Jason R.C. Nurse
Jason R.C. Nurse
Associate Professor in Cyber Security, University of Kent
Verified email at - Homepage
Cited by
Cited by
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
M Bada, AM Sasse, JRC Nurse
International Conference on Cyber Security for Sustainable Society, 118-131, 2015
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks During the Pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & Security, 2021
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
Workshop on Research for Insider Threat (WRIT) held as part of the IEEE …, 2014
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IEEE IT Professional (IT Pro), 2017
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S  Creese, D  Upton
Journal of Cybersecurity, 2018
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
T Rashid, I Agrafiotis, JRC Nurse
8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016
Guidelines for usable cybersecurity: Past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
3rd International Symposium on Cyberspace Safety and Security (CSS), 21-26, 2011
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 1-20, 2016
Trustworthy and effective communication of cybersecurity risks: A review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 60-68, 2011
Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs)
M Bada, JRC Nurse
Information and Computer Security, 2019
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
M Williams, JRC Nurse, S Creese
Proceedings of the 11th International Conference on Availability …, 2016
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)
S Sirur, JRC Nurse, H Webb
Workshop on Multimedia Privacy and Security (MPS), at the 25th ACM …, 2018
Determining the veracity of rumours on Twitter
G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis
8th International Conference on Social Informatics (SocInfo 2016), 2016
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
D Woods, I Agrafiotis, JRC Nurse, S Creese
Journal of Internet Services and Applications, 2017
Information quality and trustworthiness: A topical state-of-the-art review
JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts
International Conference on Computer Applications and Network Security (ICCANS), 2011
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
International Workshop on Secure Internet of Things at European Symposium on …, 2015
Cyber Risk at the Edge: Current and future trends on Cyber Risk Analytics and Artificial Intelligence in the Industrial Internet of Things and Industry 4.0 Supply Chains
P Radanliev, D De Roure, K Page, JRC Nurse, R Matilla Montalvo, ...
Cybersecurity 3 (1), 1-21, 2020
Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit
JRC Nurse
The Oxford Handbook of Cyberpsychology, 2018
The system can't perform the operation now. Try again later.
Articles 1–20