Jason R.C. Nurse
Jason R.C. Nurse
Associate Professor in Cyber Security, University of Kent
Verified email at kent.ac.uk - Homepage
Title
Cited by
Cited by
Year
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
M Bada, AM Sasse, JRC Nurse
International Conference on Cyber Security for Sustainable Society, 118-131, 2015
225*2015
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
Workshop on Research for Insider Threat (WRIT) held as part of the IEEE …, 2014
1822014
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IEEE IT Professional (IT Pro), 2017
1012017
Guidelines for usable cybersecurity: Past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
3rd International Symposium on Cyberspace Safety and Security (CSS), 21-26, 2011
842011
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
T Rashid, I Agrafiotis, JRC Nurse
8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016
792016
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
782013
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC  Nurse, M Goldsmith, S  Creese, D  Upton
Journal of Cybersecurity, 2018
522018
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 1-20, 2016
522016
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
472015
Trustworthy and effective communication of cybersecurity risks: A review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 60-68, 2011
462011
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems
JRC Nurse, S Creese, D De Roure
Living in the Internet of Things: Cybersecurity of the IoT Conference, 2018
432018
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
International Workshop on Secure Internet of Things at European Symposium on …, 2015
432015
Information quality and trustworthiness: A topical state-of-the-art review
JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts
International Conference on Computer Applications and Network Security (ICCANS), 2011
432011
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
D Woods, I Agrafiotis, JRC Nurse, S Creese
Journal of Internet Services and Applications, 2017
412017
Determining the veracity of rumours on Twitter
G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis
8th International Conference on Social Informatics (SocInfo 2016), 2016
392016
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
M Williams, JRC Nurse, S Creese
Proceedings of the 11th International Conference on Availability …, 2016
362016
A data-reachability model for elucidating privacy and security risks related to the use of online social networks
S Creese, M Goldsmith, JRC Nurse, E Phillips
11th IEEE International Conference on Trust, Security and Privacy in …, 2012
362012
The Industrial Internet-of-Things in the Industry 4.0 supply chains of small and medium sized enterprises
P Radanliev, DC De Roure, JRC Nurse, RM Montalvo, P Burnap
University of Oxford 10, 2019
332019
Two sides of the coin: measuring and communicating the trustworthiness of online information
JRC Nurse, I Agrafiotis, M Goldsmith, S Creese, K Lamberts
Journal of Trust Management 1 (1), 1-20, 2014
332014
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammueller, JRC Nurse, C Probst
International Conference on Human Aspects of Information Security, Privacy …, 2016
292016
The system can't perform the operation now. Try again later.
Articles 1–20