Остановите войну!
for scientists:
default search action
Sadie Creese
- > Home > Persons > Sadie Creese
Publications
- 2022
- [j32]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - 2021
- [c64]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - 2020
- [j24]Louise Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. J. Cybersecur. 6(1): tyaa004 (2020) - [c63]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i10]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020) - 2019
- [j22]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Comput. Hum. Behav. 99: 38-54 (2019) - [j19]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
(Smart)Watch Out! encouraging privacy-protective behavior through interactive games. Int. J. Hum. Comput. Stud. 132: 121-137 (2019) - [i9]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. CoRR abs/1905.05222 (2019) - 2018
- [j17]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [i8]Jason R. C. Nurse, Petar Radanliev, Sadie Creese, David De Roure:
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. CoRR abs/1806.10906 (2018) - [i7]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future Scenarios and Challenges for Security and Privacy. CoRR abs/1807.05746 (2018) - [i6]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. CoRR abs/1807.05754 (2018) - [i5]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. CoRR abs/1807.05756 (2018) - [i4]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things. CoRR abs/1807.05761 (2018) - [i3]Louise M. Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Sonification in security operations centres: what do security practitioners think? CoRR abs/1807.06706 (2018) - [i2]Aastha Madaan, Jason R. C. Nurse, David De Roure, Kieron O'Hara, Wendy Hall, Sadie Creese:
A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines. CoRR abs/1809.05904 (2018) - [i1]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. CoRR abs/1811.03290 (2018) - 2017
- [j15]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. IT Prof. 19(5): 20-26 (2017) - [j14]Daniel W. Woods, Ioannis Agrafiotis, Jason R. C. Nurse, Sadie Creese:
Mapping the coverage of security controls in cyber insurance proposal forms. J. Internet Serv. Appl. 8(1): 8:1-8:13 (2017) - [c56]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - [c55]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. PST 2017: 181-190 - 2016
- [j11]Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Analytics for characterising and measuring the naturalness of online personae. Secur. Informatics 5(1): 3 (2016) - [c54]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. ARES 2016: 644-652 - [c52]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c51]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. Privacy and Identity Management 2016: 263-278 - [c50]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future scenarios and challenges for security and privacy. RTSI 2016: 1-6 - 2015
- [j8]Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. J. Internet Serv. Inf. Secur. 5(1): 70-84 (2015) - [c48]Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts:
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content. CIT/IUCC/DASC/PICom 2015: 461-468 - [c46]Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. HCI (22) 2015: 23-35 - [c45]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [c44]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c42]Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Inferring social relationships from technology-level device connections. PST 2014: 40-47 - [c41]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - [c40]Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. STAST 2014: 8-15 - 2013
- [j4]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c37]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. HCI (27) 2013: 316-325 - [c35]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c32]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - 2012
- [c29]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Rachel Craddock, Glyn Jones:
An initial usability evaluation of the secure situation awareness system. ISCRAM 2012 - [c28]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Using Information Trustworthiness Advice in Decision Making. STAST 2012: 35-42 - [c26]Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. TrustCom 2012: 1124-1131 - 2011
- [c22]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Guidelines for usable cybersecurity: Past and present. CSS 2011: 21-26 - [c19]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Trustworthy and effective communication of cybersecurity risks: A review. STAST 2011: 60-68
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-01 22:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint