Skip to main content

Showing 1–50 of 58 results for author: Nurse, J R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11515  [pdf, ps, other

    cs.AI cs.CY cs.ET cs.HC

    Embedding Privacy in Computational Social Science and Artificial Intelligence Research

    Authors: Keenan Jones, Fatima Zahrah, Jason R. C. Nurse

    Abstract: Privacy is a human right. It ensures that individuals are free to engage in discussions, participate in groups, and form relationships online or offline without fear of their data being inappropriately harvested, analyzed, or otherwise used to harm them. Preserving privacy has emerged as a critical factor in research, particularly in the computational social science (CSS), artificial intelligence… ▽ More

    Submitted 3 June, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: International Association for the Advancement of Artificial Intelligence (AAAI) Conference on Web and Social Media (ICWSM) Workshops (Disrupt, Ally, Resist, Embrace (DARE) Workshop), 2024

  2. arXiv:2402.17393  [pdf

    cs.CY

    Designing Chatbots to Support Victims and Survivors of Domestic Abuse

    Authors: Rahime Belen Saglam, Jason R. C. Nurse, Lisa Sugiura

    Abstract: Objective: Domestic abuse cases have risen significantly over the last four years, in part due to the COVID-19 pandemic and the challenges for victims and survivors in accessing support. In this study, we investigate the role that chatbots - Artificial Intelligence (AI) and rule-based - may play in supporting victims/survivors in situations such as these or where direct access to help is limited.… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  3. Exploring Cybercriminal Activities, Behaviors and Profiles

    Authors: Maria Bada, Jason R. C. Nurse

    Abstract: While modern society benefits from a range of technological advancements, it also is exposed to an ever-increasing set of cybersecurity threats. These affect all areas of life including business, government, and individuals. To complement technology solutions to this problem, it is crucial to understand more about cybercriminal perpetrators themselves, their use of technology, psychological aspect… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Journal ref: Applied Cognitive Science and Technology, 2023

  4. arXiv:2307.02855  [pdf, other

    cs.CR cs.CY

    It's more than just money: The real-world harms from ransomware attacks

    Authors: Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan

    Abstract: As cyber-attacks continue to increase in frequency and sophistication, organisations must be better prepared to face the reality of an incident. Any organisational plan that intends to be successful at managing security risks must clearly understand the harm (i.e., negative impact) and the various parties affected in the aftermath of an attack. To this end, this article conducts a novel exploratio… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

    Comments: 17th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2023)

  5. arXiv:2305.07796  [pdf, other

    cs.IR

    aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions

    Authors: Enes Altuncu, Jason R. C. Nurse, Meryem Bagriacik, Sophie Kaleba, Haiyue Yuan, Lisa Bonheme, Shujun Li

    Abstract: In this highly digitised world, fake news is a challenging problem that can cause serious harm to society. Considering how fast fake news can spread, automated methods, tools and services for assisting users to do fact-checking (i.e., fake news detection) become necessary and helpful, for both professionals, such as journalists and researchers, and the general public such as news readers. Experts,… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: Accepted for publication in the Proceedings of the Workshop on News Media and Computational Journalism (MEDIATE '23), co-located with the AAAI International Conference on Web and Social Media (ICWSM '23)

  6. arXiv:2211.05031  [pdf, other

    cs.CL cs.IR

    Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS-Tagging and Enhanced Semantic-Awareness

    Authors: Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li

    Abstract: Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process. It has various applications in information retrieval (IR) and natural language processing (NLP), including text summarisation, topic analysis and document indexing. This paper proposes a simple but effective post-processing-based universal approach… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

  7. arXiv:2208.08193  [pdf, other

    cs.HC cs.CR

    A Survey of User Perspectives on Security and Privacy in a Home Networking Environment

    Authors: Nandita Pattnaik, Shujun Li, Jason R. C. Nurse

    Abstract: The security and privacy of smart home systems, particularly from a home user's perspective, have been a very active research area in recent years. However, via a meta-review of 52 review papers covering related topics (published between 2000 and 2021), this paper shows a lack of a more recent literature review on user perspectives of smart home security and privacy since the 2010s. This identifie… ▽ More

    Submitted 10 December, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

    Comments: 35 pages, Published in ACM Computing Surveys

  8. arXiv:2206.03930  [pdf, other

    cs.CR cs.HC

    "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security

    Authors: Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li

    Abstract: The Internet of Things (IoT) is increasingly present in many family homes, yet it is unclear precisely how well families understand the cyber security threats and risks of using such devices, and how possible it is for them to educate themselves on these topics. Using a survey of 553 parents and interviews with 25 families in the UK, we find that families do not consider home IoT devices to be sig… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  9. Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter

    Authors: Nandita Pattnaik, Shujun Li, Jason R. C. Nurse

    Abstract: Current research on users` perspectives of cyber security and privacy related to traditional and smart devices at home is very active, but the focus is often more on specific modern devices such as mobile and smart IoT devices in a home context. In addition, most were based on smaller-scale empirical studies such as online surveys and interviews. We endeavour to fill these research gaps by conduct… ▽ More

    Submitted 10 December, 2022; v1 submitted 5 June, 2022; originally announced June 2022.

    Comments: 15 pages, 7 figures, published in Computers & Security

    Journal ref: Computers & Security 125 (2023), 103008 (2023)

  10. arXiv:2203.09813  [pdf, other

    cs.CL cs.AI cs.LG

    Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators

    Authors: Keenan Jones, Jason R. C. Nurse, Shujun Li

    Abstract: Recently, there has been a rise in the development of powerful pre-trained natural language models, including GPT-2, Grover, and XLM. These models have shown state-of-the-art capabilities towards a variety of different NLP tasks, including question answering, content summarisation, and text generation. Alongside this, there have been many studies focused on online authorship attribution (AA). That… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: 13 pages, 6 figures, 4 tables, Accepted for publication in the proceedings of the sixteenth International AAAI Conference on Web and Social Media (ICWSM-22)

  11. arXiv:2202.01302  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election

    Authors: Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith

    Abstract: The rapid integration of the Internet into our daily lives has led to many benefits but also to a number of new, wide-spread threats such as online hate, trolling, bullying, and generally aggressive behaviours. While research has traditionally explored online hate, in particular, on one platform, the reality is that such hate is a phenomenon that often makes use of multiple online networks. In thi… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 2022 ACM Symposium on Applied Computing (SAC'22)

  12. arXiv:2112.09035  [pdf, other

    cs.HC cs.CR cs.CY

    It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices

    Authors: Sarah Turner, Jason R. C. Nurse, Shujun Li

    Abstract: This study considers how well an autoethnographic diary study helps as a method to explore why families might struggle in the application of strong and cohesive cyber security measures within the smart home. Combining two human-computer interaction (HCI) research methods - the relatively unstructured process of autoethnography and the more structured diary study - allowed the first author to refle… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

    Comments: 2022 ACM CHI Conference on Human Factors in Computing Systems

  13. When Googling it doesn't work: The challenge of finding security advice for smart home devices

    Authors: Sarah Turner, Jason R. C. Nurse, Shujun Li

    Abstract: As users increasingly introduce Internet-connected devices into their homes, having access to accurate and relevant cyber security information is a fundamental means of ensuring safe use. Given the paucity of information provided with many devices at the time of purchase, this paper engages in a critical study of the type of advice that home Internet of Things (IoT) or smart device users might be… ▽ More

    Submitted 6 August, 2021; originally announced August 2021.

  14. arXiv:2107.10554  [pdf, other

    cs.CY cs.LG

    Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the 2020 Black Lives Matter Protests

    Authors: Keenan Jones, Jason R. C. Nurse, Shujun Li

    Abstract: Recently, there had been little notable activity from the once prominent hacktivist group, Anonymous. The group, responsible for activist-based cyber attacks on major businesses and governments, appeared to have fragmented after key members were arrested in 2013. In response to the major Black Lives Matter (BLM) protests that occurred after the killing of George Floyd, however, reports indicated t… ▽ More

    Submitted 22 July, 2021; originally announced July 2021.

    Comments: 12 pages, 9 figures, 3 tables. Accepted for publication in the proceedings of the sixteenth International AAAI Conference on Web and Social Media

  15. SherLOCKED: A Detective-themed Serious Game for Cyber Security Education

    Authors: Alice Jaffray, Conor Finn, Jason R. C. Nurse

    Abstract: Gamification and Serious Games are progressively being used over a host of fields, particularly to support education. Such games provide a new way to engage students with content and can complement more traditional approaches to learning. This article proposes SherLOCKED, a new serious game created in the style of a 2D top-down puzzle adventure. The game is situated in the context of an undergradu… ▽ More

    Submitted 9 July, 2021; originally announced July 2021.

    Journal ref: 15th IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2021)

  16. arXiv:2107.03959  [pdf, other

    cs.CY cs.AI cs.CL cs.HC

    Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry

    Authors: Rahime Belen Saglam, Jason R. C. Nurse, Duncan Hodges

    Abstract: Through advances in their conversational abilities, chatbots have started to request and process an increasing variety of sensitive personal information. The accurate disclosure of sensitive information is essential where it is used to provide advice and support to users in the healthcare and finance sectors. In this study, we explore users' concerns regarding factors associated with the use of se… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Journal ref: 23rd International Conference on Human-Computer Interaction (HCII 2021)

  17. Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy

    Authors: Jason R. C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John Blythe, Ben Koppelman

    Abstract: COVID-19 has radically changed society as we know it. To reduce the spread of the virus, millions across the globe have been forced to work remotely, often in make-shift home offices, and using a plethora of new, unfamiliar digital technologies. In this article, we critically analyse cyber security and privacy concerns arising due to remote working during the coronavirus pandemic. Through our work… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

    Comments: HCI International 2021 (HCII 2021)

  18. arXiv:2106.14701  [pdf

    cs.CR cs.CY cs.HC

    Develo** a cyber security culture: Current practices and future needs

    Authors: Betsy Uchendu, Jason R. C. Nurse, Maria Bada, Steven Furnell

    Abstract: While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In this article, we aim to tackle this issue by conducting a state-of-the-art study into organisational cyber security culture research. This work invest… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Journal ref: Computers & Security, 2021

  19. arXiv:2106.08298  [pdf, other

    cs.HC cs.AI cs.CL cs.CY

    StockBabble: A Conversational Financial Agent to support Stock Market Investors

    Authors: Suraj Sharma, Joseph Brennan, Jason R. C. Nurse

    Abstract: We introduce StockBabble, a conversational agent designed to support understanding and engagement with the stock market. StockBabble's value and novelty is in its ability to empower retail investors -- many of which may be new to investing -- and supplement their informational needs using a user-friendly agent. Users have the ability to query information on companies to retrieve a general and fina… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: CUI 2021 - 3rd Conference on Conversational User Interfaces

  20. The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter

    Authors: Keenan Jones, Jason R. C. Nurse, Shujun Li

    Abstract: Emojis have established themselves as a popular means of communication in online messaging. Despite the apparent ubiquity in these image-based tokens, however, interpretation and ambiguity may allow for unique uses of emojis to appear. In this paper, we present the first examination of emoji usage by hacktivist groups via a study of the Anonymous collective on Twitter. This research aims to identi… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: 10 pages, 1 figure, 7 tables

  21. Profiling the Cybercriminal: A Systematic Review of Research

    Authors: Maria Bada, Jason R. C. Nurse

    Abstract: As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the cybercriminal (cyber-offender) profiling domain by conducting a rigorous systematic review. This work investigates the aforementioned domain to answer… ▽ More

    Submitted 11 May, 2021; v1 submitted 6 May, 2021; originally announced May 2021.

    Report number: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)

    Journal ref: IEEE, 14-18 June 2021, pp. 1-8

  22. arXiv:2103.00474  [pdf, ps, other

    cs.CR cs.CY cs.HC cs.NI

    Cybersecurity Awareness

    Authors: Jason R. C. Nurse

    Abstract: Cybersecurity awareness can be viewed as the level of appreciation, understanding or knowledge of cybersecurity or information security aspects. Such aspects include cognizance of cyber risks and threats, but also appropriate protection measures.

    Submitted 28 February, 2021; originally announced March 2021.

    Journal ref: In: Jajodia S., Samarati P., Yung M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg (2021)

  23. A framework for effective corporate communication after cyber security incidents

    Authors: Richard Knight, Jason R. C. Nurse

    Abstract: A major cyber security incident can represent a cyber crisis for an organisation, in particular because of the associated risk of substantial reputational damage. As the likelihood of falling victim to a cyberattack has increased over time, so too has the need to understand exactly what is effective corporate communication after an attack, and how best to engage the concerns of customers, partners… ▽ More

    Submitted 19 September, 2020; originally announced September 2020.

    Journal ref: Computers & Security, Volume 99, December 2020

  24. arXiv:2008.11808  [pdf, other

    cs.CY

    #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives

    Authors: Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith

    Abstract: The rapid expansion of cyberspace has greatly facilitated the strategic shift of traditional crimes to online platforms. This has included malicious actors, such as extremist organisations, making use of online networks to disseminate propaganda and incite violence through radicalising individuals. In this article, we seek to advance current research by exploring how supporters of extremist organi… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: In the proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

  25. The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes

    Authors: Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese

    Abstract: Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its more procedural policy-related aspects. Th… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Journal ref: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)

  26. arXiv:2008.04698  [pdf, other

    cs.CR cs.CY cs.HC

    Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things

    Authors: Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais

    Abstract: Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: First, we interviewed 11 journalists and surveyed 5 further journalists, to determine the extent to whi… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: 5th European Workshop on Usable Security, at 2020 IEEE European Symposium on Security and Privacy (EuroS&P)

  27. Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic

    Authors: Har**der Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens

    Abstract: The COVID-19 pandemic was a remarkable unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affecte… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 20 pages, 6 figures

    Journal ref: Computers & Security 2021

  28. arXiv:2006.08273  [pdf, other

    cs.SI cs.LG

    Behind the Mask: A Computational Study of Anonymous' Presence on Twitter

    Authors: Keenan Jones, Jason R. C. Nurse, Shujun Li

    Abstract: The hacktivist group Anonymous is unusual in its public-facing nature. Unlike other cybercriminal groups, which rely on secrecy and privacy for protection, Anonymous is prevalent on the social media site, Twitter. In this paper we re-examine some key findings reported in previous small-scale qualitative studies of the group using a large-scale computational analysis of Anonymous' presence on Twitt… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 12 pages, 5 figures. Published in the proceedings of the fourteenth International AAAI Conference on Web and Social Media

    Journal ref: Proceedings of the International AAAI Conference on Web and Social Media. 14, 1 (May 2020), 327-338

  29. arXiv:2005.12644  [pdf, ps, other

    cs.CY cs.AI cs.HC cs.SE

    Is your chatbot GDPR compliant? Open issues in agent design

    Authors: Rahime Belen Saglam, Jason R. C. Nurse

    Abstract: Conversational agents open the world to new opportunities for human interaction and ubiquitous engagement. As their conversational abilities and knowledge has improved, these agents have begun to have access to an increasing variety of personally identifiable information and intimate details on their user base. This access raises crucial questions in light of regulations as robust as the General D… ▽ More

    Submitted 26 May, 2020; originally announced May 2020.

    Journal ref: CUI 2020: International Conference on Conversational User Interfaces, July, 2020

  30. arXiv:2001.11131  [pdf, other

    cs.HC cs.CY cs.GR cs.SE

    Develo** an Augmented Reality Tourism App through User-Centred Design (Extended Version)

    Authors: Meredydd Williams, Kelvin K. K. Yao, Jason R. C. Nurse

    Abstract: Augmented Reality (AR) bridges the gap between the physical and virtual world. Through overlaying graphics on natural environments, users can immerse themselves in a tailored environment. This offers great benefits to mobile tourism, where points of interest (POIs) can be annotated on a smartphone screen. While a variety of apps currently exist, usability issues can discourage users from embracing… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

  31. The Social and Psychological Impact of Cyber-Attacks

    Authors: Maria Bada, Jason R. C. Nurse

    Abstract: Cyber-attacks have become as commonplace as the Internet itself. Each year, industry reports, media outlets and academic articles highlight this increased prevalence, spanning both the amount and variety of attacks and cybercrimes. In this article, we seek to further advance discussions on cyber threats, cognitive vulnerabilities and cyberpsychology through a critical reflection on the social and… ▽ More

    Submitted 29 September, 2019; originally announced September 2019.

    Comments: 21 pages

    Journal ref: Benson, Vladlena and McAlaney, John, eds. (2019). Emerging Cyber Threats and Cognitive Vulnerabilities. pp. 73-92

  32. arXiv:1908.03640  [pdf, ps, other

    cs.CR cs.CL cs.CY cs.LG

    Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)

    Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse

    Abstract: The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites. In order to defend against such attacks, there is an urgent need for automated mechanisms to i… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: 13 pages

    Journal ref: 20th World Conference on Information Security Applications (WISA 2019)

  33. arXiv:1906.09594  [pdf, other

    cs.CR cs.CY cs.HC

    Develo** cybersecurity education and awareness programmes for Small and medium-sized enterprises (SMEs)

    Authors: Maria Bada, Jason R. C. Nurse

    Abstract: Purpose: An essential component of an organisation's cybersecurity strategy is building awareness and education of online threats, and how to protect corporate data and services. This research article focuses on this topic and proposes a high-level programme for cybersecurity education and awareness to be used when targeting Small-to-Medium-sized Enterprises/Businesses (SMEs/SMBs) at a city-level.… ▽ More

    Submitted 23 June, 2019; originally announced June 2019.

    Comments: 20 pages, 1 figure

    Journal ref: Information & Computer Security Journal, Vol. 27 Issue: 3, pp.393-410, 2019

  34. arXiv:1905.08067  [pdf, other

    cs.SI cs.CL cs.CY cs.LG stat.ML

    Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter

    Authors: Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith

    Abstract: The Internet and, in particular, Online Social Networks have changed the way that terrorist and extremist groups can influence and radicalise individuals. Recent reports show that the mode of operation of these groups starts by exposing a wide audience to extremist material online, before migrating them to less open online platforms for further radicalization. Thus, identifying radical content onl… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Journal ref: 17th IEEE International Conference on Intelligence and Security Informatics (ISI), 2019

  35. arXiv:1905.05222  [pdf, other

    cs.HC cs.CR cs.CY cs.ET cs.SE

    Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study

    Authors: Meredydd Williams, Jason R. C. Nurse, Sadie Creese

    Abstract: While the public claim concern for their privacy, they frequently appear to overlook it. This disparity between concern and behaviour is known as the Privacy Paradox. Such issues are particularly prevalent on wearable devices. These products can store personal data, such as text messages and contact details. However, owners rarely use protective features. Educational games can be effective in enco… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

    Comments: 21 pages, 2 figures

    Journal ref: Computers in Human Behavior, 2019

  36. arXiv:1905.04615  [pdf, other

    cs.CR cs.CY cs.ET cs.HC

    The Language of Biometrics: Analysing Public Perceptions

    Authors: Oliver Buckley, Jason R. C. Nurse

    Abstract: There is an increasing shift in technology towards biometric solutions, but one of the biggest barriers to widespread use is the acceptance by the users. In this paper we investigate the understanding, awareness and acceptance of biometrics by the general public. The primary research method was a survey, which had 282 respondents, designed to gauge public opinion around biometrics. Additionally, q… ▽ More

    Submitted 11 May, 2019; originally announced May 2019.

    Journal ref: Journal of Information Security and Applications, Volume 47, August 2019, Pages 112-119

  37. Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges

    Authors: Helena Webb, Jason R. C. Nurse, Louise Bezuidenhout, Marina Jirotka

    Abstract: Equipment shortages in Africa undermine Science, Technology, Engineering and Mathematics (STEM) Education. We have pioneered the LabHackathon (LabHack): a novel initiative that adapts the conventional hackathon and draws on insights from the Open Hardware movement and Responsible Research and Innovation (RRI). LabHacks are fun, educational events that challenge student participants to build frugal… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: 2019 CHI Conference on Human Factors in Computing Systems Extended Abstracts

  38. arXiv:1904.01551  [pdf

    cs.CR cs.NI eess.SY

    A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape

    Authors: Uchenna D Ani, Jeremy D McK. Watson, Jason R. C. Nurse, Al Cook, Carsten Maple

    Abstract: As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infrastructures (CNI), new cybersecurity threats emerge that require specific security solutions. Approaches used for analysis include the modelling and simulation of critical infrastructure systems using attributes, functionalities, operations, and behaviours to support various security analysis viewpoi… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT 2019

  39. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Authors: Petar Radanliev, David De Roure, Max Van Kleek, Uchenna Ani, Pete Burnap, Eirini Anthi, Jason R. C. Nurse, Omar Santos, Rafael Mantilla Montalvo, LaTreall Maddox

    Abstract: The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-ass… ▽ More

    Submitted 23 November, 2020; v1 submitted 12 March, 2019; originally announced March 2019.

  40. Future developments in standardisation of cyber risk in the Internet of Things (IoT)

    Authors: Petar Radanliev, David C De Roure, Jason RC Nurse, Rafael Mantilla Montalvo, Stacy Cannady, Omar Santos, Peter Burnap, Carsten Maple

    Abstract: In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for IoT, the study applied a range of methodologies,… ▽ More

    Submitted 29 April, 2020; v1 submitted 11 March, 2019; originally announced March 2019.

    Report number: Radanliev, P., Roure, D. De., R.C. Nurse, J., Montalvo, R.M., Cannady, S., Santos, O., Maddox, La., Burnap, P., and Maple, C., l. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl Sci. 2020;(2: 169):1--16

    Journal ref: SN Appl. Sci. 2, 169 (2020)

  41. arXiv:1902.06961  [pdf, other

    cs.HC cs.CR cs.CY

    Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement

    Authors: Mariam Nouh, Jason R. C. Nurse, Helena Webb, Michael Goldsmith

    Abstract: Cybercrime investigators face numerous challenges when policing online crimes. Firstly, the methods and processes they use when dealing with traditional crimes do not necessarily apply in the cyber-world. Additionally, cyber criminals are usually technologically-aware and constantly adapting and develo** new tools that allow them to stay ahead of law enforcement investigations. In order to provi… ▽ More

    Submitted 19 February, 2019; originally announced February 2019.

    Comments: 11 pages, Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS)

  42. arXiv:1902.03097  [pdf, other

    cs.SI cs.LG stat.AP stat.ML

    A semi-supervised approach to message stance classification

    Authors: Georgios Giasemidis, Nikolaos Kaplis, Ioannis Agrafiotis, Jason R. C. Nurse

    Abstract: Social media communications are becoming increasingly prevalent; some useful, some false, whether unwittingly or maliciously. An increasing number of rumours daily flood the social networks. Determining their veracity in an autonomous way is a very active and challenging field of research, with a variety of methods proposed. However, most of the models rely on determining the constituent messages'… ▽ More

    Submitted 29 January, 2019; originally announced February 2019.

    Comments: 33 pages, 8 figures, 1 table

    Journal ref: IEEE Transactions on Knowledge and Data Engineering, November 2018

  43. arXiv:1901.02672  [pdf

    cs.CR cs.CY cs.HC

    Cyber Security Awareness Campaigns: Why do they fail to change behaviour?

    Authors: Maria Bada, Angela M. Sasse, Jason R. C. Nurse

    Abstract: The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people's behaviour. Past and current efforts to improve information-security practices and promote a sustainable society have not had the desired impact. It is important therefore to critically reflect on the challenges involved… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

    Journal ref: International Conference on Cyber Security for Sustainable Society, 2015

  44. The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations

    Authors: Jason R. C. Nurse, Maria Bada

    Abstract: While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It identifies the platforms that online groups---cybercriminal and otherwise---use to interact, and considers groups as both perpetrators and victims… ▽ More

    Submitted 7 January, 2019; originally announced January 2019.

    Journal ref: The Oxford Handbook of Cyberpsychology, 2018

  45. Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit

    Authors: Jason R. C. Nurse

    Abstract: Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful.… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Journal ref: The Oxford Handbook of Cyberpsychology, 2018

  46. Security Risk Assessment in Internet of Things Systems

    Authors: Jason R. C. Nurse, Sadie Creese, David De Roure

    Abstract: Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness, and automation of technology systems increases and cyberspace matures, particularly with the Internet of Things (IoT), there is a strong argument that we wil… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

    Comments: 9 pages, 1 figure

    Journal ref: IT Professional (Volume: 19, Issue: 5, 2017 )

  47. arXiv:1809.05904  [pdf

    cs.CY cs.AI cs.HC cs.SI

    A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines

    Authors: Aastha Madaan, Jason R. C. Nurse, David De Roure, Kieron O'Hara, Wendy Hall, Sadie Creese

    Abstract: The concept of social machines is increasingly being used to characterise various socio-cognitive spaces on the Web. Social machines are human collectives using networked digital technology which initiate real-world processes and activities including human communication, interactions and knowledge creation. As such, they continuously emerge and fade on the Web. The relationship between humans and… ▽ More

    Submitted 30 November, 2018; v1 submitted 16 September, 2018; originally announced September 2018.

    Comments: 14 pages, 4 figures

    Report number: SSRN-3250383

  48. arXiv:1808.07338  [pdf, ps, other

    cs.CY cs.CR cs.NI

    Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)

    Authors: Sean Sirur, Jason R. C. Nurse, Helena Webb

    Abstract: The EU General Data Protection Regulation (GDPR), enforced from 25th May 2018, aims to reform how organisations view and control the personal data of private EU citizens. The scope of GDPR is somewhat unprecedented: it regulates every aspect of personal data handling, includes hefty potential penalties for non-compliance, and can prosecute any company in the world that processes EU citizens' data.… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

    Comments: 8 pages; Proceedings of the International Workshop on Multimedia Privacy and Security (MPS 2018), at the ACM Conference on Computer and Communication Security (CCS)

  49. arXiv:1807.06706  [pdf, other

    cs.HC cs.CR cs.SD eess.AS

    Sonification in security operations centres: what do security practitioners think?

    Authors: Louise M. Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese

    Abstract: In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

    ACM Class: K.6.5; H.5.5

    Journal ref: Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium 2018

  50. arXiv:1807.06588  [pdf, other

    cs.CL

    Using semantic clustering to support situation awareness on Twitter: The case of World Views

    Authors: Charlie Kingston, Jason R. C. Nurse, Ioannis Agrafiotis, Andrew Milich

    Abstract: In recent years, situation awareness has been recognised as a critical part of effective decision making, in particular for crisis management. One way to extract value and allow for better situation awareness is to develop a system capable of analysing a dataset of multiple posts, and clustering consistent posts into different views or stories (or, world views). However, this can be challenging as… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

    Journal ref: Human-centric Computing and Information Sciences (HCIS) 2018