School of Computing

Jason Nurse

Senior Lecturer

Photo of Jason Nurse, if available
  • Room S112
    School of Computing
    University of Kent,
    CT2 7NF


My publications are available from the University of Kent's Academic Repository.

Research Interests

I belong to the following research groups:

My research focuses on the interaction between users and aspects of cyber security, privacy and trust. This considers the full spectrum of technologies in use today and encompasses topics such as:

  • security and privacy in the internet of things (IoT) and social media (with an organisational and personal device focus);
  • usable security as well as security awareness programmes in organisations and for the public;
  • technical and psychological aspects of cybercrime (e.g., insider threat, phishing susceptibility and ransomware)
  • identity security and privacy risks in cyberspace (this also considers areas such as open-source intelligence);
  • detection of fake news and rumours (or conversely, trustworthy content) on social media; and
  • corporate security in light of new forms of technology (e.g., IoT, wearables and cyber-insurance)

If you are interested in studying for a PhD in any of the topics above, please drop me a line.

Also, if you would like to find out more about me, here are my other online profiles: Twitter (@jasonnurse), LinkedIn, ResearchGate and Google Scholar.

Selected Publications

  • Jones, K., Nurse, J.R.C., and Li, S. "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter", in 14th International AAAI Conference on Web and Social Media (ICWSM), 2020, AAAI. Link (Upcoming)..
  • Halgas L., Agrafiotis I., Nurse J.R.C. "Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)", in Information Security Applications. Lecture Notes in Computer Science, vol 11897. 2020. Springer, Cham. Link
  • Nouh, M., Nurse, J.R.C., Webb, H. and Goldsmith, M., "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement", in Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium, 2019, Internet Society. Link.
  • Williams, M., Nurse, J.R.C., and Creese, S. "(Smart) Watch Out! encouraging privacy-protective behavior through interactive games" in International Journal of Human-Computer Studies 2019: 121-137. Elsevier. Link
  • Webb, H., Nurse, J.R.C., Bezuidenhout, L. and Jirotka, M., "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges", in ACM CHI Conference Extended Abstracts on Human Factors in Computing Systems. 2019. ACM. Link.
  • Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S. and Upton, D., "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate", in Journal of Cybersecurity, volume 4, number 1, 2018. OUP. 10.1093/cybsec/tyy006.
  • Nurse, J.R.C., "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit", In: Attrill-Smith, A., Fullwood, C., Keep, M. and Kuss, D.J., eds. The Oxford Handbook of Cyberpsychology. 2018. Oxford University Press. 10.1093/oxfordhb/9780198812746.013.35.
  • Kingston, C., Nurse, J.R.C., Agrafiotis, I., and Milich, A. B., "Using semantic clustering to support situation awareness on Twitter: the case of world views", in Human-centric Computing and Information Sciences Journal, volume 8, number 22, 2018. Springer. 10.1186/s13673-018-0145-6.
  • Nurse, J.R.C., Creese, S., and De Roure, D., "Security Risk Assessment in Internet of Things Systems", in IEEE IT Professional, October, 2017. IEEE. DOI: 10.1109/MITP.2017.3680959.
  • Iuga, C., Nurse, J.R.C. and Erola, A., "Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks", in the Journal of Human-centric Computing and Information Sciences (HCIS), 2016. Springer. DOI: 10.1186/s13673-016-0065-2.
  • Bada, M., Sasse, A. M. and Nurse, J.R.C., "Cyber Security Awareness Campaigns: Why do they fail to change behaviour?", in proceedings of the International Conference on Cyber Security for Sustainable Society (CSSS 2015). SSN+. Link.
  • Nurse, J.R.C., Buckley, O., Legg, P.A., Goldsmith, M., Creese, S., Wright, G. and Whitty, M., "Understanding Insider Threat: A Framework for Characterising Attacks", in proceedings of the IEEE Security and Privacy Workshops (SPW 2014), associated with the 35th IEEE Symposium on Security and Privacy (SP 2014). IEEE. DOI: 10.1109/SPW.2014.38.

Other places where my publication profile can be found include DBLP.

I have also contributed directly or provided expert feedback to several industry/government reports. These include:

Professional Affiliations

Selected Professional Activities

Programme Committee member and/or reviewer for various journals/conferences including: Journal of Cybersecurity (JCS), Computers & Security (C&S), Computers in Human Behavior (CHB), Transactions on Computer-Human Interaction (TOCHI), IEEE Access, International Conference on Privacy, Security and Trust (PST), British Human Computer Interaction Conference (BCS-HCI), World Conference on Information Security Education (WISE), Workshop on Socio-Technical Aspects in Security (STAST), International Workshop on Managing Insider Security Threats (MIST) (associated with ACM CCS), Workshop on Research for Insider Threat (WRIT) (associated with IEEE S&P), International Conference on Social Informatics (SocInfo), Annual International Conference on Computational Social Science (IC2S2), and European Conference on Cognitive Ergonomics (ECCE).

Selected Research and Public Engagement Talks/Articles

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 20/10/2020