Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks During the Pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... Computers & Security, 2021 | 740 | 2021 |
Cyber Security Awareness Campaigns: Why do they fail to change behaviour? M Bada, AM Sasse, JRC Nurse International Conference on Cyber Security for Sustainable Society, 118-131, 2015 | 616* | 2015 |
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate I Agrafiotis, JRC Nurse, M Goldsmith, S Creese, D Upton Journal of Cybersecurity, 2018 | 338 | 2018 |
Understanding Insider Threat: A Framework for Characterising Attacks JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ... Workshop on Research for Insider Threat (WRIT) held as part of the IEEE …, 2014 | 285 | 2014 |
Security risk assessment in Internet of Things systems JRC Nurse, S Creese, D De Roure IEEE IT Professional (IT Pro), 2017 | 234 | 2017 |
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models T Rashid, I Agrafiotis, JRC Nurse 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016 | 184 | 2016 |
Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) M Bada, JRC Nurse Information and Computer Security, 2019 | 163 | 2019 |
Baiting the hook: factors impacting susceptibility to phishing attacks C Iuga, JRC Nurse, A Erola Human-centric Computing and Information Sciences 6, 1-20, 2016 | 139 | 2016 |
Cyber stalking, cyber harassment, and adult mental health: A systematic review F Stevens, JRC Nurse, B Arief Cyberpsychology, Behavior, and Social Networking 24 (6), 367-376, 2021 | 134 | 2021 |
Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) S Sirur, JRC Nurse, H Webb Workshop on Multimedia Privacy and Security (MPS), at the 25th ACM …, 2018 | 132 | 2018 |
Developing a Cyber Security Culture: Current Practices and Future Needs B Uchendu, JRC Nurse, M Bada, S Furnell Computers & Security, 2021 | 131 | 2021 |
The Social and Psychological Impact of Cyberattacks M Bada, JRC Nurse Emerging Cyber Threats and Cognitive Vulnerabilities, 73-92, 2019 | 128 | 2019 |
Guidelines for usable cybersecurity: Past and present JRC Nurse, S Creese, M Goldsmith, K Lamberts 3rd International Symposium on Cyberspace Safety and Security (CSS), 21-26, 2011 | 121 | 2011 |
Cyber Risk at the Edge: Current and future trends on Cyber Risk Analytics and Artificial Intelligence in the Industrial Internet of Things and Industry 4.0 Supply Chains P Radanliev, D De Roure, K Page, JRC Nurse, R Matilla Montalvo, ... Cybersecurity 3 (1), 1-21, 2020 | 117 | 2020 |
Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit JRC Nurse The Oxford Handbook of Cyberpsychology, 2018 | 117 | 2018 |
Towards a conceptual model and reasoning structure for insider threat detection PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 114 | 2013 |
Trustworthy and effective communication of cybersecurity risks: A review JRC Nurse, S Creese, M Goldsmith, K Lamberts Workshop on Socio-Technical Aspects in Security and Trust (STAST), 60-68, 2011 | 95 | 2011 |
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms D Woods, I Agrafiotis, JRC Nurse, S Creese Journal of Internet Services and Applications, 2017 | 87 | 2017 |
The Perfect Storm: The Privacy Paradox and the Internet-of-Things M Williams, JRC Nurse, S Creese Proceedings of the 11th International Conference on Availability …, 2016 | 85 | 2016 |
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter M Nouh, JRC Nurse, M Goldsmith 17th IEEE International Conference on Intelligence and Security Informatics …, 2019 | 83 | 2019 |