Simon Edward Parkin

Orcid: 0000-0002-6667-0440

According to our database1, Simon Edward Parkin authored at least 50 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception.
J. Cybersecur., January, 2023

Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices.
CoRR, 2023

Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Two Sides of the Shield: Understanding Protective DNS adoption factors.
Proceedings of the 32nd USENIX Security Symposium, 2023

Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Proceedings of the 32nd USENIX Security Symposium, 2023

"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security.
Proceedings of the 32nd USENIX Security Symposium, 2023

Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
"I needed to solve their overwhelmness": How System Administration Work was Affected by COVID-19.
Proc. ACM Hum. Comput. Interact., 2022

A cyber-risk framework for coordination of the prevention and preservation of behaviours.
J. Comput. Secur., 2022

The boundedly rational employee: Security economics for behaviour intervention support in organizations.
J. Comput. Secur., 2022

Drivers and barriers for secure hardware adoption across ecosystem stakeholders.
J. Cybersecur., 2022

An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation Security.
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021

2020
An analysis of perceptions and support for Windows 10 Home Edition update features.
J. Cybersecur., 2020

Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2020

Transferability of Privacy-related Behaviours to Shared Smart Home Assistant Devices.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

2019
You've Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

Identifying Unintended Harms of Cybersecurity Countermeasures.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength.
Proceedings of the 27th USENIX Security Symposium, 2018

2016
Case study: predicting the impact of a physical access control intervention.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
Proceedings of the Workshop on Security Fatigue, 2016

Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement.
Proceedings of the IEEE International Conference on Identity, 2016

Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
"Shadow security" as a tool for the learning organization.
SIGCAS Comput. Soc., 2015

A Technique for Using Employee Perception of Security to Support Usability Diagnostics.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

Assessing the User Experience of Password Reset Policies in a University.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

2014
Evaluating the Implications of Attack and Security Patterns with Premortems.
Proceedings of the Cyberpatterns, 2014

2012
Toward reusable SLA monitoring capabilities.
Softw. Pract. Exp., 2012

2011
A Community Knowledge Base for IT Security.
IT Prof., 2011

2010
A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Ontology Editing Tool for Information Security and Human Factors Experts.
Proceedings of the KMIS 2010, 2010

A collaborative ontology development tool for information security managers.
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, 2010

2009
An information security ontology incorporating human-behavioural implications.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Knowledge Base for Justified Information Security Decision-making.
Proceedings of the ICSOFT 2009, 2009

2008
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Architecting Dependable Access Control Systems for Multi-domain Computing Environments.
Proceedings of the Architecting Dependable Systems VI, 2008

2007
Monitoring middleware for distributed applications.
PhD thesis, 2007

A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services.
Proceedings of the Service Availability, 4th International Service Availability Symposium, 2007

Evolutionary optimization of parameters for distributed virtual environments.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Load balancing for massively multiplayer online games.
Proceedings of the 5th Workshop on Network and System Support for Games, 2006

Managing Missed Interactions in Distributed Virtual Environments.
Proceedings of the 12th Eurographics Symposium on Virtual Environments, 2006

2005
Monitoring Middleware for Service Level Agreements in Heterogeneous Environments.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

2003
Portal Replication for Web Application Availability Via SOA.
Proceedings of the 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), 2003


  Loading...