Skip to main content

Jason Nurse : Publications

Click here to download all publications in a single bibtex file

@conference{2018-petras-iet-radetal,
  title = "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0",
  author = "Radanliev, Petar and De Roure, David and Nurse, Jason R C and Nicolescu, Razvan and Huth, Michael and Cannady, C and Montalvo, RM",
  year = "2018",
  booktitle = "Living in the Internet of Things: Cybersecurity of the IoT Conference",
  publisher = "IET",
}
@conference{2018-petras-iet-snz,
  title = "A Capability-oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems",
  author = "Sturgess, Jack and Nurse, Jason R C and Zhao, Jun",
  year = "2018",
  booktitle = "Living in the Internet of Things: Cybersecurity of the IoT Conference",
  publisher = "IET",
  doi = "10.1049/cp.2018.0037",
}
@conference{2018-petrasiot-nrcr,
  title = "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems",
  author = "Jason R. C. Nurse and Petar Radanliev and Sadie Creese and David De Roure",
  year = "2018",
  booktitle = "Living in the Internet of Things: Cybersecurity of the IoT Conference",
  note = "To appear",
  publisher = "IET",
}
@conference{2018-petrasiot-hngcw,
  title = "An Ethics Framework for Research into Heterogeneous Systems",
  author = "Happa, Jassim and Nurse, Jason R C and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca",
  year = "2018",
  booktitle = "Living in the Internet of Things: Cybersecurity of the IoT Conference",
  note = "To appear",
  publisher = "IET",
}
@conference{2018-usec-aangc,
  title = "Sonification in Security Operations Centres: What do Security Practitioners Think?",
  author = "Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2018",
  booktitle = "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium",
  note = "To appear",
  publisher = "Internet Society",
}
@conference{2017-ccs-mps-akt,
  title = "Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks",
  author = "Aktypi, Angeliki and Nurse, Jason R.C. and Goldsmith, Michael",
  year = "2017",
  booktitle = "Proceedings of the 2017 International Workshop on Multimedia Privacy and Security (MPS '17)",
  isbn = "978-1-4503-5206-2",
  month = "October",
  publisher = "ACM",
  doi = "10.1145/3137616.3137617",
}
@article{2017-jwud-nb,
  title = "Insider Threat Solutions - Moving from Concept to Reality",
  author = "Jason R.C. Nurse and Elisa Bertino",
  year = "2017",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
  doi = "10.22667/JOWUA.2017.03.31.001",
}
@article{2017-jisa-wanc,
  title = "Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms",
  author = "Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason RC and Creese, Sadie",
  year = "2017",
  journal = "Journal of Internet Services and Applications",
  publisher = "Springer",
  doi = "10.1186/s13174-017-0059-y",
}
@article{2017-advsec-angc,
  title = "A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring",
  author = "Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese",
  year = "2017",
  journal = "International Journal On Advances in Security",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness",
}
@article{2017-itpro-ncd,
  title = "Security risk assessment in Internet of Things systems",
  author = "Jason R. C. Nurse; Sadie Creese; David De Roure",
  year = "2017",
  journal = "IEEE IT Professional (IT Pro)",
  number = "5",
  pages = "20--26",
  publisher = "IEEE",
  url = "https://www.computer.org/it-professional/",
  volume = "19",
  doi = "10.1109/MITP.2017.3680959",
}
@article{2017-ifippim-wnc,
  title = "Privacy salience: Taxonomies and research opportunities",
  author = "Meredydd Williams and Jason R.C. Nurse and Sadie Creese",
  year = "2017",
  journal = "Privacy and Identity Management – Facing Up To Next Steps, IFIP Advances in Information and Communication Technology",
  publisher = "Springer",
  doi = "10.1007/978-3-319-55783-0_18",
}
@conference{2017_wise_kbn,
  title = "A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK",
  author = "Kritzinger, Elmarie and Bada, Maria and Nurse, Jason R.C.",
  year = "2017",
  booktitle = "IFIP World Conference on Information Security Education",
  keywords = "Cybersecurity, Awareness, Children, Nation states",
  pages = "110-120",
  publisher = "Springer",
  doi = "10.1007/978-3-319-58553-6_10",
}
@conference{2017-pst-wnc,
  title = "Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things",
  author = "Williams, Meredydd and Nurse, Jason R.C. and Creese, Sadie",
  year = "2017",
  booktitle = "15th International Conference on Privacy, Security and Trust (PST)",
  note = "(To appear)",
  publisher = "IEEE",
}
@conference{2017-bhci-wyn,
  title = "ToARist: An Augmented Reality Tourism App created through User-Centred Design",
  author = "Williams, Meredydd and Yao, Kelvin and Nurse, Jason R. C.",
  year = "2017",
  booktitle = "31st British Human Computer Interaction Conference (BHCI)",
  publisher = "BCS",
  url = "http://hci2017.bcs.org/wp-content/uploads/13.pdf",
}
@conference{2017-has-nurse-et-al,
  title = "An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System",
  author = "Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese",
  year = "2017",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 19th International Conference on Human-Computer Interaction (HCII)",
  publisher = "Springer",
  doi = "10.1007/978-3-319-58460-7_26",
}
@techreport{RR-17-01,
  title = "The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance",
  author = "Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Jason R.C. Nurse and David Upton",
  year = "2017",
  address = "Oxford, UK",
  institution = "DCS",
  number = "RR-17-01",
  pages = "87",
}
@article{2016-cspdpir-nurse-et-al,
  title = "An Independent Assessment of the Procedural Components of the Estonian Internet Voting System",
  author = "Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese",
  year = "2016",
  booktitle = "Cyber Studies Programme Working Paper Series",
  keywords = "e-voting, internet security, procedural controls, human factors",
  month = "September",
  number = "WP-6",
  url = "http://www.politics.ox.ac.uk/publications/an-independent-assessment-of-the-procedural-components-of-the-estonian-internet-voting-system.html",
}
@article{2016-cfs-ein,
  title = "Insider threat response and recovery strategies in financial services firms",
  author = "Jacqueline Eggenschwiler, Ioannis Agrafiotis, Jason R. C. Nurse",
  year = "2016",
  issn = "1361-3723",
  journal = "Computer Fraud & Security",
  publisher = "Elsevier Ltd.",
  doi = "10.1016/S1361-3723(16)30091-4",
}
@article{2016-secinfo-negcg,
  title = "Analytics for characterising and measuring the naturalness of online personae",
  author = "Jason R.C. Nurse and Arnau Erola and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie",
  year = "2016",
  journal = "Security Informatics Journal",
  number = "3",
  publisher = "Springer",
  url = "http://www.security-informatics.com/content/5/1/3",
  volume = "5",
  doi = "10.1186/s13388-016-0028-1",
}
@article{hcis2016-iuga-et-al,
  title = "Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks",
  author = "Cristian Iuga and Jason R.C. Nurse and Arnau Erola",
  year = "2016",
  journal = "Journal of Human-centric Computing and Information Sciences",
  number = "8",
  publisher = "Springer",
  url = "http://link.springer.com/article/10.1186/s13673-016-0065-2",
  volume = "6",
  doi = "10.1186/s13673-016-0065-2",
}
@article{jowua2016_enh,
  title = "Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices",
  author = "Eze, Chika and Nurse, Jason R.C. and Happa, Jassim",
  year = "2016",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)",
  number = "1",
  url = "http://isyou.info/jowua/abstracts/jowua-v7n1-3.htm",
  volume = "7",
}
@conference{mist2016-ran,
  title = "A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models",
  author = "Rashid, Tabish and Agrafiotis, Ioannis and Jason R.C. Nurse",
  year = "2016",
  booktitle = "8th ACM CCS International Workshop on  Managing Insider Security Threats (MIST)",
  publisher = "ACM",
  doi = "10.1145/2995959.2995964",
}
@conference{2016-eisic-nng,
  title = "Towards Designing a Multipurpose Cybercrime Intelligence Framework",
  author = "Nouh, Mariam and Nurse, Jason R.C. and Goldsmith, Michael",
  year = "2016",
  booktitle = "European Intelligence and Security Informatics Conference (EISIC)",
  publisher = "IEEE",
  url = "http://www.eisic.eu/",
  doi = "10.1109/EISIC.2016.018",
}
@conference{2016-bhci-wn,
  title = "Perspectives on privacy in the use of online systems",
  author = "Meredydd Williams and Jason R. C. Nurse",
  year = "2016",
  booktitle = "30th British Human Computer Interaction Conference (B-HCI)",
  publisher = "BCS",
  url = "http://ewic.bcs.org/content/ConWebDoc/56964",
}
@conference{2016-ares-wnc,
  title = "The perfect storm: The privacy paradox and the Internet-of-Things",
  author = "Meredydd Williams and Jason R.C. Nurse and Sadie Creese",
  year = "2016",
  booktitle = "International Workshop on Challenges in Information Security and Privacy Management (ISPM), associated with the 11th International Conference on Availability, Reliability and Security (ARES 2016)",
  publisher = "IEEE",
  url = "https://www.ares-conference.eu/conference/",
  doi = "10.1109/ARES.2016.25",
}
@conference{2016-rtsi-wanc,
  title = "Future scenarios and challenges for security and privacy",
  author = "Meredydd Williams and Louise Axon and Jason R. C. Nurse and Sadie Creese",
  year = "2016",
  booktitle = "2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016)",
  publisher = "IEEE",
  url = "http://apice.unibo.it/xwiki/bin/view/RTSI2016/WebHome",
  doi = "10.1109/RTSI.2016.7740625",
}
@conference{socinfo2016-gsanpw,
  title = "Determining the veracity of rumours on Twitter",
  author = "Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R.C. and Pilgrim, Alan and Willis, Chris",
  year = "2016",
  booktitle = "8th International Conference on Social Informatics (SocInfo 2016)",
  pages = "185--205",
  publisher = "Springer",
  doi = "10.1007/978-3-319-47880-7_12",
}
@conference{2016-securware-acgn,
  title = "Reflecting on the Use of Sonification for Network Monitoring",
  author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.",
  year = "2016",
  booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
  isbn = "978-1-61208-493-0",
  issn = "2162-2116",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring",
  pages = "254--261",
}
@conference{2016-securware-rng,
  title = "Attacker-Parametrised Attack Graphs",
  author = "Alastair Janse van Rensburg and Nurse, Jason R.C. and Goldsmith, Michael",
  year = "2016",
  booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
  isbn = "2162-2116",
  issn = "978-1-61208-493-0",
  keywords = "Attack graphs; attacker profiling; intrusion detection",
  pages = "316--319",
}
@inproceedings{10387,
  title = "Optional data disclosure and the online privacy paradox: A UK perspective",
  author = "Meredydd Williams and Jason R.C. Nurse",
  year = "2016",
  booktitle = "Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Springer",
  pages = "186-197",
  publisher = "Springer",
  doi = "10.1007/978-3-319-39381-0_17",
}
@conference{sac2016-everett-nurse,
  title = "The Anatomy of Online Deception: What Makes Automated Text Convincing?",
  author = "Richard Everett and Jason R.C. Nurse and Arnau Erola",
  year = "2016",
  booktitle = "31st ACM/SIGAPP Symposium on Applied Computing (SAC)",
  publisher = "ACM",
  doi = "10.1145/2851613.2851813",
}
@conference{icissp2016-happa-et-al,
  title = "A Pragmatic System-failure Assessment and Response Model",
  author = "Jassim Happa and Graham Fairclough and Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese",
  year = "2016",
  booktitle = "2nd International Conference on Information Systems Security and Privacy",
  doi = "10.5220/0005795105030508",
}
@conference{has2016_knp,
  title = "Attack Tree Analysis for Insider Threats on the IoT using Isabelle",
  author = "Kammüller, Florian and Nurse, Jason R.C. and Probst, Christian W.",
  year = "2016",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 18th International Conference on Human-Computer Interaction (HCI)",
  pages = "234-246",
  publisher = "Springer",
  doi = "10.1007/978-3-319-39381-0_21",
}
@inproceedings{has2016-naa,
  title = "Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home",
  author = "Nurse, Jason R.C. and Atamli, Ahmad and Martin, Andrew",
  year = "2016",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 18th International Conference on Human-Computer Interaction (HCI)",
  pages = "255-267",
  publisher = "Springer",
  doi = "10.1007/978-3-319-39381-0_23",
}
@conference{crisis2015_fn,
  title = "Exploring a Controls-Based Assessment of Infrastructure Vulnerability",
  author = "Oliver Farnan and Jason R. C. Nurse",
  year = "2016",
  booktitle = "Risks and Security of Internet and Systems",
  isbn = "978-3-319-31810-3",
  pages = "144-159",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  volume = "9572",
  doi = "10.1007/978-3-319-31811-0_9",
}
@article{cfs2015agrafiotisetal,
  title = "Identifying attack patterns for insider threat detection",
  author = "Ioannis Agrafiotis and Jason R. C. Nurse and Oliver Buckley and Phil Legg and Sadie Creese and Michael Goldsmith",
  year = "2015",
  issn = "1361-3723",
  journal = "Computer Fraud & Security",
  month = "July",
  number = "7",
  pages = "9--17",
  url = "http://www.journals.elsevier.com/computer-fraud-and-security",
  doi = "10.1016/S1361-3723(15)30066-X",
}
@article{wu_exploring_2015,
  title = "Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems",
  author = "Wu, Tina and Nurse, Jason R. C.",
  year = "2015",
  copyright = "Copyright (c) 2016 Journal of Digital Forensics, Security and Law",
  issn = "1558-7223",
  journal = "Journal of Digital Forensics, Security and Law",
  language = "en",
  month = "dec",
  number = "4",
  pages = "79--96",
  publisher = "Association of Digital Forensics, Security and Law",
  url = "http://ojs.jdfsl.org/index.php/jdfsl/article/view/347",
  volume = "10",
}
@article{jotm2015-nagcl,
  title = "Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen",
  year = "2015",
  journal = "Journal of Trust Management",
  month = "December",
  number = "2: 10",
  publisher = "Springer",
  url = "http://www.journaloftrustmanagement.com/content/2/1/10",
  doi = "10.1186/s40493-015-0021-5",
}
@conference{icdmisi2015_nouh_nurse,
  title = "Identifying Key-Players in Online Activist Groups on Facebook Social Network",
  author = "Nouh, Mariam and Nurse, Jason R.C.",
  year = "2015",
  booktitle = "IEEE 15th International Conference on Data Mining (ICDM) Workshop on Intelligence and Security Informatics",
  location = "Atlantic City",
  month = "November",
  pages = "969--978",
  publisher = "IEEE Computer Society",
  doi = "10.1109/ICDMW.2015.88",
}
@article{nurse2015exploring,
  title = "Exploring the risks to identity security and privacy in cyberspace",
  author = "Jason R.C. Nurse",
  year = "2015",
  issn = "1528-4972",
  journal = "XRDS: Crossroads, The ACM Magazine for Students",
  location = "New York, NY, USA",
  number = "3",
  pages = "42--47",
  publisher = "ACM",
  url = "http://doi.acm.org/10.1145/2730912",
  volume = "21",
  doi = "10.1145/2730912",
}
@article{negc2015email,
  title = "Investigating the leakage of sensitive personal and organisational information in email headers",
  author = "Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese",
  year = "2015",
  journal = "Journal of Internet Services and Information Security",
  number = "1",
  url = "http://isyou.info/jisis/vol5/no1/jisis-2015-vol5-no1-04.pdf",
  volume = "5",
}
@inproceedings{siot2015_naagc,
  title = "Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things",
  author = "Nurse, Jason R. C. and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie",
  year = "2015",
  booktitle = "International Workshop on Secure Internet of Things at European Symposium on Research in Computer Security (ESORICS 2015)",
  keywords = "Internet-of-things security; smart devices; wearables; insider threat; enterprise attack vectors; research agenda",
  pages = "5--14",
  publisher = "IEEE",
  doi = "10.1109/SIOT.2015.10",
}
@conference{cit2015_nurse_et_al,
  title = "Technology and information trust for supporting risky decisions based on social-media content",
  author = "Jason R.C. Nurse and Michael Goldsmith and Sadie Creese and Koen Lamberts",
  year = "2015",
  booktitle = "15th IEEE International Conference on Computer and Information Technology (CIT-2015)",
  pages = "461--468",
  doi = "10.1109/CIT/IUCC/DASC/PICOM.2015.66",
}
@conference{sotics2015_phillips_et_al,
  title = "Extracting Social Structure from DarkWeb Forums",
  author = "Elizabeth Phillips and Jason R.C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "5th International Conference on Social Media Technologies, Communication, and Informatics (SOTICS '15)",
}
@inproceedings{nurse2015,
  title = "Information trustworthiness as a solution to the misinformation problems in social media",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  issn = "2052-8604",
  pages = "28-35",
}
@conference{AlAhmadi2015wosis,
  title = "Using Internet Activity Profiling for Insider-Threat Detection",
  author = "Alahmadi, Bushra A. and Legg, Philip .A. and Nurse, Jason R. C.",
  year = "2015",
  booktitle = "17th International Conference on Enterprise Information Systems (ICEIS)",
  pages = "709--720",
  doi = "10.5220/0005480407090720",
}
@inproceedings{dnhgc2015predictinggps,
  title = "Predicting Graphical Passwords",
  author = "Matthieu Devlin and Jason R. C. Nurse and Duncan Hodges and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI)",
  editor = "Theo Tryfonas and Ioannis Askoxylakis",
  pages = "23--35",
  publisher = "Springer",
  series = "9190",
  doi = "10.1007/978-3-319-20376-8_3",
}
@inproceedings{mbada2015cyberawareness,
  title = "Cyber Security Awareness Campaigns: Why do they fail to change behaviour?",
  author = "Maria Bada and Angela Sasse and Jason R. C. Nurse",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  pages = "118--131",
}
@inproceedings{ephillips2015snasecurity,
  title = "Applying Social Network Analysis to Security",
  author = "Elizabeth Phillips and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  pages = "11--27",
}
@conference{rcarvalho2015ontology,
  title = "Online banking malware ontology",
  author = "Rodrigo Carvalho and Michael Goldsmith and Jason R. C. Nurse",
  year = "2015",
  booktitle = "International Crime and Intelligence Analysis Conference (ICIA)",
}
@article{nagcl14,
  title = "Two sides of the coin: measuring and communicating the trustworthiness of online information",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen",
  year = "2014",
  journal = "Journal of Trust Management",
  keywords = "Information trustworthiness; Information quality; Trust metrics; Trust visuals; Decision-making; Social-media content; Risk communication",
  number = "5",
  publisher = "Springer Open",
  url = "http://www.journaloftrustmanagement.com/content/1/1/5",
  volume = "1",
  doi = "10.1186/2196-064X-1-5",
}
@inproceedings{bnlgs2014,
  title = "Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat",
  author = "Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2014.10",
}
@inproceedings{npggc14,
  title = "Inferring Social Relationships from Technology-Level Device Connections",
  author = "Jason R. C. Nurse and Jess Pumphrey and Thomas Gibson-Robinson and Michael Goldsmith and Sadie Creese",
  year = "2014",
  booktitle = "12th International Conference on Privacy, Security and Trust (PST)",
  pages = "40 - 47",
  publisher = "IEEE",
  doi = "10.1109/PST.2014.6890922",
}
@conference{nagclpj2014,
  title = "Managing the influence of social media using information trust",
  author = "Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese and Koen Lamberts and Darren Price and Glyn Jones",
  year = "2014",
  booktitle = "Social Influence in the Information Age Conference",
}
@inproceedings{nblgcww2014,
  title = "Understanding Insider Threat: A Framework for Characterising Attacks",
  author = "Jason R.C. Nurse and Oliver Buckley and Philip A. Legg and Michael Goldsmith and Sadie Creese and Gordon R.T. Wright and Monica Whitty",
  year = "2014",
  booktitle = "Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society  Security and Privacy Workshops (SPW14), in conjunction with the IEEE Symposium on Security and Privacy (SP).",
  publisher = "IEEE",
  url = "http://www.sei.cmu.edu/community/writ2014/",
  doi = "10.1109/SPW.2014.38",
}
@inproceedings{nlbawwugc14,
  title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches",
  author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)",
  publisher = "Springer",
  doi = "10.1007/978-3-319-07620-1_24",
}
@article{legg2013mist,
  title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection",
  author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese",
  year = "2013",
  issn = "2093-5382",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
  number = "4",
  pages = "20-37",
  url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf",
  volume = "4",
}
@inproceedings{Creese:2013fkHST,
  title = "Tools for Understanding Identity",
  author = "Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean",
  year = "2013",
  booktitle = "IEEE Conference on Technologies for Homeland Security (HST '13)",
  doi = "10.1109/THS.2013.6699064",
}
@conference{7145,
  title = "At the Crossroads: Cybersecurity and Psychology",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael",
  year = "2013",
  booktitle = "The 1st Annual Cyberpsychology Conference",
  url = "http://www.dmu.ac.uk/cyberpsychology",
}
@inproceedings{7027,
  title = "Communicating Trustworthiness using Radar Graphs: A Detailed Look",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 11th International Conference on Privacy, Security and Trust (PST)",
  keywords = "Trustworthiness factors; trustworthiness visualisation; risk communication; communicating trustworthiness and quality; user studies",
  publisher = "IEEE",
  doi = "10.1109/PST.2013.6596085",
}
@inproceedings{7026,
  title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)",
  keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2013.6",
}
@inproceedings{nursespi2013,
  title = "Effective Communication of Cyber Security Risks",
  author = "Nurse, Jason R.C.",
  year = "2013",
  booktitle = "7th International Scientific Conference on Security and Protection of Information (SPI 2013)",
  url = "http://spi.unob.cz/indexen.html",
}
@inproceedings{ncgrhas2013,
  title = "Supporting Human Decision-Making Online using Information Trustworthiness Metrics",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Rahman, Syed S.",
  year = "2013",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 15th International Conference on Human-Computer Interaction (HCII)",
  keywords = "information trustworthiness; information quality; metrics; human decision-making; open-source content; social-media; online risks",
  publisher = "Springer",
  doi = "10.1007/978-3-642-39345-7_33",
}
@inproceedings{hngc2012,
  title = "Identity attribution across CyberSpace and the Natural Space",
  author = "Hodges, D. and Nurse, J.R.C. and Goldsmith, M. and Creese, S.",
  year = "2012",
  booktitle = "The International Crime and Intelligence Analysis Conference",
  url = "http://www.ucl.ac.uk/jdi/events/int-CIA-conf",
}
@inproceedings{cgnptrustcom2012,
  title = "A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks",
  author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C. and Phillips, Elizabeth",
  year = "2012",
  booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)",
  pages = "1124-1131",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2012.22",
}
@inproceedings{ncglstast2012,
  title = "Using Information Trustworthiness Advice in Decision-Making",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2012",
  booktitle = "The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2012.10",
}
@inproceedings{nsstast2012,
  title = "Towards A Model to Support the Reconciliation of Security Actions across Enterprises",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2012",
  booktitle = "The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2012.11",
}
@inproceedings{ncglcjiscram2012,
  title = "An Initial Usability Evaluation of the Secure Situation Awareness System",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn",
  year = "2012",
  booktitle = "The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012)",
  publisher = "IAS of ISCRAM",
  url = "http://www.iscramlive.org/ISCRAM2012/proceedings/240.pdf",
}
@inbook{5493,
  title = "A Case Study Analysis of an E-Business Security Negotiations Support Tool",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2011",
  booktitle = "Electrical Engineering and Applied Computing",
  isbn = "9789400711921",
  publisher = "Springer",
  series = "Lecture Notes in Electrical Engineering",
  volume = "90",
  doi = "10.1007/978-94-007-1192-1_18",
}
@inproceedings{5497,
  title = "Experiences on Sharing E-Learning Resources using Service Technologies",
  author = "Yang, Shanshan and Joy, Mike S. and Nurse, Jason R.C.",
  year = "2011",
  booktitle = "14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011)",
  publisher = "ACTA Press",
  doi = "10.2316/P.2011.734-060",
}
@inproceedings{ncglstast2011,
  title = "Trustworthy and Effective Communication of Cybersecurity Risks: A Review",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2011.6059257",
}
@inproceedings{5465,
  title = "Guidelines for Usable Cybersecurity: Past and Present",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/CSS.2011.6058566",
}
@inproceedings{5464,
  title = "Information Quality and Trustworthiness: A Topical State-of-the-Art Review",
  author = "Nurse, Jason R.C. and Rahman, Syed Sadiqur and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The International Conference on Computer Applications and Network Security (ICCANS) 2011",
  publisher = "IEEE",
  url = "http://www.tease-project.info/publications/iccans2011_nrcgl_authors_final",
}
@article{5496,
  title = "A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2010",
  journal = "International Journal of Computer Science",
  number = "4",
  url = "http://eprints.dcs.warwick.ac.uk/378/1/IJCS_37_4_07.pdf",
  volume = "37",
}
@article{5495,
  title = "An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2010",
  journal = "International Journal On Advances in Security",
  number = "3&4",
  url = "http://eprints.dcs.warwick.ac.uk/632/1/security2010_nurse_sinclair.pdf",
  volume = "3",
}
@inproceedings{5491,
  title = "Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2010",
  booktitle = "International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010)",
  publisher = "IEEE",
  url = "http://eprints.dcs.warwick.ac.uk/357/1/wce2010_nurse_sinclair.pdf",
}
@inproceedings{5490,
  title = "A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2010",
  booktitle = "5th International Conference on Internet and Web Applications and Services (ICIW 2010)",
  publisher = "IEEE",
  doi = "10.1109/ICIW.2010.10",
}
@inbook{5492,
  title = "Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2009",
  booktitle = "Business Information Systems",
  isbn = "9783642011894",
  publisher = "Springer-Verlag",
  series = "Lecture Notes in Business Information Processing",
  volume = "21",
  doi = "10.1007/978-3-642-01190-0_6",
}
@article{5494,
  title = "Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2009",
  journal = "International Journal on Advances in Internet Technology",
  number = "4",
  url = "http://eprints.dcs.warwick.ac.uk/360/1/inttech2009_nurse_sinclair.pdf",
  volume = "2",
}
@inproceedings{5489,
  title = "BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business",
  author = "Nurse, Jason R.C. and Sinclair, Jane E.",
  year = "2009",
  booktitle = "4th International Conference on Internet and Web Applications and Services (ICIW 2009)",
  publisher = "IEEE",
  doi = "10.1109/ICIW.2009.48",
}