse, Jason"

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | U | V | W | Y | Z
Number of items: 130.

A

Axon, Louise, Erola, Arnau, Janse van Rensburg, Alastair, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2021) Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. In: 16th International Conference on Availability, Reliability and Security (ARES 2021), August 17–20, 2021, Vienna, Austria. . ACM ISBN 978-1-4503-9051-4. (In press) (doi:10.1145/3465481.3470038) (KAR id:88746)
[thumbnail of ares2021-85.pdf]
Preview

Ani, Uchenna D., Watson, Jeremy D. McK., Green, Benjamin, Craggs, Barnaby, Nurse, Jason R. C. (2020) Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases. Journal of Cyber Security Technology, . ISSN 2374-2917. E-ISSN 2374-2925. (doi:10.1080/23742917.2020.1843822) (KAR id:84063)
[thumbnail of TSEC-Paper.pdf]
Preview

Ani, Uchenna Daniel, Watson, Jeremy McKendrick, Carr, Madeline, Cook, Al, Nurse, Jason R. C. (2020) A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints. Journal of Defense Modeling and Simulation, . ISSN 1548-5129. E-ISSN 1557-380X. (doi:10.1177/1548512920953499) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:82405)
[thumbnail of OS-SIM_JDMS.pdf]

Axon, Louise, Alahmadi, Bushra, Nurse, Jason R.C., Goldsmith, Michael, Creese, Sadie (2020) Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice. Journal of Cybersecurity, 6 (1). ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyaa004) (KAR id:79587)
[thumbnail of tyaa004.pdf]
Preview
[thumbnail of Sonification-in-SOCs-Cybersec-journal.pdf]

Akinrolabu, Olusola, Nurse, Jason R. C., Martin, Andrew, New, Steve (2019) Cyber risk assessment in cloud provider environments: Current models and future needs. Computers & Security, 87 . Article Number 101600. ISSN 0167-4048. (doi:10.1016/j.cose.2019.101600) (KAR id:75979)
[thumbnail of CS-Cloud-Risk.pdf]
Preview

Ani, Uchenna D., Watson, Jeremy D. McK., Nurse, Jason R. C., Cook, Al, Maple, Carsten (2019) A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape. In: Living in the Internet of Things (IoT 2019). . IET ISBN 978-1-83953-089-0. (doi:10.1049/cp.2019.0131) (KAR id:73330)
[thumbnail of petras-iet-2019-awncm.pdf]
Preview

Agrafiotis, Ioannis, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyy006) (KAR id:69076)
[thumbnail of XCV .pdf]
Preview
[thumbnail of Taxonomy_of_Cyber-Harms-author-final.pdf]
Preview

Axon, Louise M., Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society E-ISBN 1-891562-53-3. (doi:10.14722/usec.2018.23024) (KAR id:67468)
[thumbnail of 2018-USEC-NDSS-aangc-preprint.pdf]
Preview

Aktypi, Angeliki, Nurse, Jason R. C., Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. CCS Computer and Communications Security . ACM, New York, USA ISBN 978-1-4503-5206-2. (doi:10.1145/3137616.3137617) (KAR id:67470)
[thumbnail of 2017-ccs-mps-ang-author-final.pdf]
Preview

Axon, Louise, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (KAR id:67474)
[thumbnail of IARIA_journal_cameraready.pdf]
Preview

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67479)
[thumbnail of The_Relative_Effectiveness_of_widely_used_Risk_Controls_and_the_Real_Val....pdf]

Axon, Louise, Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: ThinkMind. . pp. 254-261. IARIA ISBN 978-1-61208-493-0. (KAR id:67489)
[thumbnail of sonification-acgn2016.pdf]
Preview

Agrafiotis, Ioannis, Nurse, Jason R. C., Buckley, Oliver, Legg, Phil, Creese, Sadie, Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67505)

Alahmadi, Bushra A., Legg, Philip .A., Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). 2. pp. 709-720. SciTePress ISBN 978-989-758-097-0. (doi:10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67508)
[thumbnail of WOSIS2015_aln_author_final.pdf]

B

Bada, Maria, Nurse, Jason R. C. (2021) Profiling the Cybercriminal: A Systematic Review of Research. In: IEEE Cyber Science 2021 Conference, June 14-18, 2021. (doi:10.1109/CyberSA52016.2021.9478246) (KAR id:87945)
[thumbnail of 2021-Profiling_Cyber_Criminal.pdf]
Preview

Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2021) Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry. In: 23rd International Conference on Human-Computer Interaction, 24-29 Jul 2021, Online. (doi:10.1007/978-3-030-78642-7_53) (KAR id:87226)
[thumbnail of HCII_2021-Chatbots-Privacy.pdf]
Preview

Buckley, Oliver, Nurse, Jason R. C., Wyer, Natalie, Dawes, Helen, Hodges, Duncan, Earl, Sally, Belen Sağlam, Rahime (2021) Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots. In: 23rd International Conference on Human-Computer Interaction, 24-29 Jul 2021, Online. (doi:10.1007/978-3-030-78642-7_54) (KAR id:87341)
[thumbnail of Sharing_Secrets_with_Agents.pdf]
Preview

Belen Sağlam, Rahime, Nurse, Jason R. C. (2020) Is your chatbot GDPR compliant? Open issues in agent design. In: CUI '20: Proceedings of the 2nd Conference on Conversational User Interfaces. . ACM ISBN 978-1-4503-7544-3. (doi:10.1145/3405755.3406131) (KAR id:81313)
[thumbnail of CUI-2020-Chatbots-GDPR.pdf]
Preview

Bada, Maria and Nurse, Jason R. C. (2019) The Social and Psychological Impact of Cyberattacks. In: Benson, Vladlena and McAlaney, John, eds. Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press, London, pp. 73-92. ISBN 978-0-12-816203-3. E-ISBN 978-0-12-816594-2. (doi:10.1016/B978-0-12-816203-3.00004-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76899)
[thumbnail of Social-psychological-impact-cyber-attacks.pdf]

Bada, Maria, Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, 27 (3). pp. 393-410. ISSN 2056-4961. (doi:10.1108/ICS-07-2018-0080) (KAR id:73481)
[thumbnail of jics-2019-bn-camera-ready.pdf]
Preview

Buckley, Oliver, Nurse, Jason R. C. (2019) The Language of Biometrics: Analysing Public Perceptions. Journal of Information Security and Applications, 47 . pp. 112-119. E-ISSN 2214-2126. (doi:10.1016/j.jisa.2019.05.001) (KAR id:73743)
[thumbnail of Language_of_Biometrics_Analysing_Public_Perceptions.pdf]
Preview

Bada, Maria, Sasse, Angela, Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society. (KAR id:67511)
[thumbnail of csss2015_bada_et_al.pdf]
Preview

Buckley, Oliver, Nurse, Jason R. C., Legg, Philip A., Goldsmith, Michael, Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. . IEEE E-ISBN 978-1-4799-7901-1. (doi:10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67514)
[thumbnail of accidental_insider.pdf]

C

Carvalho, Rodrigo, Goldsmith, Michael, Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67513)

Creese, Sadie, Gibson-Robinson, Thomas, Goldsmith, Michael, Hodges, Duncan, Kim, Dee, Love, Oriana, Nurse, Jason R. C., Pike, Bill, Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). . IEEE E-ISBN 978-1-4799-1535-4. (doi:10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67520)

Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C., Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. . pp. 1124-1131. IEEE ISBN 978-1-4673-2172-3. (doi:10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67528)
[thumbnail of trustcom2012_CGNP.pdf]

D

Devlin, Matthieu, Nurse, Jason R. C., Hodges, Duncan, Goldsmith, Michael, Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190 . pp. 23-35. Springer ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:10.1007/978-3-319-20376-8_3) (KAR id:67509)
[thumbnail of has2015-dnhgc-author-final.pdf]
Preview

E

Erola, Arnau, Agrafiotis, Ioannis, Nurse, Jason R.C., Axon, Louise, Goldsmith, Michael, Creese, Sadie (2021) A System to Calculate Cyber-Value-at-Risk. Computers & Security, . Article Number 102545. ISSN 0167-4048. (In press) (doi:10.1016/j.cose.2021.102545) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91647)
[thumbnail of CS-2022-A-System-to-Calculate-Cyber-Value-at-Risk.pdf]

Eggenschwiler, Jacqueline, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, 2016 (11). pp. 12-19. ISSN 1361-3723. (doi:10.1016/S1361-3723(16)30091-4) (KAR id:67480)
[thumbnail of 2016_cfs_ean-author-final.pdf]
Preview

Eze, Chika, Nurse, Jason R. C., Happa, Jassim (2016) Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7 (1). ISSN 2093-5382. (doi:10.22667/JOWUA.2016.03.31.039) (KAR id:67495)
[thumbnail of jowua2016_enh.pdf]
Preview

Everett, Richard, Nurse, Jason R. C., Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:10.1145/2851613.2851813) (KAR id:67493)
[thumbnail of SAC2016-ene-author-final.pdf]
Preview

F

Farnan, Oliver, Nurse, Jason R. C. (2016) Exploring a Controls-Based Assessment of Infrastructure Vulnerability. In: 10th Risks and Security of Internet and Systems. CRiSIS 2015, July 20-22 2015, Greece. (doi:10.1007/978-3-319-31811-0_9) (KAR id:67498)
[thumbnail of crisis2015_farnan_nurse.pdf]
Preview

G

Giasemidis, Georgios, Kaplis, Nikolaos, Agrafiotis, Ioannis, Nurse, Jason R.C. (2018) A semi-supervised approach to message stance classification. IEEE Transactions on Knowledge and Data Engineering, 32 (1). pp. 1-11. ISSN 1041-4347. E-ISSN 1558-2191. (doi:10.1109/TKDE.2018.2880192) (KAR id:69952)
[thumbnail of tkde-gkan-camera-ready.pdf]
Preview

Giasemidis, Georgios, Singleton, Colin, Agrafiotis, Ioannis, Nurse, Jason R. C., Pilgrim, Alan, Willis, Chris (2016) Determining the veracity of rumours on Twitter. In: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I. Part of the Lecture Notes in Computer Science book series . pp. 185-205. Springer, Germany ISBN 978-3-319-47879-1. (doi:10.1007/978-3-319-47880-7_12) (KAR id:67488)
[thumbnail of SocInfo2016-author-final.pdf]
Preview

H

Halgas, Lukas, Agrafiotis, Ioannis, Nurse, Jason R. C. (2020) Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). In: Lecture Notes in Computer Science. Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers. 11897. Springer ISBN 978-3-030-39302-1. (doi:10.1007/978-3-030-39303-8_17) (KAR id:75746)
[thumbnail of phishcatch2019.pdf]
Preview

Happa, Jassim and Nurse, Jason R.C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0026) (KAR id:67467)
[thumbnail of petras-2018-ethics.pdf]
Preview

Happa, Jassim, Fairclough, Graham, Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. . (KAR id:67494)
[thumbnail of ICISSP2016-hfnagc.pdf]
Preview

Hodges, D., Nurse, Jason R. C., Goldsmith, M., Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67527)

I

Iuga, Cristian, Nurse, Jason R. C., Erola, Arnau (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Journal of Human-centric Computing and Information Sciences, 6 (8). ISSN 2192-1962. (doi:10.1186/s13673-016-0065-2) (KAR id:67492)
[thumbnail of s13673-016-0065-2.pdf]
Preview

J

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2021) Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests. In: Proceedings of the 16th International AAAI Conference on Web and Social Media (ICWSM-22). . AAAI, USA (In press) (KAR id:89408)
[thumbnail of Anonymous_v2.pdf]
Preview

Jaffray, Alice, Finn, Conor, Nurse, Jason R. C. (2021) SherLOCKED: A Detective-themed Serious Game for Cyber Security Education. In: 15th International Symposium on Human Aspects of Information Security & Assurance (HAISA). . Springer (In press) (doi:10.1007/978-3-030-81111-2_4) (KAR id:88345)
[thumbnail of HAISA-2021-Gamification-Nurse.pdf]
Preview

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2021) The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. In: Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media (ICWSM-21). . (KAR id:87962)
[thumbnail of ICWSM_21_Emoji_preprint.pdf]
Preview
[thumbnail of ICWSM_21_Emoji_preprint.pdf]

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2020) Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. In: 14th International AAAI Conference on Web and Social Media (ICWSM). . (KAR id:80660)
[thumbnail of ICWSM-2020-JNL.pdf]
Preview

K

Knight, Richard, Nurse, Jason R. C. (2020) A Framework for Effective Corporate Communication after Cyber Security Incidents. Computers & Security, . ISSN 0167-4048. (doi:10.1016/j.cose.2020.102036) (KAR id:82836)
[thumbnail of Effective-Incident-Comms-C&S2020-Nurse-KAR.pdf]
Preview

Kingston, Charlie, Nurse, Jason R. C., Agrafiotis, Ioannis, Milich, Andrew (2018) Using semantic clustering to support situation awareness on Twitter: The case of World Views. Human-centric Computing and Information Sciences, . ISSN 2192-1962. E-ISSN 2192-1962. (doi:10.1186/s13673-018-0145-6) (KAR id:67656)
[thumbnail of s13673-018-0145-6.pdf]
Preview
[thumbnail of 2018-hcis-knam.pdf]
Preview

Kritzinger, Elmarie, Bada, Maria, Nurse, Jason R. C. (2017) A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In: Bishop, Matt and Futcher, Lynn and Miloslavskaya, Natalia and Theocharidou, Marianthi, eds. IFIP Advances in Information and Communication Technology. Information Security Education for a Global Digital Society. 503. pp. 110-120. Springer ISBN 978-3-319-58552-9. (doi:10.1007/978-3-319-58553-6_10) (KAR id:67471)
[thumbnail of 2017-wise-kbn-author-final.pdf]
Preview

Kammüller, Florian, Nurse, Jason R. C., Probst, Christian W. (2016) Attack Tree Analysis for Insider Threats on the IoT using Isabelle. In: Lecture Notes in Computer Science 9750. Lecture Notes in Computer Science . pp. 234-246. Springer, Switzerland ISBN 978-3-319-39380-3. (doi:10.1007/978-3-319-39381-0_21) (KAR id:67496)
[thumbnail of has2016_knp_author_final.pdf]
Preview

L

Lalli, Harjinder Singh, Shepherd, Lynsay A., Nurse, Jason R. C., Erola, Arnau, Epiphaniou, Gregory, Maple, Carsten, Bellekens, Xavier (2021) Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Computers & Security, . Article Number 102248. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102248) (KAR id:86976)
[thumbnail of Cyber_Security_in_the_Age_of_COVID_19.pdf]
Preview

Legg, Philip A., Moffat, Nick, Nurse, Jason R. C., Happa, Jassim, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:10.22667/JOWUA.2013.12.31.020) (KAR id:67521)
[thumbnail of jowua-v4n4-2.pdf]
Preview

M

MacColl, Jamie, Nurse, Jason R. C., Sullivan, James (2021) Cyber Insurance and the Cyber Security Challenge. RUSI Occasional Paper, . ISSN 2397-0286. (KAR id:89041)
[thumbnail of RUSI-Kent-OP-Cyber-insurance.pdf]
Preview

N

Nurse, Jason R. C. and Adamos, Konstantinos and Grammatopoulos, Athanasios and Di Franco, Fabio (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. European Union Agency for Cybersecurity (ENISA). (doi:10.2824/033355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91977)
[thumbnail of ENISA_Report-Addressing_Skills_Shortage_And_Gap_Through_Higher_Education.pdf]

Nurse, Jason R. C., Williams, Nikki, Collins, Emily, Panteli, Niki, Blythe, John, Koppelman, Ben (2021) Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy. In: 23rd International Conference on Human-Computer Interaction, 24-29 Jul 2021, Online. (doi:10.1007/978-3-030-78645-8_74) (KAR id:87308)
[thumbnail of HCII_2021-nurse-remote-working.pdf]
Preview

Nurse, Jason R. C. (2021) Cybersecurity Awareness. In: Encyclopedia of Cryptography, Security and Privacy. Springer. E-ISBN 978-3-642-27739-9. (doi:10.1007/978-3-642-27739-9_1596-1) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:86818)
[thumbnail of Cybersecurity_awareness_2021-nurse.pdf]

Nurse, Jason R. C., Axon, Louise, Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2020) The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). . IEEE (doi:10.1109/CyberSA49311.2020.9139703) (KAR id:80965)
[thumbnail of CS-2020-cyber-insurance-cr.pdf]
Preview

Nurse, Jason R. C. (2019) Cyber Resilience: What Is It And How Do We Get It? CREST Security Review Magazine, (10). pp. 22-23. ISSN 2398-0540. E-ISSN 2398-0559. (KAR id:90293)
[thumbnail of crest_magazine_crs10_hr_12.pdf]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2019) Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. In: 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). 17th IEEE International Conference on Intelligence and Security Informatics (ISI). . IEEE (doi:10.1109/ISI.2019.8823548) (KAR id:73926)
[thumbnail of ISI-2019-NNG-author-final.pdf]
Preview

Nouh, Mariam, Nurse, Jason R. C., Webb, Helena, Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society (KAR id:71674)
[thumbnail of NDSS-USEC-19-cybercrime-nnwg.pdf]
Preview

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69500)
[thumbnail of OHCP-Cybercrime-and-you-DRAFT2.pdf]

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.36) (KAR id:69501)
[thumbnail of OHCP-Group-element-of-cybercrime-DRAFT2.pdf]
Preview

Nurse, Jason R.C. and Radanliev, Petar and Creese, Sadie and De Roure, David (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0001) (KAR id:67466)
[thumbnail of 2018-petrasiet-nurse-et-al-preprint.pdf]
Preview

Nurse, Jason R. C., Buckley, Oliver (2017) Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem. Human-centric Computing and Information Sciences, 7 . Article Number 40. E-ISSN 2192-1962. (doi:10.1186/s13673-017-0121-6) (KAR id:75294)
[thumbnail of Nurse-Buckley2017_Article_BehindTheScenesACross-countryS.pdf]
Preview

Nurse, Jason R. C., Creese, Sadie, De Roure, David (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional (IT Pro), 19 (5). pp. 20-26. ISSN 1520-9202. E-ISSN 1941-045X. (doi:10.1109/MITP.2017.3680959) (KAR id:67476)
[thumbnail of 2017-itpro-ncd_author-final.pdf]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Erola, Arnau, Bada, Maria, Roberts, Taylor, Williams, Meredydd, Goldsmith, Michael, Creese, Sadie (2017) An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. In: Tryfonas, Theo, ed. Lecture Notes in Computer Science. Human Aspects of Information Security, Privacy and Trust. HAS 2017. 10292. Springer ISBN 978-3-319-58459-1. (doi:10.1007/978-3-319-58460-7_26) (KAR id:67478)
[thumbnail of 2017-has-nurse-et-al-preprint.pdf]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2017) Towards Designing a Multipurpose Cybercrime Intelligence Framework. In: Brynielsson, Joel and Johansson, Fredrik, eds. 2016 European Intelligence and Security Informatics Conference (EISIC 2016). . IEEE ISBN 978-1-5090-2858-0. E-ISBN 978-1-5090-2857-3. (doi:10.1109/EISIC.2016.018) (KAR id:67483)
[thumbnail of EISIC2016-author-final.pdf]
Preview

Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)
[thumbnail of jowua-v8n1-0.pdf]
Preview

Nurse, Jason R. C., Erola, Arnau, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2016) Analytics for characterising and measuring the naturalness of online personae. Security Informatics Journal, 5 (3). Article Number 3. ISSN 2190-8532. (doi:10.1186/s13388-016-0028-1) (KAR id:67486)
[thumbnail of s13388-016-0028-1.pdf]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford (KAR id:67481)
[thumbnail of 2016-cyberstudiespaper-nurse-et-al.pdf]
Preview

Nurse, Jason R. C., Atamli, Ahmad, Martin, Andrew (2016) Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. In: Human Aspects of Information Security, Privacy, and Trust. 4th International Conference, HAS 2016,. the Lecture Notes in Computer Science . pp. 255-267. Springer, Switzerland ISBN 978-3-319-39380-3. E-ISBN 978-3-319-39381-0. (doi:10.1007/978-3-319-39381-0_23) (KAR id:67497)
[thumbnail of 2016_has_naa-author-final.pdf]
Preview

Nurse, Jason R. C., Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: 2015 International Workshop on Secure Internet of Things (SIoT). . pp. 5-14. IEEE E-ISBN 978-1-4673-7769-0. (doi:10.1109/SIOT.2015.10) (KAR id:67502)
[thumbnail of SIoT2015-neagc-preprint.pdf]
Preview

Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. . pp. 461-468. IEEE E-ISBN 978-1-5090-0154-5. (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67503)
[thumbnail of cit2015_nurse_et_al.pdf]

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:10.1186/s40493-015-0021-5) (KAR id:67501)
[thumbnail of jotm-n2015.pdf]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:10.1109/ICDMW.2015.88) (KAR id:67500)
[thumbnail of IEEE-ISI-ICDM.pdf]
Preview
[thumbnail of KeyPlayers_cameraReady.pdf]
Preview

Nurse, Jason R. C. (2015) Exploring the risks to identity security and privacy in cyberspace. XRDS: Crossroads, The ACM Magazine, 21 (3). pp. 42-47. ISSN 1528-4972. E-ISSN 1528-4980. (doi:10.1145/2730912) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67507)
[thumbnail of xrds2015_nurse_final_author.pdf]

Nurse, Jason R. C., Erola, Arnau, Goldsmith, Michael, Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:10.22667/JISIS.2015.02.31.070) (KAR id:67510)
[thumbnail of jisis2015_nurse_et_al.pdf]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67506)
[thumbnail of csss2015-nagclpj.pdf]

Nurse, Jason R. C., Buckley, Oliver, Legg, Philip A., Goldsmith, Michael, Creese, Sadie, Wright, Gordon R.T., Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: 2014 IEEE Security and Privacy Workshops. . IEEE E-ISBN 978-1-4799-5103-1. (doi:10.1109/SPW.2014.38) (KAR id:67518)
[thumbnail of writ2014_nurse_et_al.PDF]
Preview

Nurse, Jason R. C., Pumphrey, Jess, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust. . 40 - 47. IEEE ISBN 978-1-4799-3502-4. E-ISBN 978-1-4799-3503-1. (doi:10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67515)
[thumbnail of pst2014_nurse_et_al.pdf]

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:10.1186/2196-064X-1-5) (KAR id:67516)
[thumbnail of jtm-n2014.pdf]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67517)

Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, Gordon, Whitty, Monica, Upton, David, Goldsmith, Michael, Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: HAS 2014: Human Aspects of Information Security, Privacy, and Trust. . Springer ISBN 978-3-319-07619-5. E-ISBN 978-3-319-07620-1. (doi:10.1007/978-3-319-07620-1_24) (KAR id:67519)
[thumbnail of has2014_paper.pdf]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2013) Building Confidence in Information-Trustworthiness Metrics for Decision Support. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. . IEEE E-ISBN 978-0-7695-5022-0. (doi:10.1109/TrustCom.2013.6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67524)
[thumbnail of trustcom2013_nacgl.pdf]

Nurse, Jason R. C., Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2013) Communicating Trustworthiness using Radar Graphs: A Detailed Look. In: 2013 Eleventh Annual Conference on Privacy, Security and Trust. . IEEE E-ISBN 978-1-4673-5839-2. (doi:10.1109/PST.2013.6596085) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67523)
[thumbnail of PST2013_97.pdf]

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael (2013) At the Crossroads: Cybersecurity and Psychology. In: Annual Cyberpsychology Conference. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67522)

Nurse, Jason R. C. (2013) Effective Communication of Cyber Security Risks. In: 7th International Scientific Conference on Security and Protection of Information (SPI 2013). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67525)

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Rahman, Syed S. (2013) Supporting Human Decision-Making Online using Information Trustworthiness Metrics. In: HAS 2013: Human Aspects of Information Security, Privacy, and Trust. . pp. 316-325. Springer ISBN 978-3-642-39344-0. E-ISBN 978-3-642-39345-7. (doi:10.1007/978-3-642-39345-7_33) (KAR id:67526)
[thumbnail of has2013_ncgr.pdf]
Preview

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2012) Using Information Trustworthiness Advice in Decision-Making. In: 2012 Workshop on Socio-Technical Aspects in Security and Trust. . pp. 35-42. IEEE ISBN 978-1-4673-2748-0. (doi:10.1109/STAST.2012.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67529)
[thumbnail of stast2012_ncgl.pdf]

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Craddock, Rachel, Jones, Glyn (2012) An Initial Usability Evaluation of the Secure Situation Awareness System. In: The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). (KAR id:67531)
[thumbnail of ISCRAM2012_ncgcj_final.pdf]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2012) Towards A Model to Support the Reconciliation of Security Actions across Enterprises. In: The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). (doi:10.1109/STAST.2012.11) (KAR id:67530)
[thumbnail of stast2012_ns.pdf]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2011) A Case Study Analysis of an E-Business Security Negotiations Support Tool. In: Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, 90 . Springer. (doi:10.1007/978-94-007-1192-1_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67533)

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: 2011 Third International Workshop on Cyberspace Safety and Security (CSS). 2011 Third International Workshop on Cyberspace Safety and Security (CSS). . pp. 21-26. IEEE ISBN 978-1-4577-1034-6. E-ISBN 978-1-4577-1035-3. (doi:10.1109/CSS.2011.6058566) (KAR id:67535)
[thumbnail of CSS2011_NCGL_authors_final.pdf]
Preview

Nurse, Jason R. C., Rahman, Syed Sadiqur, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Information Quality and Trustworthiness: A Topical State-of-the-Art Review. In: The International Conference on Computer Applications and Network Security (ICCANS) 2011. (KAR id:67536)
[thumbnail of ICCANS2011_NRCGL_final.pdf]
Preview

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Trustworthy and Effective Communication of Cybersecurity Risks: A Review. In: The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:10.1109/STAST.2011.6059257) (KAR id:67534)
[thumbnail of STAST2011_NCGL_authors_final.pdf]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2010) A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool. International Journal of Computer Science, 37 (4). (KAR id:67537)
[thumbnail of ijcs_37_4_07.pdf]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2010) Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations. In: International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010). (KAR id:67539)
[thumbnail of wce2010_jrcn.pdf]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2010) An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it. International Journal On Advances in Security, 3 (3&). (KAR id:67538)
[thumbnail of ijas2010.pdf]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2010) A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations. In: 5th International Conference on Internet and Web Applications and Services (ICIW 2010). (doi:10.1109/ICIW.2010.10) (KAR id:67540)
[thumbnail of iciw2010_jrcn.pdf]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. In: 2009 Fourth International Conference on Internet and Web Applications and Services. IEEE. ISBN 978-1-4244-3851-8. (doi:10.1109/ICIW.2009.48) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67543)

Nurse, Jason R. C., Sinclair, Jane E. (2009) Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS. International Journal on Advances in Internet Technology, 2 (4). (KAR id:67541)
[thumbnail of inttech_v2_n4_2009_paper1.pdf]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development. In: Business Information Systems. Lecture Notes in Business Information Processing, 21 . Springer-Verlag. (doi:10.1007/978-3-642-01190-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67542)

P

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67512)
[thumbnail of csss2015_phillips_et_al.pdf]

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67504)
[thumbnail of sotics2015-pngc.pdf]

R

Radanliev, Petar, De Roure, David, Page, Kevin, Nurse, Jason R. C., Montalvo, Rafael Mantilla, Santos, Omar, Maddox, La'Treall, Burnap, Peter (2020) Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity, . E-ISSN 2523-3246. (doi:10.1186/s42400-020-00052-8) (KAR id:81278)
[thumbnail of Cybersecurity20-Cyber-risk-at-the-edge.pdf]
Preview

Radanliev, Petar, De Roure, David, Nurse, Jason R. C., Montalvo, Rafael Mantilla, Cannady, Stacy, Santos, Omar, Madox, La'Treall, Burnap, Peter, Maple, Carsten (2020) Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Applied Sciences, 2 . Article Number 169. ISSN 2523-3971. E-ISSN 2523-3971. (doi:10.1007/s42452-019-1931-0) (KAR id:79403)
[thumbnail of Future developments in standardisation of cyber risk in the IoT - author final.pdf]
Preview

Radanliev, Petar and De Roure, David and Nurse, Jason R.C. and Nicolescu, Razvan and Huth, Michael and Cannady, Stacy and Montalvo, Rafael Mantilla (2018) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0041) (KAR id:67464)
[thumbnail of Integration+of+Cyber+Security+Frameworks+Models+and+Approaches+for+Building+Design+Principles+for+the+Internet_of_Things+in+.pdf]
Preview

Rashid, Tabish, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models. In: MIST '16: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. CCS Computer and Communications Security . pp. 47-56. ACM, New York, USA ISBN 978-1-4503-4571-2. (doi:10.1145/2995959.2995964) (KAR id:67482)
[thumbnail of MIST2016-RAN-AuthorFinal.pdf]
Preview

S

Sharma, Suraj, Brennan, Joseph, Nurse, Jason R. C. (2021) StockBabble: A Conversational Financial Agent to support Stock Market Investors. In: Proceedings of the 3rd Conference on Conversational User Interfaces (CUI 2021). . ACM E-ISBN 978145038998. (doi:10.1145/3469595.3469620) (KAR id:88386)
[thumbnail of CUI-2021-FinBot-Nurse.pdf]
Preview

Sullivan, James, Nurse, Jason R. C. (2021) Cyber Security Incentives and the Role of Cyber Insurance. RUSI Emerging Insights Paper, . (KAR id:89042)
[thumbnail of RUSI-Kent-EIP-Cyber-insurance.pdf]
Preview

Stevens, Francesca, Nurse, Jason R.C., Arief, Budi (2020) Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, . ISSN 2152-2715. (doi:10.1089/cyber.2020.0253) (KAR id:83544)
[thumbnail of Cyber Abuse Impact on Adult Mental Health - AAM.pdf]
Preview

Shere, Anjuli R. K. and Nurse, Jason R. C. and Flechais, Ivan (2020) Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. ISBN 978-1-72818-598-9. E-ISBN 978-1-72818-597-2. (doi:10.1109/EuroSPW51379.2020.00039) (KAR id:80999)
[thumbnail of EuroUSEC-2020-Journalists-IoT-Risks.pdf]
Preview

Sirur, Sean, Nurse, Jason R. C., Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS). CCS Computer and Communications Security . pp. 88-95. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267368) (KAR id:68765)
[thumbnail of 2018-CCS-MPS-snw-author-final.pdf]
Preview

Sturgess, Jack and Nurse, Jason R.C. and Zhao, Jun (2018) A capability-oriented approach to assessing privacy risk in smart home ecosystems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0037) (KAR id:67465)
[thumbnail of 2018-petras-iet-snz_author-final.pdf]
Preview

T

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) "It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. In: 2022 ACM CHI Conference on Human Factors in Computing Systems. . ACM ISBN 978-1-4503-9156-6. (In press) (doi:10.1145/3491101.3503577) (KAR id:92356)
[thumbnail of CHI-2022-Smart-Home-Security.pdf]
Preview

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) When Googling it doesn’t work: The challenge of finding security advice for smart home devices. In: Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology. 613. Springer ISBN 978-3-030-81110-5. E-ISBN 978-3-030-81111-2. (doi:10.1007/978-3-030-81111-2_10) (KAR id:88357)
[thumbnail of HAISA_2021_Website_review.pdf]
Preview

U

Uchendu, Betsy, Nurse, Jason R.C., Bada, Maria, Furnell, Steven (2021) Developing a Cyber Security Culture: Current Practices and Future Needs. Computers & Security, . ISSN 0167-4048. (doi:10.1016/j.cose.2021.102387) (KAR id:88878)
[thumbnail of Cyber-Security-Culture-2021-Nurse-KAR.pdf]
Preview

V

van Rensburg, Alastair Janse, Nurse, Jason R. C., Goldsmith, Michael (2016) Attacker-Parametrised Attack Graphs. In: The Tenth International Conference on Emerging Security Information, Systems and Technologies, July 24th-28th 2016, France Nice. (KAR id:67490)
[thumbnail of 2016-securware-rng.pdf]
Preview

W

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2019) (Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games. International Journal of Human-Computer Studies, 132 . pp. 127-137. ISSN 1071-5819. (doi:10.1016/j.ijhcs.2019.07.012) (KAR id:75624)
[thumbnail of IJHCS-paper.pdf]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2019) Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior, 99 . pp. 38-54. ISSN 0747-5632. (doi:10.1016/j.chb.2019.04.026) (KAR id:73887)
[thumbnail of CHB-2019-WNC.pdf]
Preview

Webb, Helena, Nurse, Jason R. C., Bezuidenhout, Louise, Jirotka, Marina (2019) Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges. In: 2019 CHI Conference on Human Factors in Computing Systems Extended Abstracts. . ACM ISBN 978-1-4503-5971-9. (doi:10.1145/3290607.3299063) (KAR id:71381)
[thumbnail of CHI-2019-Labhackathons-camera-ready.pdf]
Preview

Woods, Daniel, Agrafiotis, Ioannis, Nurse, Jason R. C., Creese, Sadie (2017) Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms. Journal of Internet Services and Applications, 8 (8). ISSN 1867-4828. (doi:10.1186/s13174-017-0059-y) (KAR id:67473)
[thumbnail of jisa-cyber-insurance-2017.pdf]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy Salience: Taxonomies and Research Opportunities. In: Lehmann, Anja and Whitehouse, Diane and Fischer-Hübner, Simone and Fritsch, Lothar and Raab, Charles, eds. Privacy and Identity Management. Facing up to Next Steps. IFIP Advances in Information and Communication Technology . Springer, pp. 263-278. ISBN 978-3-319-55782-3. (doi:10.1007/978-3-319-55783-0_18) (KAR id:67477)
[thumbnail of privacy-salience-paper.pdf]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada. (KAR id:67472)
[thumbnail of 2017-pst-wnc-preprint.pdf]
Preview

Williams, Meredydd, Yao, Kelvin, Nurse, Jason R. C. (2017) ToARist: An Augmented Reality Tourism App created through User-Centred Design. In: Electronic Workshops in Computing. Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017). . BCS ISBN 14779358. (doi:10.14236/ewic/HCI2017.1) (KAR id:67475)
[thumbnail of 2017-bcshci-wyn.pdf]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:10.1109/ARES.2016.25) (KAR id:67485)
[thumbnail of ARES2016-author-final.pdf]
Preview

Williams, Meredydd, Axon, Louise, Nurse, Jason R. C., Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:10.1109/RTSI.2016.7740625) (KAR id:67487)
[thumbnail of Future Scenarios.pdf]
Preview

Williams, Meredydd, Nurse, Jason R. C. (2016) Optional data disclosure and the online privacy paradox: A UK perspective. In: Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human?Computer Interaction (HCI)., July 17-22, Toronto, ON, Canada,. (doi:10.1007/978-3-319-39381-0_17) (KAR id:67491)
[thumbnail of HCII2016_wn_author_final.pdf]
Preview

Williams, Meredydd, Nurse, Jason R. C. (2016) Perspectives on privacy in the use of online systems. In: Electronic Workshops in Computing. Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI 2016). . pp. 1-3. BCS (doi:10.5555/3114770.3114797) (KAR id:67484)
[thumbnail of bhci2016-perspectives-privacy.pdf]
Preview
[thumbnail of Perspectives on Privacy.pdf]
Preview

Wu, Tina, Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10 (4). pp. 79-96. ISSN 1558-7215. (KAR id:67499)
[thumbnail of 349-1324-1-PB.pdf]
Preview

Y

Yang, Shanshan, Joy, Mike S., Nurse, Jason R. C. (2011) Experiences on Sharing E-Learning Resources using Service Technologies. In: 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011). (doi:10.2316/P.2011.734-060) (KAR id:67532)
[thumbnail of yang_joy_nurse_cate2011.pdf]
Preview

Z

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2022) A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. In: 2022 ACM/SIGAPP Symposium On Applied Computing. . ACM (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92440)
[thumbnail of SAC2022-online-hate.pdf]

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2020) #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. In: 5th IEEE European Symposium on Security and Privacy Workshops. EUROS&PW 2020. . IEEE ISBN 978-1-72818-597-2. (doi:10.1109/EuroSPW51379.2020.00065) (KAR id:81140)
[thumbnail of IEEE-EuroSP-2020-WACCO-Extremism.pdf]
Preview

This list was generated on Thu Jan 20 19:31:50 2022 GMT.