default search action
Jason R. C. Nurse
Person information
- affiliation: University of Oxford
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
Unmasking hate in the pandemic: A cross-platform study of the COVID-19 infodemic. Big Data Res. 37: 100481 (2024) - [j37]Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira:
"I don't think we're there yet": The practices and challenges of organisational learning from cyber security incidents. Comput. Secur. 139: 103699 (2024) - [j36]Gareth Mott, Sarah Turner, Jason R. C. Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan:
'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience. J. Cybersecur. 10(1) (2024) - [i62]Rahime Belen Saglam, Jason R. C. Nurse, Lisa Sugiura:
Designing Chatbots to Support Victims and Survivors of Domestic Abuse. CoRR abs/2402.17393 (2024) - [i61]Keenan Jones, Fatima Zahrah, Jason R. C. Nurse:
Embedding Privacy in Computational Social Science and Artificial Intelligence Research. CoRR abs/2404.11515 (2024) - [i60]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Security and Privacy Perspectives of People Living in Shared Home Environments. CoRR abs/2409.09363 (2024) - 2023
- [j35]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter. Comput. Secur. 125: 103008 (2023) - [j34]Gareth Mott, Sarah Turner, Jason R. C. Nurse, Jamie MacColl, James Sullivan, Anna Cartwright, Edward J. Cartwright:
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. Comput. Secur. 128: 103162 (2023) - [j33]Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira:
Learning from cyber security incidents: A systematic review and future research agenda. Comput. Secur. 132: 103309 (2023) - [j32]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Comput. Surv. 55(9): 180:1-180:38 (2023) - [j31]Andrea Szymkowiak, Lynsay A. Shepherd, Jason R. C. Nurse, Philipp Brauner, Martina Ziefle:
Editorial: Technology for the greater good? The influence of (ir)responsible systems on human emotions, thinking and behavior. Frontiers Comput. Sci. 5 (2023) - [j30]José Luis Hernández Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R. C. Nurse, J. Morris Chang:
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond. IT Prof. 25(5): 17-19 (2023) - [c66]Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's More Than Just Money: The Real-World Harms from Ransomware Attacks. HAISA 2023: 261-274 - [c65]Maria Bada, Steven Furnell, Jason R. C. Nurse, Jason Dymydiuk:
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies. HCI (35) 2023: 274-289 - [i59]Enes Altuncu, Jason R. C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme, Shujun Li:
aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. CoRR abs/2305.07796 (2023) - [i58]Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's more than just money: The real-world harms from ransomware attacks. CoRR abs/2307.02855 (2023) - [i57]Maria Bada, Jason R. C. Nurse:
Exploring Cybercriminal Activities, Behaviors and Profiles. CoRR abs/2308.15948 (2023) - 2022
- [j29]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j28]Rahime Belen Saglam, Jason R. C. Nurse, Duncan Hodges:
An Investigation Into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective. Frontiers Comput. Sci. 4 (2022) - [j27]Rahime Belen Saglam, Jason R. C. Nurse, Duncan Hodges:
Personal information: Perceptions, types and evolution. J. Inf. Secur. Appl. 66: 103163 (2022) - [j26]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-34 (2022) - [c64]Sarah Turner, Jason R. C. Nurse, Shujun Li:
"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CHI Extended Abstracts 2022: 34:1-34:8 - [c63]Anjuli R. K. Shere, Jason R. C. Nurse, Andrew Martin:
Threats to Journalists from the Consumer Internet of Things. Cyber Science 2022: 303-326 - [c62]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests. ICWSM 2022: 417-428 - [c61]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. ICWSM 2022: 429-440 - [c60]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
A comparison of online hate on reddit and 4chan: a case study of the 2020 US election. SAC 2022: 1797-1800 - [i56]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. CoRR abs/2202.01302 (2022) - [i55]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. CoRR abs/2203.09813 (2022) - [i54]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. CoRR abs/2206.02156 (2022) - [i53]Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li:
"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. CoRR abs/2206.03930 (2022) - [i52]Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. CoRR abs/2208.08193 (2022) - [i51]Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li:
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness. CoRR abs/2211.05031 (2022) - 2021
- [j25]Francesca Stevens, Jason R. C. Nurse, Budi Arief:
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review. Cyberpsychology Behav. Soc. Netw. 24(6): 367-376 (2021) - [j24]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105: 102248 (2021) - [j23]Betsy Uchendu, Jason R. C. Nurse, Maria Bada, Steven Furnell:
Developing a cyber security culture: Current practices and future needs. Comput. Secur. 109: 102387 (2021) - [c59]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - [c58]Suraj Sharma, Joseph Brennan, Jason R. C. Nurse:
StockBabble: A Conversational Financial Agent to support Stock Market Investors. CUI 2021: 25:1-25:5 - [c57]Maria Bada, Jason R. C. Nurse:
Profiling the Cybercriminal: A Systematic Review of Research. CyberSA 2021: 1-8 - [c56]Alice Jaffray, Conor Finn, Jason R. C. Nurse:
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education. HAISA 2021: 35-45 - [c55]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. HAISA 2021: 115-126 - [c54]Rahime Belen Saglam, Jason R. C. Nurse, Duncan Hodges:
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry. HCI (38) 2021: 391-399 - [c53]Oliver Buckley, Jason R. C. Nurse, Natalie Wyer, Helen Dawes, Duncan Hodges, Sally Earl, Rahime Belen Saglam:
Sharing Secrets with Agents: Improving Sensitive Disclosures Using Chatbots. HCI (38) 2021: 400-407 - [c52]Jason R. C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John M. Blythe, Ben Koppelman:
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy. HCI (39) 2021: 583-590 - [c51]Keenan Jones, Jason R. C. Nurse, Shujun Li:
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. ICWSM Workshops 2021 - [c50]Jason R. C. Nurse, Francielle Vargas, Naeemul Hassan, Dakuo Wang, Panagiotis Andriotis, Amira Ghenai, Kokil Jaidka, Eni Mustafaraj, Kenneth Joseph, Brooke Foucault Welles:
Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM). ICWSM Workshops 2021 - [i50]Jason R. C. Nurse:
Cybersecurity Awareness. CoRR abs/2103.00474 (2021) - [i49]Maria Bada, Jason R. C. Nurse:
Profiling the Cybercriminal: A Systematic Review of Research. CoRR abs/2105.02930 (2021) - [i48]Keenan Jones, Jason R. C. Nurse, Shujun Li:
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter. CoRR abs/2105.03168 (2021) - [i47]Suraj Sharma, Joseph Brennan, Jason R. C. Nurse:
StockBabble: A Conversational Financial Agent to support Stock Market Investors. CoRR abs/2106.08298 (2021) - [i46]Betsy Uchendu, Jason R. C. Nurse, Maria Bada, Steven Furnell:
Developing a cyber security culture: Current practices and future needs. CoRR abs/2106.14701 (2021) - [i45]Jason R. C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John M. Blythe, Ben Koppelman:
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy. CoRR abs/2107.03907 (2021) - [i44]Rahime Belen Saglam, Jason R. C. Nurse, Duncan Hodges:
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry. CoRR abs/2107.03959 (2021) - [i43]Alice Jaffray, Conor Finn, Jason R. C. Nurse:
SherLOCKED: A Detective-themed Serious Game for Cyber Security Education. CoRR abs/2107.04506 (2021) - [i42]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests. CoRR abs/2107.10554 (2021) - [i41]Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling it doesn't work: The challenge of finding security advice for smart home devices. CoRR abs/2108.03107 (2021) - [i40]Sarah Turner, Jason R. C. Nurse, Shujun Li:
It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. CoRR abs/2112.09035 (2021) - 2020
- [j22]Richard Knight, Jason R. C. Nurse:
A framework for effective corporate communication after cyber security incidents. Comput. Secur. 99: 102036 (2020) - [j21]Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Pete Burnap:
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecur. 3(1): 13 (2020) - [j20]Louise Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. J. Cybersecur. 6(1): tyaa004 (2020) - [j19]Georgios Giasemidis, Nikolaos Kaplis, Ioannis Agrafiotis, Jason R. C. Nurse:
A Semi-Supervised Approach to Message Stance Classification. IEEE Trans. Knowl. Data Eng. 32(1): 1-11 (2020) - [c49]Rahime Belen Saglam, Jason R. C. Nurse:
Is your chatbot GDPR compliant?: Open issues in agent design. CIU 2020: 16:1-16:3 - [c48]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [c47]Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais:
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things. EuroS&P Workshops 2020: 240-249 - [c46]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. EuroS&P Workshops 2020: 438-447 - [c45]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. ICWSM 2020: 327-338 - [i39]Meredydd Williams, Kelvin K. K. Yao, Jason R. C. Nurse:
Developing an Augmented Reality Tourism App through User-Centred Design (Extended Version). CoRR abs/2001.11131 (2020) - [i38]Rahime Belen Saglam, Jason R. C. Nurse:
Is your chatbot GDPR compliant? Open issues in agent design. CoRR abs/2005.12644 (2020) - [i37]Keenan Jones, Jason R. C. Nurse, Shujun Li:
Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. CoRR abs/2006.08273 (2020) - [i36]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. CoRR abs/2006.11929 (2020) - [i35]Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais:
Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things. CoRR abs/2008.04698 (2020) - [i34]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020) - [i33]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. CoRR abs/2008.11808 (2020) - [i32]Richard Knight, Jason R. C. Nurse:
A framework for effective corporate communication after cyber security incidents. CoRR abs/2009.09210 (2020)
2010 – 2019
- 2019
- [j18]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Comput. Hum. Behav. 99: 38-54 (2019) - [j17]Olusola Akinrolabu, Jason R. C. Nurse, Andrew P. Martin, Steve New:
Cyber risk assessment in cloud provider environments: Current models and future needs. Comput. Secur. 87 (2019) - [j16]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
(Smart)Watch Out! encouraging privacy-protective behavior through interactive games. Int. J. Hum. Comput. Stud. 132: 121-137 (2019) - [j15]Maria Bada, Jason R. C. Nurse:
Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs). Inf. Comput. Secur. 27(3): 393-410 (2019) - [j14]Oliver Buckley, Jason R. C. Nurse:
The language of biometrics: Analysing public perceptions. J. Inf. Secur. Appl. 47: 112-119 (2019) - [c44]Helena Webb, Jason R. C. Nurse, Louise Bezuidenhout, Marina Jirotka:
Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges. CHI Extended Abstracts 2019 - [c43]Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. ISI 2019: 98-103 - [c42]Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse:
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs). WISA 2019: 219-233 - [i31]Jason R. C. Nurse, Maria Bada:
The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. CoRR abs/1901.01914 (2019) - [i30]Maria Bada, M. Angela Sasse, Jason R. C. Nurse:
Cyber Security Awareness Campaigns: Why do they fail to change behaviour? CoRR abs/1901.02672 (2019) - [i29]Georgios Giasemidis, Nikolaos Kaplis, Ioannis Agrafiotis, Jason R. C. Nurse:
A semi-supervised approach to message stance classification. CoRR abs/1902.03097 (2019) - [i28]Mariam Nouh, Jason R. C. Nurse, Helena Webb, Michael Goldsmith:
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. CoRR abs/1902.06961 (2019) - [i27]Petar Radanliev, David De Roure, Jason R. C. Nurse, Rafael Mantilla Montalvo, Peter Burnap:
Standardisation of cyber risk impact assessment for the Internet of Things (IoT). CoRR abs/1903.04428 (2019) - [i26]Petar Radanliev, David Charles De Roure, Jason R. C. Nurse, Pete Burnap, Eirini Anthi, Uchenna Ani, La Treall Maddox, Omar Santos, Rafael Mantilla Montalvo:
Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment. CoRR abs/1903.12084 (2019) - [i25]Petar Radanliev, David Charles De Roure, Jason R. C. Nurse, Peter Burnap, Rafael Mantilla Montalvo:
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies. CoRR abs/1903.12582 (2019) - [i24]Uchenna Daniel Ani, Jeremy D. McK. Watson, Jason R. C. Nurse, Al Cook, Carsten Maple:
A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape. CoRR abs/1904.01551 (2019) - [i23]Helena Webb, Jason R. C. Nurse, Louise Bezuidenhout, Marina Jirotka:
Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges. CoRR abs/1904.01687 (2019) - [i22]Oliver Buckley, Jason R. C. Nurse:
The Language of Biometrics: Analysing Public Perceptions. CoRR abs/1905.04615 (2019) - [i21]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. CoRR abs/1905.05222 (2019) - [i20]Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. CoRR abs/1905.08067 (2019) - [i19]Maria Bada, Jason R. C. Nurse:
Developing cybersecurity education and awareness programmes for Small and medium-sized enterprises (SMEs). CoRR abs/1906.09594 (2019) - [i18]Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse:
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). CoRR abs/1908.03640 (2019) - [i17]Maria Bada, Jason R. C. Nurse:
The Social and Psychological Impact of Cyber-Attacks. CoRR abs/1909.13256 (2019) - [i16]Uchenna Daniel Ani, Jeremy D. McK. Watson, Benjamin Green, Barnaby Craggs, Jason R. C. Nurse:
Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases. CoRR abs/1911.01471 (2019) - [i15]Petar Radanliev, David Charles De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Peter Burnap:
The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends. CoRR abs/1911.05726 (2019) - 2018
- [j13]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [j12]Charlie Kingston, Jason R. C. Nurse, Ioannis Agrafiotis, Andrew Milich:
Using semantic clustering to support situation awareness on Twitter: the case of world views. Hum. centric Comput. Inf. Sci. 8: 22 (2018) - [c41]Sean Sirur, Jason R. C. Nurse, Helena Webb:
Are We There Yet?: Understanding the Challenges Faced in Complying with the General Data Protection Regulation (GDPR). MPS@CCS 2018: 88-95 - [e1]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - [i14]Jason R. C. Nurse, Petar Radanliev, Sadie Creese, David De Roure:
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. CoRR abs/1806.10906 (2018) - [i13]Meredydd Williams, Jason R. C. Nurse:
Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective. CoRR abs/1807.05738 (2018) - [i12]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future Scenarios and Challenges for Security and Privacy. CoRR abs/1807.05746 (2018) - [i11]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. CoRR abs/1807.05754 (2018) - [i10]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. CoRR abs/1807.05756 (2018) - [i9]Meredydd Williams, Kelvin K. K. Yao, Jason R. C. Nurse:
ToARist: An Augmented Reality Tourism App created through User-Centred Design. CoRR abs/1807.05759 (2018) - [i8]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things. CoRR abs/1807.05761 (2018) - [i7]Charlie Kingston, Jason R. C. Nurse, Ioannis Agrafiotis, Andrew Milich:
Using semantic clustering to support situation awareness on Twitter: The case of World Views. CoRR abs/1807.06588 (2018) - [i6]Louise M. Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Sonification in security operations centres: what do security practitioners think? CoRR abs/1807.06706 (2018) - [i5]Sean Sirur, Jason R. C. Nurse, Helena Webb:
Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). CoRR abs/1808.07338 (2018) - [i4]Aastha Madaan, Jason R. C. Nurse, David De Roure, Kieron O'Hara, Wendy Hall, Sadie Creese:
A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines. CoRR abs/1809.05904 (2018) - [i3]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. CoRR abs/1811.03290 (2018) - [i2]Jason R. C. Nurse:
Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. CoRR abs/1811.06624 (2018) - 2017
- [j11]Jason R. C. Nurse, Oliver Buckley:
Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem. Hum. centric Comput. Inf. Sci. 7: 40 (2017) - [j10]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. IT Prof. 19(5): 20-26 (2017) - [j9]Daniel W. Woods, Ioannis Agrafiotis, Jason R. C. Nurse, Sadie Creese:
Mapping the coverage of security controls in cyber insurance proposal forms. J. Internet Serv. Appl. 8(1): 8:1-8:13 (2017) - [j8]Jason R. C. Nurse, Elisa Bertino:
Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 1-3 (2017) - [c40]Meredydd Williams, Kelvin K. K. Yao, Jason R. C. Nurse:
ToARist: An Augmented Reality Tourism App created through User-Centred Design. BCS HCI 2017 - [c39]Angeliki Aktypi, Jason R. C. Nurse, Michael Goldsmith:
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. MPS@CCS 2017: 1-11 - [c38]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - [c37]Elmarie Kritzinger, Maria Bada, Jason R. C. Nurse:
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK. World Conference on Information Security Education 2017: 110-120 - [c36]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. PST 2017: 181-190 - 2016
- [j7]Cristian Iuga, Jason R. C. Nurse, Arnau Erola:
Baiting the hook: factors impacting susceptibility to phishing attacks. Hum. centric Comput. Inf. Sci. 6: 8 (2016) - [j6]Chika Eze, Jason R. C. Nurse, Jassim Happa:
Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 39-57 (2016) - [j5]Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Analytics for characterising and measuring the naturalness of online personae. Secur. Informatics 5(1): 3 (2016) - [c35]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. ARES 2016: 644-652 - [c34]Meredydd Williams, Jason R. C. Nurse:
Perspectives on privacy in the use of online systems. BCS HCI 2016 - [c33]Tabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse:
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models. MIST@CCS 2016: 47-56 - [c32]Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Towards Designing a Multipurpose Cybercrime Intelligence Framework. EISIC 2016: 60-67 - [c31]Meredydd Williams, Jason R. C. Nurse:
Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective. HCI (20) 2016: 186-197 - [c30]Florian Kammüller, Jason R. C. Nurse, Christian W. Probst:
Attack Tree Analysis for Insider Threats on the IoT Using Isabelle. HCI (20) 2016: 234-246 - [c29]Jason R. C. Nurse, Ahmad Atamli, Andrew P. Martin:
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. HCI (20) 2016: 255-267 - [c28]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c27]Abraham Rodriguez-Mota, Ponciano Jorge Escamilla-Ambrosio, Jassim Happa, Jason R. C. Nurse:
Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation. LATINCOM 2016: 1-6 - [c26]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. Privacy and Identity Management 2016: 263-278 - [c25]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future scenarios and challenges for security and privacy. RTSI 2016: 1-6 - [c24]Richard M. Everett, Jason R. C. Nurse, Arnau Erola:
The anatomy of online deception: what makes automated text convincing? SAC 2016: 1115-1120 - [c23]Georgios Giasemidis, Colin Singleton, Ioannis Agrafiotis, Jason R. C. Nurse, Alan Pilgrim, Chris Willis, Danica Vukadinovic Greetham:
Determining the Veracity of Rumours on Twitter. SocInfo (1) 2016: 185-205 - [i1]Georgios Giasemidis, Colin Singleton, Ioannis Agrafiotis, Jason R. C. Nurse, Alan Pilgrim, Chris Willis, Danica Vukadinovic Greetham:
Determining the Veracity of Rumours on Twitter. CoRR abs/1611.06314 (2016) - 2015
- [j4]Jason R. C. Nurse:
Exploring the Risks to Identity Security and Privacy in Cyberspace. XRDS 21(3): 42-47 (2015) - [j3]Tina Wu, Jason R. C. Nurse:
Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. J. Digit. Forensics Secur. Law 10(4): 79-96 (2015) - [j2]Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. J. Internet Serv. Inf. Secur. 5(1): 70-84 (2015) - [c22]Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts:
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content. CIT/IUCC/DASC/PICom 2015: 461-468 - [c21]Oliver J. Farnan, Jason R. C. Nurse:
Exploring a Controls-Based Assessment of Infrastructure Vulnerability. CRiSIS 2015: 144-159 - [c20]Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. HCI (22) 2015: 23-35 - [c19]Mariam Nouh, Jason R. C. Nurse:
Identifying Key-Players in Online Activist Groups on the Facebook Social Network. ICDM Workshops 2015: 969-978 - [c18]Bushra A. AlAhmadi, Philip A. Legg, Jason R. C. Nurse:
Using Internet Activity Profiling for Insider-threat Detection. ICEIS (2) 2015: 709-720 - [c17]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [c16]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c15]Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Inferring social relationships from technology-level device connections. PST 2014: 40-47 - [c14]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - [c13]Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. STAST 2014: 8-15 - 2013
- [j1]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c12]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. HCI (27) 2013: 316-325 - [c11]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c10]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - 2012
- [c9]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Rachel Craddock, Glyn Jones:
An initial usability evaluation of the secure situation awareness system. ISCRAM 2012 - [c8]Jason R. C. Nurse, Jane E. Sinclair:
Towards a Model to Support the Reconciliation of Security Actions across Enterprises. STAST 2012: 11-18 - [c7]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Using Information Trustworthiness Advice in Decision Making. STAST 2012: 35-42 - [c6]Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. TrustCom 2012: 1124-1131 - 2011
- [c5]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Guidelines for usable cybersecurity: Past and present. CSS 2011: 21-26 - [c4]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Trustworthy and effective communication of cybersecurity risks: A review. STAST 2011: 60-68 - 2010
- [b1]Jason R. C. Nurse:
A business-oriented framework for enhancing web services security for e-business. University of Warwick, Coventry, UK, 2010
2000 – 2009
- 2009
- [c3]Jason R. C. Nurse, Jane E. Sinclair:
Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development. BIS 2009: 61-72 - [c2]Jason R. C. Nurse, Jane E. Sinclair:
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. ICIW 2009: 286-291 - [c1]Tanko Ishaya, Jason R. C. Nurse:
Cross-Enterprise Policy Model for e-Business Web Services Security. ISDF 2009: 163-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint