Jason R.C. Nurse
TitleCited byYear
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
Workshop on Research for Insider Threat (WRIT) held as part of the IEEE …, 2014
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
M Bada, AM Sasse, JRC Nurse
International Conference on Cyber Security for Sustainable Society, 118-131, 2015
Towards a conceptual model and reasoning structure for insider threat detection
P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks ‚Ubiquitous Computing ‚and Dependable …, 2013
Guidelines for usable cybersecurity: Past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
3rd International Symposium on Cyberspace Safety and Security (CSS), 21-26, 2011
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IEEE IT Professional (IT Pro), 2017
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
T Rashid, I Agrafiotis, JRC Nurse
8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016
Information quality and trustworthiness: A topical state-of-the-art review
JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts
International Conference on Computer Applications and Network Security (ICCANS), 2011
Trustworthy and effective communication of cybersecurity risks: A review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 60-68, 2011
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
A data-reachability model for elucidating privacy and security risks related to the use of online social networks
S Creese, M Goldsmith, JRC Nurse, E Phillips
11th IEEE International Conference on Trust, Security and Privacy in …, 2012
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
International Workshop on Secure Internet of Things at European Symposium on …, 2015
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 8, 2016
Determining the veracity of rumours on Twitter
G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis
8th International Conference on Social Informatics (SocInfo 2016), 2016
Two sides of the coin: measuring and communicating the trustworthiness of online information
JRC Nurse, I Agrafiotis, M Goldsmith, S Creese, K Lamberts
Journal of Trust Management 1 (1), 1-20, 2014
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
D Woods, I Agrafiotis, JRC Nurse, S Creese
Journal of Internet Services and Applications, 2017
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems
JRC Nurse, S Creese, D De Roure
Living in the Internet of Things: Cybersecurity of the IoT Conference, 2018
A Critical Reflection on the Threat from Human Insiders–Its Nature, Industry Perceptions, and Detection Approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust, 270-281, 2014
The Industrial Internet-of-Things in the Industry 4.0 supply chains of small and medium sized enterprises
P Radanliev, DC De Roure, JRC Nurse, RM Montalvo, P Burnap
University of Oxford, 2019
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
M Williams, JRC Nurse, S Creese
Proceedings of the 11th International Conference on Availability …, 2016
Standardisation of cyber risk impact assessment for the Internet of Things (IoT)
P Radanliev, D De Roure, J Nurse, RM Montalvo, P Burnap
arXiv preprint arXiv:1903.04428, 2019
The system can't perform the operation now. Try again later.
Articles 1–20