Jason R. C. Nurse
Orcid: 0000-0003-4118-1680Affiliations:
- University of Oxford
According to our database1,
Jason R. C. Nurse
authored at least 131 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on cs.ox.ac.uk
On csauthors.net:
Bibliography
2024
'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience.
J. Cybersecur., January, 2024
Proc. ACM Hum. Comput. Interact., 2024
Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms.
DTRAP, 2024
Embedding Privacy in Computational Social Science and Artificial Intelligence Research.
CoRR, 2024
"I don't think we're there yet": The practices and challenges of organisational learning from cyber security incidents.
Comput. Secur., 2024
Big Data Res., 2024
Proceedings of the Human Aspects of Information Security and Assurance, 2024
2023
Learning from cyber security incidents: A systematic review and future research agenda.
Comput. Secur., September, 2023
Comput. Secur., May, 2023
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond.
IT Prof., 2023
Editorial: Technology for the greater good? The influence of (ir)responsible systems on human emotions, thinking and behavior.
Frontiers Comput. Sci., 2023
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment.
ACM Comput. Surv., 2023
aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions.
CoRR, 2023
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter.
Comput. Secur., 2023
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
2022
"You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security.
Proc. ACM Hum. Comput. Interact., 2022
An Investigation Into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective.
Frontiers Comput. Sci., 2022
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness.
CoRR, 2022
"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security.
CoRR, 2022
A comparison of online hate on reddit and 4chan: a case study of the 2020 US election.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the International Conference on Cybersecurity, 2022
"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
Comput. Secur., 2021
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021
Cyberpsychology Behav. Soc. Netw., 2021
Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM).
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021
The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter.
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy.
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021
Proceedings of the HCI International 2021 - Posters - 23rd HCI International Conference, 2021
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2021
Proceedings of the Human Aspects of Information Security and Assurance, 2021
Proceedings of the International Conference on Cyber Situational Awareness, 2021
Proceedings of the CUI 2021, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IEEE Trans. Knowl. Data Eng., 2020
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
J. Cybersecur., 2020
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains.
Cybersecur., 2020
Developing an Augmented Reality Tourism App through User-Centred Design (Extended Version).
CoRR, 2020
Comput. Secur., 2020
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020
Proceedings of the 2nd Conference on Conversational User Interfaces, 2020
2019
Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs).
Inf. Comput. Secur., 2019
<i>(Smart)Watch Out!</i> encouraging privacy-protective behavior through interactive games.
Int. J. Hum. Comput. Stud., 2019
The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends.
CoRR, 2019
Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases.
CoRR, 2019
A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape.
CoRR, 2019
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies.
CoRR, 2019
Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment.
CoRR, 2019
CoRR, 2019
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement.
CoRR, 2019
CoRR, 2019
Cyber risk assessment in cloud provider environments: Current models and future needs.
Comput. Secur., 2019
Comput. Hum. Behav., 2019
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs).
Proceedings of the Information Security Applications - 20th International Conference, 2019
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Using semantic clustering to support situation awareness on Twitter: the case of world views.
Hum. centric Comput. Inf. Sci., 2018
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
J. Cybersecur., 2018
Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit.
CoRR, 2018
CoRR, 2018
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems.
CoRR, 2018
Are We There Yet?: Understanding the Challenges Faced in Complying with the General Data Protection Regulation (GDPR).
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
J. Internet Serv. Appl., 2017
Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem.
Hum. centric Comput. Inf. Sci., 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK.
Proceedings of the Information Security Education for a Global Digital Society, 2017
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017
Proceedings of the HCI 2017, 2017
2016
Secur. Informatics, 2016
Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Hum. centric Comput. Inf. Sci., 2016
Proceedings of the Social Informatics - 8th International Conference, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016
Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation.
Proceedings of the 8th IEEE Latin-American Conference on Communications, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the HCI 2016, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Investigating the leakage of sensitive personal and organisational information in email headers.
J. Internet Serv. Inf. Secur., 2015
Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems.
J. Digit. Forensics Secur. Law, 2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Proceedings of the ICEIS 2015, 2015
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
2012
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Towards a Model to Support the Reconciliation of Security Actions across Enterprises.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012
2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
2010
PhD thesis, 2010
2009
Proceedings of the Information Security and Digital Forensics, 2009
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009
Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development.
Proceedings of the Business Information Systems, 12th International Conference, 2009