Jason R. C. Nurse

Orcid: 0000-0003-4118-1680

Affiliations:
  • University of Oxford


According to our database1, Jason R. C. Nurse authored at least 123 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Designing Chatbots to Support Victims and Survivors of Domestic Abuse.
CoRR, 2024

2023
Learning from cyber security incidents: A systematic review and future research agenda.
Comput. Secur., September, 2023

Between a rock and a hard(ening) place: Cyber insurance in the ransomware era.
Comput. Secur., May, 2023

IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond.
IT Prof., 2023

Editorial: Technology for the greater good? The influence of (ir)responsible systems on human emotions, thinking and behavior.
Frontiers Comput. Sci., 2023

A Survey of User Perspectives on Security and Privacy in a Home Networking Environment.
ACM Comput. Surv., 2023

Exploring Cybercriminal Activities, Behaviors and Profiles.
CoRR, 2023

aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions.
CoRR, 2023

Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter.
Comput. Secur., 2023

Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

It's More Than Just Money: The Real-World Harms from Ransomware Attacks.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security.
Proc. ACM Hum. Comput. Interact., 2022

Personal information: Perceptions, types and evolution.
J. Inf. Secur. Appl., 2022

An Investigation Into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective.
Frontiers Comput. Sci., 2022

Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness.
CoRR, 2022

"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security.
CoRR, 2022

A system to calculate Cyber Value-at-Risk.
Comput. Secur., 2022

A comparison of online hate on reddit and 4chan: a case study of the 2020 US election.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Threats to Journalists from the Consumer Internet of Things.
Proceedings of the International Conference on Cybersecurity, 2022

"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Cybersecurity Awareness.
CoRR, 2021

Developing a cyber security culture: Current practices and future needs.
Comput. Secur., 2021

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021

Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review.
Cyberpsychology Behav. Soc. Netw., 2021

Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM).
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021

The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter.
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021

Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

Sharing Secrets with Agents: Improving Sensitive Disclosures Using Chatbots.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021

When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Profiling the Cybercriminal: A Systematic Review of Research.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

StockBabble: A Conversational Financial Agent to support Stock Market Investors.
Proceedings of the CUI 2021, 2021

Practitioners' Views on Cybersecurity Control Adoption and Effectiveness.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A Semi-Supervised Approach to Message Stance Classification.
IEEE Trans. Knowl. Data Eng., 2020

Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020

Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains.
Cybersecur., 2020

Developing an Augmented Reality Tourism App through User-Centred Design (Extended Version).
CoRR, 2020

A framework for effective corporate communication after cyber security incidents.
Comput. Secur., 2020

Behind the Mask: A Computational Study of Anonymous' Presence on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

Is your chatbot GDPR compliant?: Open issues in agent design.
Proceedings of the 2nd Conference on Conversational User Interfaces, 2020

2019
The language of biometrics: Analysing public perceptions.
J. Inf. Secur. Appl., 2019

Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs).
Inf. Comput. Secur., 2019

<i>(Smart)Watch Out!</i> encouraging privacy-protective behavior through interactive games.
Int. J. Hum. Comput. Stud., 2019

The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends.
CoRR, 2019

Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases.
CoRR, 2019

The Social and Psychological Impact of Cyber-Attacks.
CoRR, 2019

A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape.
CoRR, 2019

Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies.
CoRR, 2019

Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment.
CoRR, 2019

Standardisation of cyber risk impact assessment for the Internet of Things (IoT).
CoRR, 2019

Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement.
CoRR, 2019

Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
CoRR, 2019

The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations.
CoRR, 2019

Cyber risk assessment in cloud provider environments: Current models and future needs.
Comput. Secur., 2019

Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study.
Comput. Hum. Behav., 2019

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs).
Proceedings of the Information Security Applications - 20th International Conference, 2019

Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Using semantic clustering to support situation awareness on Twitter: the case of world views.
Hum. centric Comput. Inf. Sci., 2018

A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018

Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit.
CoRR, 2018

A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines.
CoRR, 2018

Sonification in security operations centres: what do security practitioners think?
CoRR, 2018

If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems.
CoRR, 2018

Are We There Yet?: Understanding the Challenges Faced in Complying with the General Data Protection Regulation (GDPR).
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Mapping the coverage of security controls in cyber insurance proposal forms.
J. Internet Serv. Appl., 2017

Security Risk Assessment in Internet of Things Systems.
IT Prof., 2017

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem.
Hum. centric Comput. Inf. Sci., 2017

Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK.
Proceedings of the Information Security Education for a Global Digital Society, 2017

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

ToARist: An Augmented Reality Tourism App created through User-Centred Design.
Proceedings of the HCI 2017, 2017

2016
Analytics for characterising and measuring the naturalness of online personae.
Secur. Informatics, 2016

Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Baiting the hook: factors impacting susceptibility to phishing attacks.
Hum. centric Comput. Inf. Sci., 2016

Determining the Veracity of Rumours on Twitter.
Proceedings of the Social Informatics - 8th International Conference, 2016

The anatomy of online deception: what makes automated text convincing?
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Future scenarios and challenges for security and privacy.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Privacy Salience: Taxonomies and Research Opportunities.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation.
Proceedings of the 8th IEEE Latin-American Conference on Communications, 2016

A Pragmatic System-failure Assessment and Response Model.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Towards Designing a Multipurpose Cybercrime Intelligence Framework.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Perspectives on privacy in the use of online systems.
Proceedings of the HCI 2016, 2016

The Perfect Storm: The Privacy Paradox and the Internet-of-Things.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015

Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems.
J. Digit. Forensics Secur. Law, 2015

Exploring the Risks to Identity Security and Privacy in Cyberspace.
XRDS, 2015

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Using Internet Activity Profiling for Insider-threat Detection.
Proceedings of the ICEIS 2015, 2015

Identifying Key-Players in Online Activist Groups on the Facebook Social Network.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Predicting Graphical Passwords.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Exploring a Controls-Based Assessment of Infrastructure Vulnerability.
Proceedings of the Risks and Security of Internet and Systems, 2015

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Understanding Insider Threat: A Framework for Characterising Attacks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Inferring social relationships from technology-level device connections.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Building Confidence in Information-Trustworthiness Metrics for Decision Support.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Communicating trustworthiness using radar graphs: A detailed look.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

2012
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards a Model to Support the Reconciliation of Security Actions across Enterprises.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

Using Information Trustworthiness Advice in Decision Making.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

An initial usability evaluation of the secure situation awareness system.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

2011
Trustworthy and effective communication of cybersecurity risks: A review.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Guidelines for usable cybersecurity: Past and present.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
A business-oriented framework for enhancing web services security for e-business.
PhD thesis, 2010

2009
Cross-Enterprise Policy Model for e-Business Web Services Security.
Proceedings of the Information Security and Digital Forensics, 2009

BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009

Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development.
Proceedings of the Business Information Systems, 12th International Conference, 2009


  Loading...