Search filters

List of works by Jason R.C. Nurse

A Case Study Analysis of an E-Business Security Negotiations Support Tool

A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches

article

A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks

article

A New Take on Detecting Insider Threats

A Pragmatic System-failure Assessment and Response Model

A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations

A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK

article

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System

Analytics for characterising and measuring the naturalness of online personae

Attack Tree Analysis for Insider Threats on the IoT Using Isabelle

BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business

Baiting the hook: factors impacting susceptibility to phishing attacks

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem

article by Jason R.C. Nurse & Oliver Buckley published 2 November 2017 in Human-Centric Computing and Information Sciences

Building Confidence in Information-Trustworthiness Metrics for Decision Support

Communicating trustworthiness using radar graphs: A detailed look

Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review

scientific article published on 12 November 2020

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic

scientific article published in 2021

Determining the Veracity of Rumours on Twitter

scholarly article by Georgios Giasemidis et al published 2016 in Lecture Notes in Computer Science

Developing a cyber security culture: Current practices and future needs

scientific article published in 2021

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge

scientific article published on 22 November 2020

Experiences on Sharing eLearning Resources using Service Technologies

Exploring a Controls-Based Assessment of Infrastructure Vulnerability

Exploring the Risks to Identity Security and Privacy in Cyberspace

Future scenarios and challenges for security and privacy

Guidelines for usable cybersecurity: Past and present

Identifying Key-Players in Online Activist Groups on the Facebook Social Network

scholarly article published November 2015

Inferring social relationships from technology-level device connections

Mapping the coverage of security controls in cyber insurance proposal forms

Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective

Predicting Graphical Passwords

Privacy Salience: Taxonomies and Research Opportunities

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat

Security Risk Assessment in Internet of Things Systems

Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things

conference paper published in 2020

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics

Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development

article

Tag clouds with a twist: using tag clouds coloured by information’s trustworthiness to support situational awareness

article by Jason R.C. Nurse et al published December 2015 in Journal of Trust Management

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content

scholarly article published October 2015

The Perfect Storm: The Privacy Paradox and the Internet-of-Things

scholarly article published August 2016

The anatomy of online deception

Tools for understanding identity

Towards a Model to Support the Reconciliation of Security Actions across Enterprises

Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home

Trustworthy and effective communication of cybersecurity risks: A review

article

Understanding Insider Threat: A Framework for Characterising Attacks

Unwinding Ariadne's Identity Thread

Using Information Trustworthiness Advice in Decision Making

Using Internet Activity Profiling for Insider-threat Detection