Folgen
Jason R.C. Nurse
Jason R.C. Nurse
Sonstige NamenJason Nurse
Reader in Cyber Security, University of Kent
Bestätigte E-Mail-Adresse bei kent.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks During the Pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & Security, 2021
7092021
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?
M Bada, AM Sasse, JRC Nurse
International Conference on Cyber Security for Sustainable Society, 118-131, 2015
590*2015
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
I Agrafiotis, JRC Nurse, M Goldsmith, S  Creese, D  Upton
Journal of Cybersecurity, 2018
3132018
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
Workshop on Research for Insider Threat (WRIT) held as part of the IEEE …, 2014
2822014
Security risk assessment in Internet of Things systems
JRC Nurse, S Creese, D De Roure
IEEE IT Professional (IT Pro), 2017
2272017
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
T Rashid, I Agrafiotis, JRC Nurse
8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016
1792016
Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs)
M Bada, JRC Nurse
Information and Computer Security, 2019
1582019
Baiting the hook: factors impacting susceptibility to phishing attacks
C Iuga, JRC Nurse, A Erola
Human-centric Computing and Information Sciences 6, 1-20, 2016
1342016
Cyber stalking, cyber harassment, and adult mental health: A systematic review
F Stevens, JRC Nurse, B Arief
Cyberpsychology, Behavior, and Social Networking 24 (6), 367-376, 2021
1242021
Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)
S Sirur, JRC Nurse, H Webb
Workshop on Multimedia Privacy and Security (MPS), at the 25th ACM …, 2018
1192018
Guidelines for usable cybersecurity: Past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
3rd International Symposium on Cyberspace Safety and Security (CSS), 21-26, 2011
1192011
Developing a Cyber Security Culture: Current Practices and Future Needs
B Uchendu, JRC Nurse, M Bada, S Furnell
Computers & Security, 2021
1162021
The Social and Psychological Impact of Cyberattacks
M Bada, JRC Nurse
Emerging Cyber Threats and Cognitive Vulnerabilities, 73-92, 2019
1142019
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1142013
Cyber Risk at the Edge: Current and future trends on Cyber Risk Analytics and Artificial Intelligence in the Industrial Internet of Things and Industry 4.0 Supply Chains
P Radanliev, D De Roure, K Page, JRC Nurse, R Matilla Montalvo, ...
Cybersecurity 3 (1), 1-21, 2020
1092020
Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit
JRC Nurse
The Oxford Handbook of Cyberpsychology, 2018
1092018
Trustworthy and effective communication of cybersecurity risks: A review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 60-68, 2011
922011
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
D Woods, I Agrafiotis, JRC Nurse, S Creese
Journal of Internet Services and Applications, 2017
872017
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
M Williams, JRC Nurse, S Creese
Proceedings of the 11th International Conference on Availability …, 2016
832016
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter
M Nouh, JRC Nurse, M Goldsmith
17th IEEE International Conference on Intelligence and Security Informatics …, 2019
752019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20