School of Computing

Publications by Dr Jason Nurse

Also view these in the Kent Academic Repository

Articles
Patterson, C. M., Nurse, J. R. and Franqueira, V. N. (2024) '"I don't think we're there yet": The practices and challenges of organisational learning from cyber security incidents', Computers & Security. ScienceDirect. doi: doi:10.1016/j.cose.2023.103699.
Mott, G., Nurse, J. R. C. and Baker-Beall, C. (2023) 'Preparing for future Cyber Crises: Lessons from governance of the coronavirus pandemic', Policy Design and Practice. Taylor and Francis, pp. 160-181. doi: 10.1080/25741292.2023.2205764.
Patterson, C. M., Nurse, J. R. C. and Franqueira, V. N. L. (2023) 'Learning from cyber security incidents: A systematic review and future research agenda', Computers & Security. Elsevier. doi: 10.1016/j.cose.2023.103309.
Cartwright, A., Cartwright, E., MacColl, J., Mott, G., Turner, S., Sullivan, J. and Nurse, J. R. C. (2023) 'How Cyber-Insurance Influences the Ransomware Payment Decision: Theory and Evidence', The Geneva Papers on Risk and Insurance - Issues and Practice. Springer, pp. 300-331. doi: 10.1057/s41288-023-00288-8.
Mott, G., Turner, S., Nurse, J. R. C., MacColl, J., Sullivan, J., Cartwright, A. and Cartwright, E. (2023) 'Between a rock and a hard(ening) place: Cyber insurance in the ransomware era', Computers & Security. Elsevier. doi: 10.1016/j.cose.2023.103162.
Pattnaik, N., Li, S. and Nurse, J. R. C. (2023) 'A Survey of User Perspectives on Security and Privacy in a Home Networking Environment', ACM Computing Surveys. Association for Computing Machinery, pp. 180:1-180:38. doi: 10.1145/3558095.
Pattnaik, N., Li, S. and Nurse, J. R. C. (2022) 'Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter', Computers and Security. Elsevier. doi: 10.1016/j.cose.2022.103008.
Turner, S., Pattnaik, N., Nurse, J. R. C. and Li, S. (2022) '"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security', Proceedings of the ACM on Human-Computer Interaction. ACM. doi: 10.1145/3555159.
Panteli, N., Nurse, J. R. C., Collins, E. and Williams, N. (2022) 'Trust disruption and preservation in the Covid-19 work from home context', Journal of Workplace Learning. Emerald. doi: 10.1108/JWL-02-2022-0017.
Belen Sağlam, R., Nurse, J. R. C. and Hodges, D. (2022) 'An Investigation into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective', Frontiers in Computer Science. Frontiers. doi: 10.3389/fcomp.2022.908245.
Belen Sağlam, R., Nurse, J. R. C. and Hodges, D. (2022) 'Personal Information: Perceptions, Types and Evolution', Journal of Information Security and Applications. Elsevier. doi: 10.1016/j.jisa.2022.103163.
Erola, A., Agrafiotis, I., Nurse, J. R. C., Axon, L., Goldsmith, M. and Creese, S. (2022) 'A System to Calculate Cyber-Value-at-Risk', Computers & Security. Elsevier. doi: 10.1016/j.cose.2021.102545.
Uchendu, B., Nurse, J. R. C., Bada, M. and Furnell, S. (2021) 'Developing a Cyber Security Culture: Current Practices and Future Needs', Computers & Security. Elsevier. doi: 10.1016/j.cose.2021.102387.
Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X. (2021) 'Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic', Computers & Security. Elsevier. doi: 10.1016/j.cose.2021.102248.
Ani, U. D., Watson, J. D. M., Green, B., Craggs, B. and Nurse, J. R. C. (2020) 'Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases', Journal of Cyber Security Technology. Taylor & Francis. doi: 10.1080/23742917.2020.1843822.
Stevens, F., Nurse, J. R. C. and Arief, B. (2020) 'Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review', Cyberpsychology, Behavior, and Social Networking. Mary Ann Liebert. doi: 10.1089/cyber.2020.0253.
Knight, R. and Nurse, J. R. C. (2020) 'A Framework for Effective Corporate Communication after Cyber Security Incidents', Computers & Security. Elsevier. doi: 10.1016/j.cose.2020.102036.
Ani, U. D., Watson, J. M., Carr, M., Cook, A. and Nurse, J. R. C. (2020) 'A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints', Journal of Defense Modeling and Simulation. SAGE. doi: 10.1177/1548512920953499.
Radanliev, P., De Roure, D., Page, K., Nurse, J. R. C., Montalvo, R. M., Santos, O., Maddox, L. and Burnap, P. (2020) 'Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains', Cybersecurity. SpringerOpen. doi: 10.1186/s42400-020-00052-8.
Axon, L., Alahmadi, B., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2020) 'Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice', Journal of Cybersecurity. Oxford University Press. doi: 10.1093/cybsec/tyaa004.
Radanliev, P., De Roure, D., Nurse, J. R. C., Montalvo, R. M., Cannady, S., Santos, O., Madox, L., Burnap, P. and Maple, C. (2020) 'Future developments in standardisation of cyber risk in the Internet of Things (IoT)', SN Applied Sciences. Springer. doi: 10.1007/s42452-019-1931-0.
Nurse, J. R. C. (2019) 'Cyber Resilience: What Is It And How Do We Get It?', CREST Security Review Magazine. The Centre for Research and Evidence on Security Threats (CREST), pp. 22-23.
Akinrolabu, O., Nurse, J. R. C., Martin, A. and New, S. (2019) 'Cyber risk assessment in cloud provider environments: Current models and future needs', Computers & Security. Elsevier. doi: 10.1016/j.cose.2019.101600.
Williams, M., Nurse, J. R. C. and Creese, S. (2019) '(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games', International Journal of Human-Computer Studies. Elsevier, pp. 127-137. doi: 10.1016/j.ijhcs.2019.07.012.
Bada, M. and Nurse, J. R. C. (2019) 'Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs)', Information and Computer Security. Emerald, pp. 393-410. doi: 10.1108/ICS-07-2018-0080.
Buckley, O. and Nurse, J. R. C. (2019) 'The Language of Biometrics: Analysing Public Perceptions', Journal of Information Security and Applications. Elsevier, pp. 112-119. doi: 10.1016/j.jisa.2019.05.001.
Williams, M., Nurse, J. R. C. and Creese, S. (2019) 'Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study', Computers in Human Behavior. Elsevier, pp. 38-54. doi: 10.1016/j.chb.2019.04.026.
Giasemidis, G., Kaplis, N., Agrafiotis, I. and Nurse, J. R. C. (2018) 'A semi-supervised approach to message stance classification', IEEE Transactions on Knowledge and Data Engineering. IEEE, pp. 1-11. doi: 10.1109/TKDE.2018.2880192.
Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S. and Upton, D. (2018) 'A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate', Journal of Cybersecurity. Oxford University Press. doi: 10.1093/cybsec/tyy006.
Kingston, C., Nurse, J. R. C., Agrafiotis, I. and Milich, A. (2018) 'Using semantic clustering to support situation awareness on Twitter: The case of World Views', Human-centric Computing and Information Sciences. Springer. doi: 10.1186/s13673-018-0145-6.
Nurse, J. R. C. and Buckley, O. (2017) 'Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem', Human-centric Computing and Information Sciences. Springer. doi: 10.1186/s13673-017-0121-6.
Nurse, J. R. C., Creese, S. and De Roure, D. (2017) 'Security risk assessment in Internet of Things systems', IEEE IT Professional (IT Pro). IEEE, pp. 20-26. doi: 10.1109/MITP.2017.3680959.
Woods, D., Agrafiotis, I., Nurse, J. R. C. and Creese, S. (2017) 'Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms', Journal of Internet Services and Applications. Springer. doi: 10.1186/s13174-017-0059-y.
Axon, L., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2017) 'A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring', International Journal on Advances in Security. IARIA, pp. 26-47. Available at: http://www.iariajournals.org/security/sec_v10_n12_2017_paged.pdf.
Nurse, J. R. C. and Bertino, E. (2017) 'Guest editorial: Insider threat solutions - moving from concept to reality', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. Innovative Information Science & Technology Research Group, pp. 1-3. doi: 10.22667/JOWUA.2017.03.31.001.
Eggenschwiler, J., Agrafiotis, I. and Nurse, J. R. C. (2016) 'Insider threat response and recovery strategies in financial services firms', Computer Fraud & Security. Elsevier, pp. 12-19. doi: 10.1016/S1361-3723(16)30091-4.
Nurse, J. R. C., Erola, A., Gibson-Robinson, T., Goldsmith, M. and Creese, S. (2016) 'Analytics for characterising and measuring the naturalness of online personae', Security Informatics Journal. Springer. doi: 10.1186/s13388-016-0028-1.
Iuga, C., Nurse, J. R. C. and Erola, A. (2016) 'Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks', Journal of Human-centric Computing and Information Sciences. Springer. doi: 10.1186/s13673-016-0065-2.
Eze, C., Nurse, J. R. C. and Happa, J. (2016) 'Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). doi: 10.22667/JOWUA.2016.03.31.039.
Nurse, J. R. C., Agrafiotis, I., Goldsmith, M., Creese, S. and Lamberts, K. (2015) 'Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness', Journal of Trust Management. Springer. doi: 10.1186/s40493-015-0021-5.
Wu, T. and Nurse, J. R. C. (2015) 'Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems', Journal of Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law, pp. 79-96.
Agrafiotis, I., Nurse, J. R. C., Buckley, O., Legg, P., Creese, S. and Goldsmith, M. (2015) 'Identifying attack patterns for insider threat detection', Computer Fraud & Security, pp. 9-17. doi: 10.1016/S1361-3723(15)30066-X.
Nurse, J. R. C. (2015) 'Exploring the risks to identity security and privacy in cyberspace', XRDS: Crossroads, The ACM Magazine. ACM, pp. 42-47. doi: 10.1145/2730912.
Nurse, J. R. C., Erola, A., Goldsmith, M. and Creese, S. (2015) 'Investigating the leakage of sensitive personal and organisational information in email headers', Journal of Internet Services and Information Security. Innovative Information Science & Technology Research Group, pp. 70-84. doi: 10.22667/JISIS.2015.02.31.070.
Nurse, J. R. C., Agrafiotis, I., Goldsmith, M., Creese, S. and Lamberts, K. (2014) 'Two sides of the coin: measuring and communicating the trustworthiness of online information', Journal of Trust Management. Springer Open. doi: 10.1186/2196-064X-1-5.
Legg, P. A., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis, I., Goldsmith, M. and Creese, S. (2013) 'Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. Innovative Information Science & Technology Research Group, pp. 20-37. doi: 10.22667/JOWUA.2013.12.31.020.
Nurse, J. R. C. and Sinclair, J. E. (2010) 'A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool', International Journal of Computer Science. Available at: http://eprints.dcs.warwick.ac.uk/378/1/IJCS_37_4_07.pdf.
Nurse, J. R. C. and Sinclair, J. E. (2010) 'An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it', International Journal On Advances in Security. Available at: http://eprints.dcs.warwick.ac.uk/632/1/security2010_nurse_sinclair.pdf.
Nurse, J. R. C. and Sinclair, J. E. (2009) 'Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS', International Journal on Advances in Internet Technology.
Book sections
Bada, M. and Nurse, J. R. C. (2023) 'Exploring Cybercriminal Activities, Behaviors, and Profiles', in Mukherjee, S., Dutt, V., and Srinivasan, N. (eds) Applied Cognitive Science and Technology. Springer, pp. 109-120. doi: 10.1007/978-981-99-3966-4_7.
Zahrah, F. and Nurse, J. R. C. (2022) 'Terrorism and online extremism', in Ceron, A. (ed.) Elgar Encyclopedia of Technology and Politics. Edward Elgar Publishing, pp. 62-67. Available at: https://www.e-elgar.com/shop/gbp/elgar-encyclopedia-of-technology-and-politics-9781800374256.html.
Nurse, J. R. C. (2021) 'Cybersecurity Awareness', in Encyclopedia of Cryptography, Security and Privacy. Springer. doi: 10.1007/978-3-642-27739-9_1596-1.
Bada, M. and Nurse, J. R. C. (2019) 'The Social and Psychological Impact of Cyberattacks', in Benson, V. and McAlaney, J. (eds) Emerging Cyber Threats and Cognitive Vulnerabilities. London: Academic Press, pp. 73-92. doi: 10.1016/B978-0-12-816203-3.00004-6.
Nurse, J. R. C. (2019) 'Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit', in Attrill-Smith, A., Fullwood, C., Keep, M., and Kuss, D. J. (eds) The Oxford Handbook of Cyberpsychology. Oxford University Press. doi: 10.1093/oxfordhb/9780198812746.013.35.
Nurse, J. R. C. and Bada, M. (2019) 'The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations', in Attrill-Smith, A., Fullwood, C., Keep, M., and Kuss, D. J. (eds) The Oxford Handbook of Cyberpsychology. Oxford University Press. doi: 10.1093/oxfordhb/9780198812746.013.36.
Radanliev, P., De Roure, D., Nurse, J. R. C., Nicolescu, R., Huth, M., Cannady, S. and Montalvo, R. M. (2018) 'Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0', in Living in the Internet of Things: Cybersecurity of the IoT - 2018. Living in the Internet of Things: Cybersecurity of the IoT - 2018, IET. doi: 10.1049/cp.2018.0041.
Sturgess, J., Nurse, J. R. C. and Zhao, J. (2018) 'A capability-oriented approach to assessing privacy risk in smart home ecosystems', in Living in the Internet of Things: Cybersecurity of the IoT - 2018. Living in the Internet of Things: Cybersecurity of the IoT - 2018, IET. doi: 10.1049/cp.2018.0037.
Nurse, J. R. C., Radanliev, P., Creese, S. and De Roure, D. (2018) 'If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems', in Living in the Internet of Things: Cybersecurity of the IoT - 2018. Living in the Internet of Things: Cybersecurity of the IoT - 2018, IET. doi: 10.1049/cp.2018.0001.
Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. and Williams, R. (2018) 'An Ethics Framework for Research into Heterogeneous Systems', in Living in the Internet of Things: Cybersecurity of the IoT - 2018. Living in the Internet of Things: Cybersecurity of the IoT - 2018, IET. doi: 10.1049/cp.2018.0026.
Williams, M., Nurse, J. R. C. and Creese, S. (2017) 'Privacy Salience: Taxonomies and Research Opportunities', in Lehmann, A., Whitehouse, D., Fischer-Hübner, S., Fritsch, L., and Raab, C. (eds) Privacy and Identity Management. Facing up to Next Steps. Springer, pp. 263-278. doi: 10.1007/978-3-319-55783-0_18.
Nurse, J. R. C. and Sinclair, J. E. (2011) 'A Case Study Analysis of an E-Business Security Negotiations Support Tool', in Electrical Engineering and Applied Computing. Springer. doi: 10.1007/978-94-007-1192-1_18.
Nurse, J. R. C. and Sinclair, J. E. (2009) 'Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development', in Business Information Systems. Springer-Verlag. doi: 10.1007/978-3-642-01190-0_6.
Nurse, J. R. C. and Sinclair, J. E. (2009) 'BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business', in 2009 Fourth International Conference on Internet and Web Applications and Services. 4th International Conference on Internet and Web Applications and Services (ICIW 2009), IEEE. doi: 10.1109/ICIW.2009.48.
Monographs
MacColl, J., Hüsch, P., Mott, G., Sullivan, J., Nurse, J. R. C., Turner, S. and Pattnaik, N. (2024) Ransomware: Victim Insights on Harms to Individuals, Organisations and Society. The Royal United Services Institute for Defence and Security Studies. Available at: https://www.rusi.org/explore-our-research/publications/occasional-papers/ransomware-victim-insights-harms-individuals-organisations-and-society.
MacColl, J., Sullivan, J., Nurse, J. R. C., Mott, G., Turner, S., Cartwright, E. and Cartwright, A. (2023) Cyber Insurance and the Ransomware Challenge. The Royal United Services Institute for Defence and Security Studies. Available at: https://www.rusi.org/explore-our-research/publications/occasional-papers/cyber-insurance-and-ransomware-challenge.
MacColl, J., Nurse, J. R. C. and Sullivan, J. (2021) Cyber Insurance and the Cyber Security Challenge. Royal United Services Institute for Defence and Security Studies (RUSI).
Sullivan, J. and Nurse, J. R. C. (2021) Cyber Security Incentives and the Role of Cyber Insurance. Royal United Services Institute for Defence and Security Studies (RUSI).
Agrafiotis, I., Creese, S., Goldsmith, M., Nurse, J. R. C. and Upton, D. (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. University of Oxford. Available at: http://www.cs.ox.ac.uk/files/8869/The_Relative_Effectiveness_of_widely_used_Risk_Controls_and_the_Real_Val. pdf.
Nurse, J. R. C., Agrafiotis, I., Erola, A., Bada, M., Roberts, T., Williams, M., Goldsmith, M. and Creese, S. (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. University of Oxford. Available at: http://www.politics.ox.ac.uk/publications/an-independent-assessment-of-the-procedural-components-of-the-estonian-internet-voting-system.html.
Conference or workshop items
Pattnaik, N., Nurse, J. R. C., Turner, S., Mott, G., MacColl, J., Huesch, P. and Sullivan, J. (2023) 'It's more than just money: The real-world harms from ransomware attacks', in. 17th International Symposium on Human Aspects of Information Security & Assurance, Springer. doi: 10.1007/978-3-031-38530-8_21.
Bada, M., Furnell, S., Nurse, J. R. C. and Dymydiuk, J. (2023) 'Supporting Small and Medium-sized Enterprises in using Privacy Enhancing Technologies', in. 5th International Conference on HCI for Cybersecurity, Privacy and Trust, Springer. doi: 10.1007/978-3-031-35822-7_19.
Altuncu, E., Nurse, J. R. C., Bagriacik, M., Kaleba, S., Yuan, H., Bonheme, L. and Li, S. (2023) 'aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions', in. MEDIATE 2023 (5th Workshop on News Media and Computational Journalism), Association for the Advancement of Artificial Intelligence, pp. 27:1-27:10. doi: 10.36190/2023.27.
Shere, A. R., Nurse, J. R. C. and Martin, A. (2023) 'Threats to Journalists from the Consumer Internet of Things', in. International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2022), Springer. doi: 10.1007/978-981-19-6414-5_17.
Zahrah, F., Nurse, J. R. C. and Goldsmith, M. (2022) 'A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election', in. 37th ACM/SIGAPP Symposium On Applied Computing, ACM, pp. 1788-1791. doi: 10.1145/3477314.3507226.
Turner, S., Nurse, J. R. C. and Li, S. (2022) '"It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices', in. 2022 ACM CHI Conference on Human Factors in Computing Systems, ACM. doi: 10.1145/3491101.3503577.
Jones, K., Nurse, J. R. C. and Li, S. (2022) 'Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators', in. 16th International AAAI Conference on Web and Social Media (ICWSM-22), Association for the Advancement of Artificial Intelligence.
Panteli, N., Nurse, J. R. C., Collins, E. and Williams, N. (2021) 'Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges', in. 42nd International Conference on Information Systems (ICIS) TREOs, AIS Electronic Library (AISeL).
Axon, L., Erola, A., Janse van Rensburg, A., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2021) 'Practitioners' Views on Cybersecurity Control Adoption and Effectiveness', in. 16th International Conference on Availability, Reliability and Security (ARES), ACM. doi: 10.1145/3465481.3470038.
Sharma, S., Brennan, J. and Nurse, J. R. C. (2021) 'StockBabble: A Conversational Financial Agent to support Stock Market Investors', in. 3rd ACM Conference on Conversational User Interfaces (CUI 2021), ACM. doi: 10.1145/3469595.3469620.
Jones, K., Nurse, J. R. C. and Li, S. (2021) 'Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests', in. 16th International AAAI Conference on Web and Social Media (ICWSM-22), USA: Association for the Advancement of Artificial Intelligence.
Bada, M. and Nurse, J. R. C. (2021) 'Profiling the Cybercriminal: A Systematic Review of Research', in. IEEE Cyber Science 2021 Conference, IEEE. doi: 10.1109/CyberSA52016.2021.9478246.
Jaffray, A., Finn, C. and Nurse, J. R. C. (2021) 'SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education', in. International Symposium on Human Aspects of Information Security and Assurance, Springer. doi: 10.1007/978-3-030-81111-2_4.
Turner, S., Nurse, J. R. C. and Li, S. (2021) 'When Googling it doesn't work: The challenge of finding security advice for smart home devices', in. 15th International Symposium on Human Aspects of Information Security & Assurance (HAISA), Springer. doi: 10.1007/978-3-030-81111-2_10.
Nurse, J. R. C., Vargas, F., Hassan, N., Wang, D., Andriotis, P., Ghenai, A., Jaidka, K., Mustafaraj, E., Joseph, K. and Foucault Welles, B. (2021) 'Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM)', in. ICWSM Workshop, Association for the Advancement of Artificial Intelligence. doi: 10.36190/2021.00.
Jones, K., Nurse, J. R. C. and Li, S. (2021) 'The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter', in. 4th​ International Workshop on Emoji Understanding and Applications in Social Media.
Belen Sağlam, R., Nurse, J. R. C. and Hodges, D. (2021) 'Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry', in. 23rd International Conference on Human-Computer Interaction, Springer. doi: 10.1007/978-3-030-78642-7_53.
Nurse, J. R. C., Williams, N., Collins, E., Panteli, N., Blythe, J. and Koppelman, B. (2021) 'Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy', in. 23rd International Conference on Human-Computer Interaction. doi: 10.1007/978-3-030-78645-8_74.
Buckley, O., Nurse, J. R. C., Wyer, N., Dawes, H., Hodges, D., Earl, S. and Belen Sağlam, R. (2021) 'Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots', in. 23rd International Conference on Human-Computer Interaction, Springer. doi: 10.1007/978-3-030-78642-7_54.
Zahrah, F., Nurse, J. R. C. and Goldsmith, M. (2020) '#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives', in. 2nd Workshop on Attackers and Cyber-Crime Operations (WACCO), at the IEEE European Symposium on Security and Privacy (Euro S&P), IEEE. doi: 10.1109/EuroSPW51379.2020.00065.
Belen Sağlam, R. and Nurse, J. R. C. (2020) 'Is your chatbot GDPR compliant? Open issues in agent design', in. 2nd International Conference on Conversational User Interfaces (CUI), ACM. doi: 10.1145/3405755.3406131.
Nurse, J. R. C., Axon, L., Erola, A., Agrafiotis, I., Goldsmith, M. and Creese, S. (2020) 'The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes', in. CyberSA 2020, IEEE. doi: 10.1109/CyberSA49311.2020.9139703.
Jones, K., Nurse, J. R. C. and Li, S. (2020) 'Behind the Mask: A Computational Study of Anonymous' Presence on Twitter', in. 14th International AAAI Conference on Web and Social Media (ICWSM).
Shere, A. R. K., Nurse, J. R. C. and Flechais, I. (2020) 'Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things', in. 5th European Workshop on Usable Security (EuroUSEC 2020), IEEE. doi: 10.1109/EuroSPW51379.2020.00039.
Halgas, L., Agrafiotis, I. and Nurse, J. R. C. (2020) 'Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)', in. 20th World Conference on Information Security Applications (WISA 2019), Springer. doi: 10.1007/978-3-030-39303-8_17.
Nouh, M., Nurse, J. R. C. and Goldsmith, M. (2019) 'Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter', in. 17th IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE. doi: 10.1109/ISI.2019.8823548.
Ani, U. D., Watson, J. D. M., Nurse, J. R. C., Cook, A. and Maple, C. (2019) 'A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape', in. PETRAS/IET Conference. Living in the Internet of Things: Cybersecurity of the IoT - 2019, IET. doi: 10.1049/cp.2019.0131.
Webb, H., Nurse, J. R. C., Bezuidenhout, L. and Jirotka, M. (2019) 'Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges', in. CHI Conference on Human Factors in Computing Systems, ACM. doi: 10.1145/3290607.3299063.
Nouh, M., Nurse, J. R. C., Webb, H. and Goldsmith, M. (2019) 'Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement', in. Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium, Internet Society. Available at: https://www.ndss-symposium.org/ndss-paper/auto-draft-20/.
Sirur, S., Nurse, J. R. C. and Webb, H. (2018) 'Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)', in. International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS), New York, USA: ACM, pp. 88-95. doi: 10.1145/3267357.3267368.
Axon, L. M., Alahmadi, B., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2018) 'Sonification in security operations centres: what do security practitioners think?', in. Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium, Internet Society. doi: 10.14722/usec.2018.23024.
Aktypi, A., Nurse, J. R. C. and Goldsmith, M. (2017) 'Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks', in. International Workshop on Multimedia Privacy and Security in conjunction with the 24th ACM Conference on Computer and Communication Security (CCS 2017), New York, USA: ACM. doi: 10.1145/3137616.3137617.
Nurse, J. R. C., Agrafiotis, I., Erola, A., Bada, M., Roberts, T., Williams, M., Goldsmith, M. and Creese, S. (2017) 'An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System', in Tryfonas, T. (ed.). International Conference on Human Aspects of Information Security‚ Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Springer. doi: 10.1007/978-3-319-58460-7_26.
Nouh, M., Nurse, J. R. C. and Goldsmith, M. (2017) 'Towards Designing a Multipurpose Cybercrime Intelligence Framework', in Brynielsson, J. and Johansson, F. (eds). European Intelligence and Security Informatics Conference (EISIC), IEEE. doi: 10.1109/EISIC.2016.018.
Kritzinger, E., Bada, M. and Nurse, J. R. C. (2017) 'A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK', in Bishop, M., Futcher, L., Miloslavskaya, N., and Theocharidou, M. (eds). IFIP World Conference on Information Security Education, Springer, pp. 110-120. doi: 10.1007/978-3-319-58553-6_10.
Williams, M., Nurse, J. R. C. and Creese, S. (2017) 'Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things', in. 15th International Conference on Privacy‚ Security and Trust (PST), IEEE.
Williams, M., Yao, K. and Nurse, J. R. C. (2017) 'ToARist: An Augmented Reality Tourism App created through User-Centred Design', in. 31st International BCS Human Computer Interaction Conference (HCI 2017), BCS. doi: 10.14236/ewic/HCI2017.1.
Williams, M., Nurse, J. R. C. and Creese, S. (2016) 'The perfect storm: The privacy paradox and the Internet-of-Things', in. 11th International Conference on Availability‚ Reliability and Security (ARES 2016), IEEE. doi: 10.1109/ARES.2016.25.
Williams, M., Axon, L., Nurse, J. R. C. and Creese, S. (2016) 'Future scenarios and challenges for security and privacy', in. IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), IEEE. doi: 10.1109/RTSI.2016.7740625.
Rashid, T., Agrafiotis, I. and Nurse, J. R. C. (2016) 'A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models', in. 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), New York, USA: ACM, pp. 47-56. doi: 10.1145/2995959.2995964.
Giasemidis, G., Singleton, C., Agrafiotis, I., Nurse, J. R. C., Pilgrim, A. and Willis, C. (2016) 'Determining the veracity of rumours on Twitter', in. 8th International Conference on Social Informatics (SocInfo 2016), Germany: Springer, pp. 185-205. doi: 10.1007/978-3-319-47880-7_12.
van Rensburg, A. J., Nurse, J. R. C. and Goldsmith, M. (2016) 'Attacker-Parametrised Attack Graphs', in. The Tenth International Conference on Emerging Security Information, Systems and Technologies, pp. 316-319.
Williams, M. and Nurse, J. R. C. (2016) 'Optional data disclosure and the online privacy paradox: A UK perspective', in. Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human?Computer Interaction (HCI)., Springer, pp. 186-197. doi: 10.1007/978-3-319-39381-0_17.
Kammüller, F., Nurse, J. R. C. and Probst, C. W. (2016) 'Attack Tree Analysis for Insider Threats on the IoT using Isabelle', in. Human Aspects of Information Security, Privacy, and Trust. HAS 2016., Switzerland: Springer, pp. 234-246. doi: 10.1007/978-3-319-39381-0_21.
Farnan, O. and Nurse, J. R. C. (2016) 'Exploring a Controls-Based Assessment of Infrastructure Vulnerability', in. 10th Risks and Security of Internet and Systems. CRiSIS 2015, Switzerland: Springer, pp. 144-159. doi: 10.1007/978-3-319-31811-0_9.
Nurse, J. R. C., Atamli, A. and Martin, A. (2016) 'Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home', in. International Conference on Human Aspects of Information Security, Privacy and Trust at the 18th International Conference on Human-Computer Interaction (HCI), Switzerland: Springer, pp. 255-267. doi: 10.1007/978-3-319-39381-0_23.
Nurse, J. R. C., Erola, A., Agrafiotis, I., Goldsmith, M. and Creese, S. (2016) 'Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things', in. International Workshop on Secure Internet of Things at European Symposium on Research in Computer Security (ESORICS 2015), IEEE, pp. 5-14. doi: 10.1109/SIOT.2015.10.
Williams, M. and Nurse, J. R. C. (2016) 'Perspectives on privacy in the use of online systems', in. 30th International BCS Human Computer Interaction Conference (HCI 2016), BCS, pp. 1-3. doi: 10.5555/3114770.3114797.
Axon, L., Creese, S., Goldsmith, M. and Nurse, J. R. C. (2016) 'Reflecting on the Use of Sonification for Network Monitoring', in. Tenth International Conference on Emerging Security Information, Systems and Technologies, IARIA, pp. 254-261.
Everett, R., Nurse, J. R. C. and Erola, A. (2016) 'The Anatomy of Online Deception: What Makes Automated Text Convincing?', in. 31st Annual ACM Symposium on Applied Computing (SAC), ACM. doi: 10.1145/2851613.2851813.
Happa, J., Fairclough, G., Nurse, J. R. C., Agrafiotis, I., Goldsmith, M. and Creese, S. (2016) 'A Pragmatic System-failure Assessment and Response Model', in. 2nd International Conference on Information Systems Security and Privacy.
Nurse, J. R. C., Goldsmith, M., Creese, S. and Lamberts, K. (2015) 'Technology and information trust for supporting risky decisions based on social-media content', in. IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, IEEE, pp. 461-468. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.66.
Nouh, M., Nurse, J. R. C. and Goldsmith, M. (2015) 'Identifying Key-Players in Online Activist Groups on Facebook Social Network', in. 2015 IEEE International Conference on Data Mining Workshop (ICDMW), Atlantic City, NJ, USA: IEEE Computer Society, pp. 969-978. doi: http://dx.doi.org/10.1109/ICDMW.2015.88.
Devlin, M., Nurse, J. R. C., Hodges, D., Goldsmith, M. and Creese, S. (2015) 'Predicting Graphical Passwords', in. International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI), Springer, pp. 23-35. doi: 10.1007/978-3-319-20376-8_3.
Phillips, E., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2015) 'Extracting Social Structure from DarkWeb Forums', in. 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15).
Nurse, J. R. C., Agrafiotis, I., Goldsmith, M., Creese, S., Lamberts, K., Price, D. and Jones, G. (2015) 'Information trustworthiness as a solution to the misinformation problems in social media', in. International Conference on Cyber Security for Sustainable Society, pp. 28-35.
Alahmadi, B. A., Legg, P. .A. and Nurse, J. R. C. (2015) 'Using Internet Activity Profiling for Insider-Threat Detection', in. 17th International Conference on Enterprise Information Systems (ICEIS), SciTePress, pp. 709-720. doi: 10.5220/0005480407090720.
Bada, M., Sasse, A. and Nurse, J. R. C. (2015) 'Cyber Security Awareness Campaigns: Why do they fail to change behaviour?', in. International Conference on Cyber Security for Sustainable Society, pp. 118-131.
Phillips, E., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2015) 'Applying Social Network Analysis to Security', in. International Conference on Cyber Security for Sustainable Society, pp. 11-27.
Carvalho, R., Goldsmith, M. and Nurse, J. R. C. (2015) 'Online banking malware ontology', in. International Crime and Intelligence Analysis Conference (ICIA).
Buckley, O., Nurse, J. R. C., Legg, P. A., Goldsmith, M. and Creese, S. (2014) 'Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat', in. Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF), IEEE. doi: 10.1109/STAST.2014.10.
Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R. and Whitty, M. (2014) 'Understanding Insider Threat: A Framework for Characterising Attacks', in. Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14), in conjunction with the IEEE Symposium on Security and Privacy (SP)., IEEE. doi: 10.1109/SPW.2014.38.
Nurse, J. R. C., Pumphrey, J., Gibson-Robinson, T., Goldsmith, M. and Creese, S. (2014) 'Inferring Social Relationships from Technology-Level Device Connections', in. 12th International Conference on Privacy, Security and Trust (PST), IEEE, pp. 40 - 47. doi: 10.1109/PST.2014.6890922.
Creese, S., Gibson-Robinson, T., Goldsmith, M., Hodges, D., Kim, D., Love, O., Nurse, J. R. C., Pike, B. and Schultz, J. (2014) 'Tools for Understanding Identity', in. IEEE Conference on Technologies for Homeland Security (HST '13), IEEE. doi: 10.1109/THS.2013.6699064.
Nurse, J. R. C., Agrafiotis, I., Goldsmith, M., Creese, S., Lamberts, K., Price, D. and Jones, G. (2014) 'Managing the influence of social media using information trust', in. Social Influence in the Information Age Conference.
Nurse, J. R. C., Legg, P. A., Buckley, O., Agrafiotis, I., Wright, G., Whitty, M., Upton, D., Goldsmith, M. and Creese, S. (2014) 'A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches', in. International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI), Springer. doi: 10.1007/978-3-319-07620-1_24.
Nurse, J. R. C., Agrafiotis, I., Creese, S., Goldsmith, M. and Lamberts, K. (2013) 'Building Confidence in Information-Trustworthiness Metrics for Decision Support', in. The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), IEEE. doi: 10.1109/TrustCom.2013.6.
Nurse, J. R. C., Agrafiotis, I., Creese, S., Goldsmith, M. and Lamberts, K. (2013) 'Communicating Trustworthiness using Radar Graphs: A Detailed Look', in. The 11th International Conference on Privacy, Security and Trust (PST), IEEE. doi: 10.1109/PST.2013.6596085.
Nurse, J. R. C., Creese, S. and Goldsmith, M. (2013) 'At the Crossroads: Cybersecurity and Psychology', in. Annual Cyberpsychology Conference.
Nurse, J. R. C. (2013) 'Effective Communication of Cyber Security Risks', in. 7th International Scientific Conference on Security and Protection of Information (SPI 2013). Available at: http://spi.unob.cz/indexen.html.
Nurse, J. R. C., Creese, S., Goldsmith, M. and Rahman, S. S. (2013) 'Supporting Human Decision-Making Online using Information Trustworthiness Metrics', in. International Conference on Human Aspects of Information Security, Privacy and Trust at the 15th International Conference on Human-Computer Interaction (HCII), Springer, pp. 316-325. doi: 10.1007/978-3-642-39345-7_33.
Nurse, J. R. C., Creese, S., Goldsmith, M. and Lamberts, K. (2012) 'Using Information Trustworthiness Advice in Decision-Making', in. The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF), IEEE, pp. 35-42. doi: 10.1109/STAST.2012.10.
Creese, S., Goldsmith, M., Nurse, J. R. C. and Phillips, E. (2012) 'A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks', in. 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), IEEE, pp. 1124-1131. doi: 10.1109/TrustCom.2012.22.
Hodges, D., Nurse, J. R. C., Goldsmith, M. and Creese, S. (2012) 'Identity attribution across CyberSpace and the Natural Space', in. The International Crime and Intelligence Analysis Conference. Available at: http://www.ucl.ac.uk/jdi/events/int-CIA-conf.
Nurse, J. R. C. and Sinclair, J. E. (2012) 'Towards A Model to Support the Reconciliation of Security Actions across Enterprises', in. The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF), IEEE. doi: 10.1109/STAST.2012.11.
Nurse, J. R. C., Creese, S., Goldsmith, M., Craddock, R. and Jones, G. (2012) 'An Initial Usability Evaluation of the Secure Situation Awareness System', in. The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012), IAS of ISCRAM. Available at: http://www.iscramlive.org/ISCRAM2012/proceedings/240.pdf.
Yang, S., Joy, M. S. and Nurse, J. R. C. (2011) 'Experiences on Sharing E-Learning Resources using Service Technologies', in. 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011), ACTA Press. doi: 10.2316/P.2011.734-060.
Nurse, J. R. C., Creese, S., Goldsmith, M. and Lamberts, K. (2011) 'Trustworthy and Effective Communication of Cybersecurity Risks: A Review', in. The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011), IEEE. doi: 10.1109/STAST.2011.6059257.
Nurse, J. R. C., Creese, S., Goldsmith, M. and Lamberts, K. (2011) 'Guidelines for Usable Cybersecurity: Past and Present', in. The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011), IEEE, pp. 21-26. doi: 10.1109/CSS.2011.6058566.
Nurse, J. R. C., Rahman, S. S., Creese, S., Goldsmith, M. and Lamberts, K. (2011) 'Information Quality and Trustworthiness: A Topical State-of-the-Art Review', in. The International Conference on Computer Applications and Network Security (ICCANS) 2011, IEEE. Available at: http://www.tease-project.info/publications/iccans2011_nrcgl_authors_final.
Nurse, J. R. C. and Sinclair, J. E. (2010) 'Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations', in. International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010), IEEE. Available at: http://eprints.dcs.warwick.ac.uk/357/1/wce2010_nurse_sinclair.pdf.
Nurse, J. R. C. and Sinclair, J. E. (2010) 'A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations', in. 5th International Conference on Internet and Web Applications and Services (ICIW 2010), IEEE. doi: 10.1109/ICIW.2010.10.
Edited journals
Szymkowiak, A., Shepherd, L., Nurse, J. R. C., Ziefle, M. and Brauner, P. (eds) (2023) 'Technology For the Greater Good? The Influence of (Ir)responsible Systems on Human Emotions, Thinking and Behavior', Frontiers in Computer Science. doi: 10.3389/fcomp.2023.1341692.
Hernández Ramos, J. L., Nurse, J. R. C., Bellavista, P., Kambourakis, G. and Charalampos, P. (eds) (2023) 'Special Issue on Security and Data Protection during the COVID-19 Pandemic and Beyond', IEEE IT Professional. Available at: https://www.computer.org/digital-library/magazine/it/cfp-covid-19-data-protection.
Research reports (external)
Nurse, J. R. C., Adamos, K., Grammatopoulos, A. and Di Franco, F. (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education, European Union Agency for Cybersecurity (ENISA) Report. European Union Agency for Cybersecurity (ENISA). doi: 10.2824/033355.
Sugiura, L., Blackbourn, D., Button, M., Hawkins, C., Tapley, J., Frederick, B., Nurse, J. R. C. and Belen Sağlam, R. (2021) Computer misuse as a facilitator of Domestic Abuse. University of Portsmouth. Available at: https://researchportal.port.ac.uk/en/projects/computer-misuse-as-a-facilitator-of-domestic-abuse.
Total publications in KAR: 155 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 26/04/2024