Jason Nurse
Dr Jason R. C. Nurse
Biography
I primarily work as a Research Fellow in Computer Science pursing novel approaches to maintain organisational cybersecurity. Within my role, I also act as a lecturer within the Centre for Doctoral Training in Cyber Security (CDT) and as a supervisor for various undergraduate, masters and doctoral projects. I am a JR Fellow in Wolfson College Oxford and a member of Cyber Security Oxford.
There are various projects that I have been involved in, including: Identity Security in Cyberspace, Cybersecurity Capacity Models, Risk Control Effectiveness, Corporate Insider Threat Detection: Cyber Security Inside and Out (CITD), and TEASE (Trust Enabling Augmented-Reality Support for Information-Environments).
In addition to my role at Oxford, I held a Research Fellow post at the University of Warwick in the Department of Psychology.
I completed a PhD in Computer Science (specialising in online security for businesses) at the University of Warwick. I also hold an MSc in Internet Computing (Distinction) from the University of Hull, and a BSc in Computer Science and Accounting (First Class) from the University of the West Indies.
Outside of academia, I have had roles in industry ranging from software development to Web application development, and researching the application and exploitation of new technologies within business.
> News:
Papers accepted lately for IEEE IT Professional (IT-Pro), Human Aspects of Security and Privacy Conference (HCII-HAS), British Human Computer Interaction Conference (B-HCI), World Conference on Information Security Education (WISE), & Journal On Advances in Security (JAS).
Papers published recently in Social Informatics Conference (SocInfo), ACM CCS Insider Threat Workshop (MIST), Security Informatics Journal (SI), Human-centric Computing and Information Sciences Journal (HCIS), International Conference on Emerging Security Information‚ Systems and Technologies (on Sonification, and Attack Graphs), Forum on Research & Tech in Society (RTSI), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), ICISSP-2016, and HCII-2016 (security track). Find out more about publications here.
On a more social note, you can now find me on Twitter @jasonnurse!
Selected Publications
-
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 19th International Conference on Human−Computer Interaction (HCII). Springer. 2017.
Details about An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | BibTeX data for An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | Download (pdf) of An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | DOI (10.1007/978-3-319-58460-7_26)
-
Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things
Meredydd Williams‚ Jason R.C. Nurse and Sadie Creese
In 15th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2017.
(To appear)
Details about Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things | BibTeX data for Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things | Download (pdf) of Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things
-
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks