Jason R.C. Nurse
Jason R.C. Nurse
Associate Professor in Cyber Security, University of Kent
Verified email at kent.ac.uk - Homepage
Title
Cited by
Cited by
Year
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
M Bada, AM Sasse, JRC Nurse
International Conference on Cyber Security for Sustainable Society, 118-131, 2015
199*2015
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
Workshop on Research for Insider Threat (WRIT) held as part of the IEEE …, 2014
1722014
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IEEE IT Professional (IT Pro), 2017
922017
Guidelines for usable cybersecurity: Past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
3rd International Symposium on Cyberspace Safety and Security (CSS), 21-26, 2011
772011
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
752013
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
T Rashid, I Agrafiotis, JRC Nurse
8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016
732016
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6 (1), 8, 2016
472016
Trustworthy and effective communication of cybersecurity risks: A review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 60-68, 2011
472011
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
452015
Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things
JRC Nurse, A Erola, I Agrafiotis, M Goldsmith, S Creese
International Workshop on Secure Internet of Things at European Symposium on …, 2015
442015
Information quality and trustworthiness: A topical state-of-the-art review
JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts
International Conference on Computer Applications and Network Security (ICCANS), 2011
412011
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems
JRC Nurse, S Creese, D De Roure
Living in the Internet of Things: Cybersecurity of the IoT Conference, 2018
402018
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
D Woods, I Agrafiotis, JRC Nurse, S Creese
Journal of Internet Services and Applications, 2017
402017
Determining the veracity of rumours on Twitter
G Giasemidis, C Singleton, I Agrafiotis, JRC Nurse, A Pilgrim, C Willis
8th International Conference on Social Informatics (SocInfo 2016), 2016
392016
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC  Nurse, M Goldsmith, S  Creese, D  Upton
Journal of Cybersecurity, 2018
372018
A data-reachability model for elucidating privacy and security risks related to the use of online social networks
S Creese, M Goldsmith, JRC Nurse, E Phillips
11th IEEE International Conference on Trust, Security and Privacy in …, 2012
352012
Two sides of the coin: measuring and communicating the trustworthiness of online information
JRC Nurse, I Agrafiotis, M Goldsmith, S Creese, K Lamberts
Journal of Trust Management 1 (1), 1-20, 2014
332014
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
M Williams, JRC Nurse, S Creese
Proceedings of the 11th International Conference on Availability …, 2016
322016
The Industrial Internet-of-Things in the Industry 4.0 supply chains of small and medium sized enterprises
P Radanliev, DC De Roure, JRC Nurse, RM Montalvo, P Burnap
University of Oxford 10, 2019
312019
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammueller, JRC Nurse, C Probst
International Conference on Human Aspects of Information Security, Privacy …, 2016
282016
The system can't perform the operation now. Try again later.
Articles 1–20