Skip to main content

Showing 1–12 of 12 results for author: Shepherd, L A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.00070  [pdf

    cs.HC cs.CR cs.CY

    Tainted Love: A Systematic Review of Online Romance Fraud

    Authors: Alexander Bilz, Lynsay A. Shepherd, Graham I. Johnson

    Abstract: Romance fraud involves cybercriminals engineering a romantic relationship on online dating platforms. It is a cruel form of cybercrime whereby victims are left heartbroken, often facing financial ruin. We characterise the literary landscape on romance fraud, advancing the understanding of researchers and practitioners by systematically reviewing and synthesising contemporary qualitative and quanti… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: 41 pages, 3 figures, 3 tables

  2. arXiv:2301.03301  [pdf, other

    cs.HC cs.CY

    Deep Breath: A Machine Learning Browser Extension to Tackle Online Misinformation

    Authors: Marc Kydd, Lynsay A. Shepherd

    Abstract: Over the past decade, the media landscape has seen a radical shift. As more of the public stay informed of current events via online sources, competition has grown as outlets vie for attention. This competition has prompted some online outlets to publish sensationalist and alarmist content to grab readers' attention. Such practices may threaten democracy by distorting the truth and misleading read… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Comments: 8 pages, 9 figures

  3. arXiv:2009.10158  [pdf, other

    cs.CR cs.CY cs.HC

    Proposal of a Novel Bug Bounty Implementation Using Gamification

    Authors: Jamie O'Hare, Lynsay A. Shepherd

    Abstract: Despite significant popularity, the bug bounty process has remained broadly unchanged since its inception, with limited implementation of gamification aspects. Existing literature recognises that current methods generate intensive resource demands, and can encounter issues impacting program effectiveness. This paper proposes a novel bug bounty process aiming to alleviate resource demands and mitig… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Comments: 11 pages

  4. Human-Computer Interaction Considerations When Develo** Cyber Ranges

    Authors: Lynsay A. Shepherd, Stefano De Paoli, Jim Conacher

    Abstract: The number of cyber-attacks are continuing to rise globally. It is therefore vital for organisations to develop the necessary skills to secure their assets and to protect critical national infrastructure. In this short paper, we outline upon human-computer interaction elements which should be considered when develo** a cybersecurity training platform, in an effort to maintain levels of user enga… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: 5 pages, short discussion paper

    Journal ref: 2020 International Journal of Information Security and Cybercrime 9(2), pp.28-32

  5. Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic

    Authors: Har**der Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens

    Abstract: The COVID-19 pandemic was a remarkable unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affecte… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 20 pages, 6 figures

    Journal ref: Computers & Security 2021

  6. A Taxonomy of Approaches for Integrating Attack Awareness in Applications

    Authors: Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean

    Abstract: Software applications are subject to an increasing number of attacks, resulting in data breaches and financial damage. Many solutions have been considered to help mitigate these attacks, such as the integration of attack-awareness techniques. In this paper, we propose a taxonomy illustrating how existing attack awareness techniques can be integrated into applications. This work provides a guide fo… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Comments: 4 pages, 1 figure. Accepted/In Press in IEEE Cyber Security 2020 Proceedings

  7. Gamification Techniques for Raising Cyber Security Awareness

    Authors: Sam Scholefield, Lynsay A. Shepherd

    Abstract: Due to the prevalence of online services in modern society, such as internet banking and social media, it is important for users to have an understanding of basic security measures in order to keep themselves safe online. However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area. Gamification has grown in popularity in recent… ▽ More

    Submitted 20 March, 2019; v1 submitted 20 March, 2019; originally announced March 2019.

    Comments: 14 pages. Human-Computer International 2019, HCII 2019, Orlando, United States (2019), Springer

  8. BlackWatch: Increasing Attack Awareness Within Web Applications

    Authors: Calum C. Hall, Lynsay A. Shepherd, Natalie Coull

    Abstract: Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of security. Whilst prevention is an essential part of the security process, developers must also implement a level of attack awareness into their we… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Comments: 19 pages, 8 figures

  9. Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis

    Authors: Adam Rapley, Xavier Bellekens, Lynsay A. Shepherd, Colin McLean

    Abstract: Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications from malicious actors. Electron is one such JavaScript application framework which facilitates this multi-platform out-the-box paradigm and is based… ▽ More

    Submitted 15 November, 2018; v1 submitted 14 November, 2018; originally announced November 2018.

    Comments: 19 pages

  10. Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour

    Authors: Lynsay A. Shepherd, Jacqueline Archibald

    Abstract: A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship between end-user-security behaviour, and the use of affective feedback to educate end-users. Part of the aforementioned research project considers the… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

    Comments: 6 pages, 1 figure. Accepted in IEEE CyberSA 2017 Proceedings

  11. How to Make Privacy Policies both GDPR-Compliant and Usable

    Authors: Karen Renaud, Lynsay A. Shepherd

    Abstract: It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this. We commenced by synthesising the GDPR… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

    Comments: 8 pages, 3 figures. Accepted in IEEE CyberSA 2018 Proceedings

  12. arXiv:1806.05426  [pdf, other

    cs.HC cs.CR cs.CY

    How to design browser security and privacy alerts

    Authors: Lynsay A. Shepherd, Karen Renaud

    Abstract: It is important to design browser security and privacy alerts so as to maximise their value to the end user, and their efficacy in terms of communicating risk. We derived a list of design guidelines from the research literature by carrying out a systematic review. We analysed the papers both quantitatively and qualitatively to arrive at a comprehensive set of guidelines. Our findings aim to to pro… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: Symposium on Digital Behaviour Intervention for Cyber Security, AISB 2018 Convention

    Journal ref: AISB 2018: Symposium on Digital Behaviour Intervention for Cyber Security (pp. 21-28). Society for the Study of Artificial Intelligence and Simulation for Behaviour (AISB)