Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 93.

Article

Buckley, Oliver and Nurse, Jason R. C. (2019) The Language of Biometrics: Analysing Public Perceptions. Journal of Information Security and Applications, . E-ISSN 2214-2126. (doi:https://doi.org/10.1016/j.jisa.2019.05.001) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2019) Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior, . ISSN 0747-5632. (doi:https://doi.org/10.1016/j.chb.2019.04.026) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bada, Maria and Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, . ISSN 2056-4961. (In press) (doi:https://doi.org/10.1108/ICS-07-2018-0080) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Giasemidis, Georgios and Kaplis, Nikolaos and Agrafiotis, Ioannis and Nurse, Jason R. C. (2018) A semi-supervised approach to message stance classification. IEEE Transactions on Knowledge and Data Engineering, . ISSN 1041-4347. E-ISSN 1558-2191. (doi:https://doi.org/10.1109/TKDE.2018.2880192) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Agrafiotis, Ioannis and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:https://doi.org/10.1093/cybsec/tyy006) (Full text available)
[img]
Preview
[img]
Preview

Kingston, Charlie and Nurse, Jason R. C. and Agrafiotis, Ioannis and Milich, Andrew (2018) Using semantic clustering to support situation awareness on Twitter: The case of World Views. Human-centric Computing and Information Sciences, . ISSN 2192-1962. E-ISSN 2192-1962. (doi:https://doi.org/10.1186/s13673-018-0145-6) (Full text available)
[img]
Preview
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and De Roure, David (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional (IT Pro), 19 (5). pp. 20-26. ISSN 1520-9202. E-ISSN 1941-045X. (doi:https://doi.org/10.1109/MITP.2017.3680959) (Full text available)
[img]
Preview

Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason R. C. and Creese, Sadie (2017) Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms. Journal of Internet Services and Applications, 8 (8). ISSN 1867-4828. (doi:https://doi.org/10.1186/s13174-017-0059-y) (Full text available)
[img]
Preview

Axon, Louise and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (Full text available)
[img]
Preview

Nurse, Jason R. C. and Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:https://doi.org/10.22667/JOWUA.2017.03.31.001) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy salience: Taxonomies and research opportunities. Privacy and Identity Management – Facing Up To Next Steps, IFIP Advances in Information and Communication Technology, . (doi:https://doi.org/10.1007/978-3-319-55783-0_18) (Full text available)
[img]
Preview

Eggenschwiler, Jacqueline and Agrafiotis, Ioannis and Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, . ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(16)30091-4) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie (2016) Analytics for characterising and measuring the naturalness of online personae. Security Informatics Journal, 5 (3). ISSN 2190-8532. (doi:https://doi.org/10.1186/s13388-016-0028-1) (Full text available)
[img]
Preview

Iuga, Cristian and Nurse, Jason R. C. and Erola, Arnau (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Journal of Human-centric Computing and Information Sciences, 6 (8). ISSN 2192-1962. (doi:https://doi.org/10.1186/s13673-016-0065-2) (Full text available)
[img]
Preview

Eze, Chika and Nurse, Jason R. C. and Happa, Jassim (2016) Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7 (1). ISSN 2093-5382. (doi:https://doi.org/10.22667/JOWUA.2016.03.31.039) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:https://doi.org/10.1186/s40493-015-0021-5) (Full text available)
[img]
Preview

Wu, Tina and Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10 (4). pp. 79-96. ISSN 1558-7215. (Full text available)
[img]
Preview

Agrafiotis, Ioannis and Nurse, Jason R. C. and Buckley, Oliver and Legg, Phil and Creese, Sadie and Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:https://doi.org/10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. (2015) Exploring the risks to identity security and privacy in cyberspace. XRDS: Crossroads, The ACM Magazine, 21 (3). pp. 42-47. ISSN 1528-4972. E-ISSN 1528-4980. (doi:https://doi.org/10.1145/2730912) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Erola, Arnau and Goldsmith, Michael and Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:https://doi.org/10.22667/JISIS.2015.02.31.070) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:https://doi.org/10.1186/2196-064X-1-5) (Full text available)
[img]
Preview

Legg, Philip A. and Moffat, Nick and Nurse, Jason R. C. and Happa, Jassim and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:https://doi.org/10.22667/JOWUA.2013.12.31.020) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2010) A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool. International Journal of Computer Science, 37 (4). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2010) An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it. International Journal On Advances in Security, 3 (3&). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS. International Journal on Advances in Internet Technology, 2 (4). (Full text available)
[img]
Preview

Book section

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:https://doi.org/10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:https://doi.org/10.1093/oxfordhb/9780198812746.013.36) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Sinclair, Jane E. (2011) A Case Study Analysis of an E-Business Security Negotiations Support Tool. In: Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, 90 . Springer. (doi:https://doi.org/10.1007/978-94-007-1192-1_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development. In: Business Information Systems. Lecture Notes in Business Information Processing, 21 . Springer-Verlag. (doi:https://doi.org/10.1007/978-3-642-01190-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Monograph

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford (Full text available)
[img]
Preview

Conference or workshop item

Nouh, Mariam and Nurse, Jason R. C. and Goldsmith, Michael (2019) Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. In: 17th IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE (In press) (Full text available)
[img]
Preview

Ani, Uchenna D. and Watson, Jeremy D. McK. and Nurse, Jason R. C. and Cook, Al and Maple, Carsten (2019) A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape. In: PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT - 2019. IET (In press) (Full text available)
[img]
Preview

Webb, Helena and Nurse, Jason R. C. and Bezuidenhout, Louise and Jirotka, Marina (2019) Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges. In: 2019 CHI Conference on Human Factors in Computing Systems Extended Abstracts. ACM ISBN 978-1-4503-5971-9. (In press) (doi:https://doi.org/10.1145/3290607.3299063) (Full text available)
[img]
Preview

Nouh, Mariam and Nurse, Jason R. C. and Webb, Helena and Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). Internet Society (In press) (Full text available)
[img]
Preview

Sirur, Sean and Nurse, Jason R. C. and Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: MPS '18 Proceedings. MPS. ACM pp. 88-95. ISBN 978-1-4503-5988-7. (doi:https://doi.org/10.1145/3267357.3267368) (Full text available)
[img]
Preview

Axon, Louise M. and Alahmadi, Bushra and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). Internet Society ISBN 1-891562-53-3. (doi:https://doi.org/10.14722/usec.2018.23024) (Full text available)
[img]
Preview

Happa, Jassim and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0026) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Radanliev, Petar and Creese, Sadie and Roure, David De (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0001) (Full text available)
[img]
Preview

Radanliev, Petar and De Roure, David and Nurse, Jason R. C. and Nicolescu, Razvan and Huth, Michael and Cannady, C and Montalvo, RM (2018) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET E-ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0041) (Full text available)
[img]
Preview

Sturgess, Jack and Nurse, Jason R. C. and Zhao, Jun (2018) A capability-oriented approach to assessing privacy risk in smart home ecosystems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET E-ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0037) (Full text available)
[img]
Preview

Aktypi, Angeliki and Nurse, Jason R. C. and Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. ACM ISBN 978-1-4503-5206-2. (doi:https://doi.org/10.1145/3137616.3137617) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2017) An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. In: Tryfonas, Theo, ed. Lecture Notes in Computer Science. Human Aspects of Information Security, Privacy and Trust. HAS 2017. Springer ISBN 978-3-319-58459-1. (doi:https://doi.org/10.1007/978-3-319-58460-7_26) (Full text available)
[img]
Preview

Nouh, Mariam and Nurse, Jason R. C. and Goldsmith, Michael (2017) Towards Designing a Multipurpose Cybercrime Intelligence Framework. In: Brynielsson, Joel and Johansson, Fredrik, eds. 2016 European Intelligence and Security Informatics Conference (EISIC 2016). IEEE ISBN 978-1-5090-2856-6. (doi:https://doi.org/10.1109/EISIC.2016.018) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada. (Full text available)
[img]
Preview

Williams, Meredydd and Yao, Kelvin and Nurse, Jason R. C. (2017) ToARist: An Augmented Reality Tourism App created through User-Centred Design. In: Electronic Workshops in Computing. Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017). BCS ISBN 14779358. (doi:https://doi.org/10.14236/ewic/HCI2017.1) (Full text available)
[img]
Preview

Kritzinger, Elmarie and Bada, Maria and Nurse, Jason R. C. (2017) A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In: Bishop, Matt and Futcher, Lynn and Miloslavskaya, Natalia and Theocharidou, Marianthi, eds. IFIP Advances in Information and Communication Technology. Information Security Education for a Global Digital Society. Springer pp. 110-120. ISBN 978-3-319-58552-9. (doi:https://doi.org/10.1007/978-3-319-58553-6_10) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:https://doi.org/10.1109/ARES.2016.25) (Full text available)
[img]
Preview

Williams, Meredydd and Axon, Louise and Nurse, Jason R. C. and Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:https://doi.org/10.1109/RTSI.2016.7740625) (Full text available)
[img]
Preview

Rashid, Tabish and Agrafiotis, Ioannis and Nurse, Jason R. C. (2016) A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models. In: MIST '16: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. ACM ISBN 978-1-4503-4571-2. (doi:https://doi.org/10.1145/2995959.2995964) (Full text available)
[img]
Preview

Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R. C. and Pilgrim, Alan and Willis, Chris (2016) Determining the veracity of rumours on Twitter. In: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I. Part of the Lecture Notes in Computer Science book series. Springer, Germany pp. 185-205. ISBN 978-3-319-47879-1. (doi:https://doi.org/10.1007/978-3-319-47880-7_12) (Full text available)
[img]
Preview

Kammüller, Florian and Nurse, Jason R. C. and Probst, Christian W. (2016) Attack Tree Analysis for Insider Threats on the IoT using Isabelle. In: Lecture Notes in Computer Science 9750. Lecture Notes in Computer Science. Springer, Switzerland pp. 234-246. ISBN 978-3-319-39380-3. (doi:https://doi.org/10.1007/978-3-319-39381-0_21) (Full text available)
[img]
Preview

van Rensburg, Alastair Janse and Nurse, Jason R. C. and Goldsmith, Michael (2016) Attacker-Parametrised Attack Graphs. In: The Tenth International Conference on Emerging Security Information, Systems and Technologies, July 24th-28th 2016, France Nice. (Full text available)
[img]
Preview

Farnan, Oliver and Nurse, Jason R. C. (2016) Exploring a Controls-Based Assessment of Infrastructure Vulnerability. In: 10th Risks and Security of Internet and Systems. CRiSIS 2015, July 20-22 2015, Greece. (doi:https://doi.org/10.1007/978-3-319-31811-0_9) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. (2016) Optional data disclosure and the online privacy paradox: A UK perspective. In: Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human?Computer Interaction (HCI)., July 17-22, Toronto, ON, Canada,. (doi:https://doi.org/10.1007/978-3-319-39381-0_17) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Atamli, Ahmad and Martin, Andrew (2016) Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. In: Human Aspects of Information Security, Privacy, and Trust. 4th International Conference, HAS 2016,. the Lecture Notes in Computer Science. Springer, Switzerland pp. 255-267. ISBN 978-3-319-39380-3. E-ISBN 978-3-319-39381-0. (doi:https://doi.org/10.1007/978-3-319-39381-0_23) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: 2015 International Workshop on Secure Internet of Things (SIoT). IEEE, Germany pp. 5-14. ISBN 978-1-4673-7769-0. (doi:https://doi.org/10.1109/SIOT.2015.10) (Full text available)
[img]
Preview

Everett, Richard and Nurse, Jason R. C. and Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:https://doi.org/10.1145/2851613.2851813) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. (2016) Perspectives on privacy in the use of online systems. In: Electronic Workshops in Computing. Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI 2016). BCS (Full text available)
[img]
Preview
[img]
Preview

Happa, Jassim and Fairclough, Graham and Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. (Full text available)
[img]
Preview

Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: ThinkMind. IARIA pp. 254-261. ISBN 978-1-61208-493-0. (Full text available)
[img]
Preview

Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE pp. 461-468. E-ISBN 978-1-5090-0154-5. (doi:https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nouh, Mariam and Nurse, Jason R. C. and Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:https://doi.org/10.1109/ICDMW.2015.88) (Full text available)
[img]
Preview
[img]
Preview

Devlin, Matthieu and Nurse, Jason R. C. and Hodges, Duncan and Goldsmith, Michael and Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190. Springer pp. 23-35. ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:https://doi.org/10.1007/978-3-319-20376-8_3) (Full text available)
[img]
Preview

Phillips, Elizabeth and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bada, Maria and Sasse, Angela and Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society. (Full text available)
[img]
Preview

Phillips, Elizabeth and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Carvalho, Rodrigo and Goldsmith, Michael and Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alahmadi, Bushra A. and Legg, Philip .A. and Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). SciTePress pp. 709-720. ISBN 978-989-758-097-0. (doi:https://doi.org/10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. IEEE E-ISBN 978-1-4799-7901-1. (doi:https://doi.org/10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Buckley, Oliver and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie and Wright, Gordon R.T. and Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: 2014 IEEE Security and Privacy Workshops. IEEE E-ISBN 978-1-4799-5103-1. (doi:https://doi.org/10.1109/SPW.2014.38) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Pumphrey, Jess and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust. IEEE 40 - 47. ISBN 978-1-4799-3502-4. E-ISBN 978-1-4799-3503-1. (doi:https://doi.org/10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE E-ISBN 978-1-4799-1535-4. (doi:https://doi.org/10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: HAS 2014: Human Aspects of Information Security, Privacy, and Trust. Springer ISBN 978-3-319-07619-5. E-ISBN 978-3-319-07620-1. (doi:https://doi.org/10.1007/978-3-319-07620-1_24) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2013) Building Confidence in Information-Trustworthiness Metrics for Decision Support. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE E-ISBN 978-0-7695-5022-0. (doi:https://doi.org/10.1109/TrustCom.2013.6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2013) Communicating Trustworthiness using Radar Graphs: A Detailed Look. In: 2013 Eleventh Annual Conference on Privacy, Security and Trust. IEEE E-ISBN 978-1-4673-5839-2. (doi:https://doi.org/10.1109/PST.2013.6596085) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael (2013) At the Crossroads: Cybersecurity and Psychology. In: Annual Cyberpsychology Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. (2013) Effective Communication of Cyber Security Risks. In: 7th International Scientific Conference on Security and Protection of Information (SPI 2013). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Rahman, Syed S. (2013) Supporting Human Decision-Making Online using Information Trustworthiness Metrics. In: HAS 2013: Human Aspects of Information Security, Privacy, and Trust. Springer pp. 316-325. ISBN 978-3-642-39344-0. E-ISBN 978-3-642-39345-7. (doi:https://doi.org/10.1007/978-3-642-39345-7_33) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2012) Using Information Trustworthiness Advice in Decision-Making. In: 2012 Workshop on Socio-Technical Aspects in Security and Trust. IEEE pp. 35-42. ISBN 978-1-4673-2748-0. (doi:https://doi.org/10.1109/STAST.2012.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE pp. 1124-1131. ISBN 978-1-4673-2172-3. (doi:https://doi.org/10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hodges, D. and Nurse, Jason R. C. and Goldsmith, M. and Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn (2012) An Initial Usability Evaluation of the Secure Situation Awareness System. In: The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2012) Towards A Model to Support the Reconciliation of Security Actions across Enterprises. In: The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). (doi:https://doi.org/10.1109/STAST.2012.11) (Full text available)
[img]
Preview

Yang, Shanshan and Joy, Mike S. and Nurse, Jason R. C. (2011) Experiences on Sharing E-Learning Resources using Service Technologies. In: 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011). (doi:https://doi.org/10.2316/P.2011.734-060) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: 2011 Third International Workshop on Cyberspace Safety and Security (CSS). 2011 Third International Workshop on Cyberspace Safety and Security (CSS). IEEE pp. 21-26. ISBN 978-1-4577-1035-3. (doi:https://doi.org/10.1109/CSS.2011.6058566) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Rahman, Syed Sadiqur and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Information Quality and Trustworthiness: A Topical State-of-the-Art Review. In: The International Conference on Computer Applications and Network Security (ICCANS) 2011. (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Trustworthy and Effective Communication of Cybersecurity Risks: A Review. In: The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:https://doi.org/10.1109/STAST.2011.6059257) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2010) Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations. In: International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2010) A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations. In: 5th International Conference on Internet and Web Applications and Services (ICIW 2010). (doi:https://doi.org/10.1109/ICIW.2010.10) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. In: 4th International Conference on Internet and Web Applications and Services (ICIW 2009). (doi:https://doi.org/10.1109/ICIW.2009.48) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

This list was generated on Mon May 27 19:40:16 2019 BST.