Papers from Members, Experts, and Project Partners

Every month we ask our network for the papers they have recently published, and compliment that by recent publications from leading journals in digital trust, identity, privacy, and security. You can check our top list of journals and conferences here, and the list of papers below.

Paper/Issue/ReportAuthorsPublished In/By
CybSafe Research Library
Globally accessible archive of research into the human aspect of cyber security
A framework for effective corporate communication after cyber security incidentsRichard Knight, Jason R.C.NurseComputers & Security, Volume 99
Emotional AI and Children: Ethics, Parents. Governance
Andrew McStay, Gilad RosnerN/A
A framework to assess evidence quality in cyber security policy making
Policy briefing
Madeline Carr, Siraj ShaikhRISCS
Is your chatbot GDPR compliant?: Open issues in agent designRahime Belen Sağlam, Jason R. C. NurseCUI '20: Proceedings of the 2nd Conference on Conversational User Interfaces
Cyber Diplomacy: A Systematic Literature ReviewAmel Attatfa, Karen Renaud, Stefano DePaoliProcedia Computer Science Volume 176
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims ProcessesJason R.C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chainsPetar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox, Pete BurnapCybersecurity volume 3
No two gangs are alike: The digital divide in street gangs’ differential adaptations to social mediaAndrew Whittaker, James Densley, Karin S.MoserComputers in Human Behavior Volume 110
The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research DirectionsChristina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, Florian AltCHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network SystemsXiong Li, Jieyao Peng, Mohammad S. Obaidat, Fan Wu, Muhammad Khurram Khan, Chaoyang ChenIEEE Systems Journal Volume 14, Issue 1
A New Detection and Prevention System for ARP Attacks Using Static EntrySherin Hijazi, Mohammad S. ObaidatIEEE Systems Journal Volume 13, Issue 3
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate PredictionsMuhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, Aziz MohaisenIEEE Systems Journal Volume 14, Issue 1
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic ReviewFrancesca Stevens, Jason R.C. Nurse, Budi AriefCyberpsychology, Behavior, and Social Networking
Cybersecurity for Smart Farming: Socio-Cultural Context MattersDirk van der Linden, Ola Aleksandra Michalec, Anna ZamanskyIEEE Technology and Society Magazine Volume: 39, Issue: 4
An Investigation of Self-Control and Self-Regulation as Mechanisms Linking Remote Communication to Employee Well-Being during the Covid-19 PandemicMoser, K., Rivkin, W., Diestel, S. and Alshaik, I.Academy of Management (AoM) Annual Meeting 2020. Vancouver, CA (Virtual Meeting) 07-11 Aug 2020
The COVID-19 Contact Tracing App In England and ‘Experimental Proportionality’Marion Oswald, Jamie GraceForthcoming, Public Law
Not ‘Very English’ - on the Use of the Polygraph by the Penal System in England and WalesKyriakos N Kotsoglou, Marion OswaldThe Journal of Criminal Law. December 2020
A Fuzzy Adaptive Dynamic NSGA-II With Fuzzy-Based Borda Ranking Method and its Application to Multimedia Data AnalysisMaysam Orouskhani, Daming Shi, Xiaochun ChengIEEE Transactions on Fuzzy Systems Volume 29, Issue 1
Design Thinking for Cyber DeceptionDebi Ashenden, Rob Black, Iain Reid, Simon HendersonHawaii International Conference on System Sciences 2021
Interdisciplinary Lessons Learned While Researching Fake NewsChar Sample, Michael J. Jensen, Keith Scott, John McAlaney, Steve Fitchpatrick, Amanda Brockinton, David Ormrod, Amy OrmrodFrontiers in Psychology,
Research Topic on Cognition, Behavior and Cybersecurity
Privacy in Transport? Exploring Perceptions of Location Privacy Through User SegmentationIngolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael Mcguire, Shujun LiHawaii International Conference on System Sciences 2021
Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing Shane Horgan, Ben Collier, Richard Jones, Lynsay ShepherdEmerald Insights
Using Public Priorities To Disentangle the Dimensions of Procedural Justice and Trustworthiness In Police–Citizen InteractionsJoseph A. Hamm, Scott E. WolfeThe British Journal of Criminology: An International Review of Crime and Society
A novel Intrusion Detection System against spoofing attacks in connected Electric VehiclesDimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge JanickeArray, Volume 5
Reflections on Digital SovereigntyLokke Moerel, Paul TimmersEU Cyber Direct
China-Linked Influence Operation on Twitter Detected Engaging with the US Presidential Election

Part 1: Detection Report
Part 2: Development Report
Cardiff University Crime and Security Research InstituteCardiff University’s OSCAR (Open Source Communications Analytics Research)
Nexus or Not? The relationship between terrorism and organised crimeMartin Joseph GallagherPolicing Insight
Benefits of implementation of mobile devices with frontline officers in Police Scotland 2019-2020William Graham, and Lesley Diack, Martin Joseph GallagherScottish Institute for Policing Research - Breifing Series Issue 13
A framework for effective corporate communication after cyber security incidentsRichard Knight, Jason R. C. NurseComputers & Security, Volume 99, December 2020
Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concernsJoseph Da SilvaMethodological Innovations, Volume 14 Issue 1, January-April 2021
Efficient and Fine-grained Signature for IIoT with Resistance to Key ExposureYangyang Bao, Weidong Qiu, Xiaochun ChengIEEE Internet of Things Journal
An efficient identity-based proxy signcryption using latticeHongfei Zhu, Ye Wang, Chonghua Wang, Xiaochun ChengFuture Generation Computer Systems, Volume 117
Mechanisms of power inscription into IT governance: Lessons from two national digital identity systemsRony Medaglia, Ben Eaton, Jonas Hedman, Edgar A. WhitleyInformation Systems Journal (ISJ)
Artificial Intelligence for a Better FutureBernd Carsten StahlSpringerBriefs in Research and Innovation Governance
Industrial espionage – A systematic literature review (SLR)Tie Hou, Victoria WangComputers & Security, Volume 98, November 2020
Blockchain Technology in Current Agricultural Systems: From Techniques to ApplicationsWeijun Lin, Xinghong Huang, Hui Fang, Victoria Wang, Yining Hua, Jingjie Wang, Haining Yin, Dewei Yi, Laihung YauIEEE Access
Exploring the extent of openness of open government data – A critique of open government datasets in the UKVictoria Wang, David ShepherdGovernment Information Quarterly, Volume 37, Issue 1, January 2020
Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare SystemYangyang Bao, Weidong Qiu, Xiaochun ChengIEEE Internet of Things Journal
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchainShuhui Fan, Shaojing Fu, Haoran Xu, Xiaochun ChengInformation Processing & Management, Volume 58, Issue 4
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemicHarjinder Singh Lallie, Lynsay A. Shepherd, Jason R.C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier BellekensComputers & Security, Volume 105, June 2021
Formal Modelling and Security Analysisof Bitcoin’s Payment ProtocolPaolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng HaoComputers & Security, Elsevier, 2021
Autonomy and visibility: The rewards of mobile workingMartin Joseph Gallagher, Lesley Diack, William GrahamPolicing Insight
The Influence of Traits Associated with Autism Spectrum Disorder (ASD) on the Detection of Fake NewsJacqui Taylor-Jackson, Sophie MatthewsHCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media
Regulating Online Behavioural Advertising Through Data Protection LawJiahong ChenEdward Elgar Publishing
PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigationsKaren Renaud, Ivano Bongiovanni, Sara Wilford, Alastair IronsScience & Justice, Volume 61, Issue 5
he “three M’s” counter-measures to children’s risky online behaviors: mentor, mitigate and monitorKaren Renaud, Suzanne PriorInformation and Computer Security
Accessible authentication: dyslexia and password strategiesKaren Renaud, Graham Johnson, Jacques OphoffInformation and Computer Security
Ethical funding for trustworthy AI: proposals to address the responsibilities of funders to ensure that projects adhere to trustworthy AI practiceAllison Gardner, Adam Leon Smith, Adam Steventon, Ellen Coughlan, Marie OldfieldAI Ethics (2021)
Ethical Funding for Trustworthy AI: initial workshop outcomesA. Gardner, A. Leon Smith, M. A. Oldfield, A. Steventon, E. CoughlanThe Society for the Study of Artificial Intelligence and Simulation of Behaviour
Scanning the Cycle: Timing-based Authentication on PLCsChuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya MathurASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
Surveillance, trust, and policing at music festivalsKara C. Hoover, Jeremy W. Crampton, Harrison Smith, J. Colette BerbesqueThe Canadian Geographer / Le Géographe canadien
Observing Data-Driven Approaches to Covid-19: Reflections from a Distributed, Remote, Interdisciplinary Research ProjectRachel Allsopp, Claire Bessant, Keith Ditcham, Ardi Janjeva, Guangquan Li, Marion Oswald, Mark Warner Journal of Legal Research Methodology
Analytical modelling and UK Government policyMarie Oldfield, Ella HaigAI and Ethics
Creative Malfunction: Finding fault with RowhammerMatt SpencerComputational Culture: a journal of software studies
A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEsKaren Renaud, Jacques OphoffOrganizational Cybersecurity Journal: Practice, Process and People
Developing a cyber security culture: Current practices and future needsBetsy Uchendu, Jason R.C. Nurse, Maria Bada, Steven FurnellComputers & Security
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home DevicesSarah Turner, Jason Nurse, Shujun LiHuman Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings
SherLOCKED: A Detective-Themed Serious Game for Cyber Security EducationAlice Jaffray, Conor Finn, Jason R. C. NurseHuman Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and PrivacyJason R. C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John Blythe, Ben KoppelmanHCI International 2021 - Posters: 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part III
The Case for Adaptive Security InterventionsIrum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk Van der Linden, John Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar NuseibehACM Transactions on Software Engineering and Methodology
The Interplay between Personal Relationships & Shoulder Surfing MitigationHabiba Farzand, Kinshuk Bhardwaj, Karola Marky, Mohamed KhamisMensch und Computer 2021 (MuC ’21), September 5–8, 2021, Ingolstadt, Germany. ACM
Reconfiguring governance: How cyber security regulations are reconfiguring water governanceOla Michalec, Sveta Milyaeva, Awais RashidRegulation & Governance
A Quantum Leap for Financial ServicesPavle Avramovic, Sam Qayyum, Dr Rupesh Srivastava, Evert GeurtsenInsight: Opinion and Analysis Hosted by the FCA
A Communication Toolkit to Build Trust: Lessons from Northern Ireland’s Civil Society PeacebuildersCharis Rice, Emily Stanton, Maureen Taylor VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations
MailTrout: a machine learning browser extension for detecting phishing emailsPaul Boyle, Lynsay A. Shepherd33rd British Human Computer Interaction Conference: Post-Pandemic HCI – Living digitally
Infiltrating security into development: exploring the world’s largest software security studyCharles Weir, Sammy Migues, Mike Ware, Laurie WilliamsESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19Steven Kemp, David Buil-Gil, Asier Moneva, Fernando Miró-Llinares, Nacho Díaz-CastañoJournal of Contemporary Criminal Justice
TEL: Low-Latency Failover Traffic Engineering in Data PlaneHabib Mostafaei, Mohammad Shojafar, Mauro ContiIEEE Transactions on Network and Service Management
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing SystemFarooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim TafazolliACM Transactions on Internet Technology
Link Latency Attack in Software-Defined NetworksSanaz Soltani, Mohammad Shojafar, Habib Mostafaei, Zahra Pooranian, Rahim Tafazolli17th IEEE International Conference on Network and Service Management (IEEE CNSM 2021)
A Two-layer Collaborative Vehicle-Edge Intrusion Detection System for Vehicular CommunicationsParya Haji Mirzaee, Mohammad Shojafar, Hamidreza Bagher, Tsz Hin Chan, Haitham Cruickshank, Rahim TafazolliIEEE 94th Vehicular Technology Conference: VTC2021-Fall
Pragmatic Online Privacy: the SftE ApproachVitor Jesus~ COnSeNT 2021 ~ 1st International Workshop on Consent Management in Online Services, Networks and Things
IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G NetworkZhou Zhou, Mohammad Shojafar, Jemal Abawajy, Ali Kashif BashirIEEE Transactions on Green Communications and Networking
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data CenterZhou Zhou, Mohammad Shojafar, Mamoun Alazab, Jemal Abawajy, Fangmin LiIEEE Transactions on Green Communications and Networking
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETsPeng Wang, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, Rahim Tafazolli, Yi-Ning LiuIEEE Transactions on Intelligent Transportation Systems
FIDS: A Federated Intrusion Detection System for 5G Smart Metering NetworkParya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian,
Pedram Asef, Haitham Cruickshank, Rahim Tafazolli
The 17th International Conference on Mobility, Sensing and Networking (MSN 2021)
When Is Software a Medical Device? Understanding and Determining the “Intention” and Requirements for Software as a Medical Device in European Union LawKaspar LUDVIGSEN, Shishir NAGARAJA, Angela DALYEuropean Journal of Risk Regulation
Making assembly line in supply chain robust and secure using UHF RFIDAbubakar Sharif, Rajesh Kumar, Jun Ouyang, Hasan T. Abbas, Akram Alomainy, Kamran Arshad, Khaled Assaleh, Ayman Althuwayb, Muhammad Ali Imran, Qammer H. AbbasiScientific Reports
Always on, anytime, anywhere: The impact of the ‘new norm’ and digital training revolution on employeesNadine MichaelidesBPS Cyberpsychology Section
The fight against disinformation and the right to freedom of expressionDr. Judit BAYER, Dr. Irini KATSIREA, Dr. Olga BATURA, Prof. Dr. Bernd HOLZNAGEL, Dr. Sarah HARTMANN, Katarzyna LUBIANIECEuropean Parliament Think Tank
Adaptive Voronoi Masking: A Method to Protect Confidential Discrete Spatial DataFiona Polzin, Ourania Kounadi11th International Conference on Geographic Information Science (GIScience 2021) - Part II
Shadow Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D SensingZhongyuan Hau, Soteris DemetriouLuis, Muñoz-González, Emil C. LupuESORICS 2021: Computer Security – ESORICS 2021
Oh, behave! The Annual Cybersecurity Atittudes and Behaviours Report 2021Dr. Inka Karppinen, Ruya InceCybSafe
Democracy@Risk 2021ARIADNA TSENINA, RACHEL GIBSON, EMMA BARRETTDigital Futures Manchester
Editorial: Security of cloud service for the manufacturing industryXiaochun Cheng, Zheli Liu, Yongsheng NingTransactions on Emerging Telecommunication Technologies
Efficient, Revocable and Privacy-preserving Fine-grained Data Sharing with Keyword Search for the Cloud-assisted Medical IoT SystemYangyang Bao, Weidong Qiu, Peng Tang, Xiaochun ChengIEEE Journal of Biomedical and Health Informatics
PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANETHongyuan Cheng, Mohammad Shojafar, Mamoun Alazab, Rahim Tafazolli, Yining LiuIEEE Transactions on Intelligent Transportation Systems
Final Report | Data-Driven Responses to COVID-19: Lessons LearnedHugh Oberlander, Luke Chambers The Observatory for Monitoring Data-Driven Approaches to COVID-19 (OMDDAC)
'Balancing Cybersecurity And Privacy In The Remote Workforce'.Jason R.C NurseCREST Research.
'Can lessons be learnt from the governance of the coronavirus pandemic to help preparations for future cyber crises?'.Jason R.C Nurse, Gareth MottThe Hague Program on International Cyber Security.
'De-platforming disinformation: conspiracy theories and their control'.Helen Innes, Martin InnesTaylor & Francis Online.
'Shame in Cyber Security: Efective Behavior Modification Tool
or Counterproductive Foil?'
Karen Renaud, Rosalind Searle, Marc DupuisN/A
'Fingerprint Technology in the Age of COVID'.Alan HodgsonID and Secure Document News.
'Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing'.Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun AlazabACM Transactions on Internet Technology, Volume 22, Issue 2.
'An unstable environment
The economic case for getting asylum decisions right
the first time
Marie Oldfield, Jade Siu, Sadia SheikhPro Bono Economics.
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country.Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini.USENIX.
'Usage Patterns of Privacy-Enhancing Technologies'.Kovila P.L CoopamootooCCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.
'How Can and Would People Protect From
Online Tracking?
Maryam Mehrnezhad, Kovila Coopamootoo, Ehsan Toreini
Sciendo: Proceedings on Privacy Enhancing Technologies.
'What we do with data: a performative critique of data "collection"'.Garfield BenjaminInternet Policy Review.
'Shame in Cyber Security: Efective Behavior Modification Tool
or Counterproductive Foil?'
Karen Renaud, Rosaline Searle, Marc DupuisNSPW.
'Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks'.Neeshe Khan, Robert J. Houghton, Sarah Sharples Cognition, Technology & Work.
'Editorial: Security of cloud service for the manufacturing industry'.Xiaochun Cheng, Zheli Liu, Yongsheng NingTransactions on Emerging Telecommunications Technologies.
'‘I am not a number’: Conceptualising identity in digital surveillance'.Victoria Wang, John V.TuckerTechnology in Society.
'Higher Education in Europe: Understanding the Cybersecurity Skills Gap in the EU'.Jason NurseEnisa.
'What’s Next for Cyber Insurance?'.Jason NurseN/A
'Recruiting Participants With Programming Skills: A Comparison
of Four Crowdsourcing Platforms and a CS Student Mailing List'
Mohammad Tahaei, Kami VanieaCHI.
'Understanding Privacy-Related Advice on Stack Overflow'.Mohammad Tahaei, Tianshi Li, Kami VanieaPrivacy Enhancing Technologies Symposium.
'Forward Privacy Preservation in IoT-Enabled Healthcare Systems'.Ke Wang, Chien-Ming Chen, Zhuoyu Tie, Mohammad Shojafar, Sachin KumarIEEE Transactions on Industrial Informatics.
'Fear might motivate secure password choices in the short term, but at what cost?'.Marc Dupuis, Karen Renaud, Anna JenningsHICSS.
‘The Enabling Role of Internal Organizational Communication in Insider Threat Activity – Evidence From a High Security Organization’.Charis Rice, Rosalind SearleManagement Communication Quarterly.
'Adoption and continued use of mobile contact tracing technology: multilevel explanations from a three-wave panel survey and linked data '.Laszlo Horvath, Susan Banducci, Joshua Blamire, Cathrine Degnen, Oliver James, Andrew Jones, Daniel Stevens, Katharine TylerBMJ Open .
'Versioning biological cells for trustworthy cell engineering'.Jonathan Tellechea-Luzardo, Leanne Hobbs, Elena Velázquez, Lenka Pelechova, Simon Woods, Víctor de Lorenzo, Natalio Krasnogor Nature Communications.
'Using Machine Learning Methods to Study Technology-Facilitated Abuse: Evidence from the Analysis of UK Crimestoppers’ Text Data'.elix Soldner, Leonie Maria Tanczer, Daniel Hammocks, Isabel Lopez-Neira, Shane D. Johnson The Palgrave Handbook of Gendered Violence and Technology.
'Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach'.Sadoon Azizi, Mohammad Shojafar, Jemal Abawajy, Rajkumar BuyyaThe Journal of Network and Computer Applications.
'Intelligent-Reflecting-Surface-Empowered Wireless-Powered Caching Networks'.Zheng Chu, Pei Xiao, Mohammad Shojafar, De Mi, Wanming HaoIEEE Internet of Things Journal.
'Remodeled chaotic compressive sensing scheme for secure and energy-efficient data forwarding in body-to-body network'.R Nidhya, Manish Kumar, Achyut Shankar, Shuchi Mala, Sanjeev Thakur, Xiaochun ChengComputers and Electrical Engineering.
'SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles'.Guangquan Xu, Hongpeng Bai, Jun Xing. Tao Luo, Neal N. Xiong, Xiaochun Cheng, Shaoying Liu, X iZhengJournal of Parallel and Distributed Computing.
'A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living'
Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang YangComputer Communications.
'Analytical modelling and UK Government policy'.Marie Oldfield, Ella HaigAI & Ethics.
'Behavioral Consistency in the Digital Age'.Heather Shaw, Paul J. Taylor, David A. EllisPsychological Science.
'Consent Receipts for a Usable and Auditable Web of Personal Data'.Vitor Jesus, Harshvardhan J. PanditIEEE Access.
'We’re all radioactive – so let’s stop being afraid of it'.Bill LeeThe Conversation.
'Cyber security and the Leviathan'.Joseph Da SilvaComputers & Security.
'How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis'.Yang Lu, Shujun Li, Alex Freitas, Athina IoannouEuropean Union Digital Library.
'From data flows to privacy-benefit trade-offs: A user-centric
semantic model'
Yang Lu, Shujun LiWiley Online Library.
'Slight: A lightweight authentication scheme for smart healthcare services'.Haleh Amintoosi, Mahdi Nikooghadam, Mohammad Shojafar, Saru Kumari, Mamoun AlazabComputers and Electrical Engineering.
'An authentication and key agreement scheme for smart grid'.Masoumeh Safkhani, Saru Kumari, Mohammad Shojafar & Sachin Kumar Peer-to-Peer Networking and Applications.
'DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS'.Xindi Ma; Qi Jiang; Mohammad Shojafar; Mamoun Alazab; Sachin Kumar; Saru KumariIEEE Transactions on Intelligent Transportation Systems.
'Experiences from the Dark Side of Participant Recruitment'.Charles WeirHipster - Secure Development.
SIEMS: A Secure Intelligent Energy Management System for Industrial IoT applicationsPedram Asef; Rahim Taheri; Mohammad Shojafar; Iosif Mporas; Rahim TafazolliIEEE.
Personal information: Perceptions, types and evolutionRahime Belen Saglam; Jason R.C. Nurse; Duncan HodgesJournal of Information Security and Applications.
'The impact of financial deprivation on children’s cybersecurity knowledge & abilities'.Suzanne Prior; Karen Renaud
Education and Information Technologies: The Official Journal of the IFIP Technical Committee on Education
MIGRANT: Modeling Smartphone Password Manager Adoption using Migration TheoryNora Alkaldi; Karen Renaud

ACM SIGMIS Database: the DATABASE for Advances in Information Systems
Accessible and Inclusive Cyber Security: A Nuanced and Complex ChallengeKaren Renaud; Lizzie Coles‑KempSN Computer Science: A Springer Nature Journal
Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud frameworkJitendra Kumar Samriya; Rajeev Tiwari; Xiaochun Cheng; Rahul Kumar Singh; Achyut Shankar; Manoj KumarSustainable Computing: Informatics and Systems
On Shielding Android’s Pending Intent from Malware Apps Using a Novel Ownership-Based AuthenticationS. Pradeepkumar Duraisamy; S. Geetha; Xiaochun Cheng; Seifedine KadryJournal of Circuits, Systems and Computers
Securing AI-based Security SystemsSandra Scott-HaywardGeneva Centre for Security Policy
Supporting and Enabling Effective Privacy Decision Making for SMEsMaria Bada; Steven Furnell; Jason Nurse National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (REPHRAIN)
Theorising ‘Digital Vulnerability’ in the Criminal Justice ProcessLindsey Rice; Layla SkinnsBritish Society of Criminology

Call for Events is now open! We're supporting Members and Expert Fellows to lead activities that explore aspects of TIPS in the Digital Economy. We will help to organise the activity with up to £5,000 to cover the associated costs.