Papers from Members, Experts, and Project Partners

Every month we ask our network for the papers they have recently published, and compliment that by recent publications from leading journals in digital trust, identity, privacy, and security. You can check our top list of journals and conferences here, and the list of papers below.

Paper/Issue/ReportAuthorsPublished In/By
CybSafe Research Library
Globally accessible archive of research into the human aspect of cyber security
A framework for effective corporate communication after cyber security incidentsRichard Knight, Jason R.C.NurseComputers & Security, Volume 99
Emotional AI and Children: Ethics, Parents. Governance
Andrew McStay, Gilad RosnerN/A
A framework to assess evidence quality in cyber security policy making
Policy briefing
Madeline Carr, Siraj ShaikhRISCS
Is your chatbot GDPR compliant?: Open issues in agent designRahime Belen Sağlam, Jason R. C. NurseCUI '20: Proceedings of the 2nd Conference on Conversational User Interfaces
Cyber Diplomacy: A Systematic Literature ReviewAmel Attatfa, Karen Renaud, Stefano DePaoliProcedia Computer Science Volume 176
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims ProcessesJason R.C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chainsPetar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox, Pete BurnapCybersecurity volume 3
No two gangs are alike: The digital divide in street gangs’ differential adaptations to social mediaAndrew Whittaker, James Densley, Karin S.MoserComputers in Human Behavior Volume 110
The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research DirectionsChristina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, Florian AltCHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network SystemsXiong Li, Jieyao Peng, Mohammad S. Obaidat, Fan Wu, Muhammad Khurram Khan, Chaoyang ChenIEEE Systems Journal Volume 14, Issue 1
A New Detection and Prevention System for ARP Attacks Using Static EntrySherin Hijazi, Mohammad S. ObaidatIEEE Systems Journal Volume 13, Issue 3
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate PredictionsMuhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, Aziz MohaisenIEEE Systems Journal Volume 14, Issue 1
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic ReviewFrancesca Stevens, Jason R.C. Nurse, Budi AriefCyberpsychology, Behavior, and Social Networking
Cybersecurity for Smart Farming: Socio-Cultural Context MattersDirk van der Linden, Ola Aleksandra Michalec, Anna ZamanskyIEEE Technology and Society Magazine Volume: 39, Issue: 4
An Investigation of Self-Control and Self-Regulation as Mechanisms Linking Remote Communication to Employee Well-Being during the Covid-19 PandemicMoser, K., Rivkin, W., Diestel, S. and Alshaik, I.Academy of Management (AoM) Annual Meeting 2020. Vancouver, CA (Virtual Meeting) 07-11 Aug 2020
The COVID-19 Contact Tracing App In England and ‘Experimental Proportionality’Marion Oswald, Jamie GraceForthcoming, Public Law
Not ‘Very English’ - on the Use of the Polygraph by the Penal System in England and WalesKyriakos N Kotsoglou, Marion OswaldThe Journal of Criminal Law. December 2020
A Fuzzy Adaptive Dynamic NSGA-II With Fuzzy-Based Borda Ranking Method and its Application to Multimedia Data AnalysisMaysam Orouskhani, Daming Shi, Xiaochun ChengIEEE Transactions on Fuzzy Systems Volume 29, Issue 1
Design Thinking for Cyber DeceptionDebi Ashenden, Rob Black, Iain Reid, Simon HendersonHawaii International Conference on System Sciences 2021
Interdisciplinary Lessons Learned While Researching Fake NewsChar Sample, Michael J. Jensen, Keith Scott, John McAlaney, Steve Fitchpatrick, Amanda Brockinton, David Ormrod, Amy OrmrodFrontiers in Psychology,
Research Topic on Cognition, Behavior and Cybersecurity
Privacy in Transport? Exploring Perceptions of Location Privacy Through User SegmentationIngolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael Mcguire, Shujun LiHawaii International Conference on System Sciences 2021
Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing Shane Horgan, Ben Collier, Richard Jones, Lynsay ShepherdEmerald Insights
Using Public Priorities To Disentangle the Dimensions of Procedural Justice and Trustworthiness In Police–Citizen InteractionsJoseph A. Hamm, Scott E. WolfeThe British Journal of Criminology: An International Review of Crime and Society
A novel Intrusion Detection System against spoofing attacks in connected Electric VehiclesDimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge JanickeArray, Volume 5
Reflections on Digital SovereigntyLokke Moerel, Paul TimmersEU Cyber Direct
China-Linked Influence Operation on Twitter Detected Engaging with the US Presidential Election

Part 1: Detection Report
Part 2: Development Report
Cardiff University Crime and Security Research InstituteCardiff University’s OSCAR (Open Source Communications Analytics Research)
Nexus or Not? The relationship between terrorism and organised crimeMartin Joseph GallagherPolicing Insight
Benefits of implementation of mobile devices with frontline officers in Police Scotland 2019-2020William Graham, and Lesley Diack, Martin Joseph GallagherScottish Institute for Policing Research - Breifing Series Issue 13
A framework for effective corporate communication after cyber security incidentsRichard Knight, Jason R. C. NurseComputers & Security, Volume 99, December 2020
Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concernsJoseph Da SilvaMethodological Innovations, Volume 14 Issue 1, January-April 2021
Efficient and Fine-grained Signature for IIoT with Resistance to Key ExposureYangyang Bao, Weidong Qiu, Xiaochun ChengIEEE Internet of Things Journal
An efficient identity-based proxy signcryption using latticeHongfei Zhu, Ye Wang, Chonghua Wang, Xiaochun ChengFuture Generation Computer Systems, Volume 117
Mechanisms of power inscription into IT governance: Lessons from two national digital identity systemsRony Medaglia, Ben Eaton, Jonas Hedman, Edgar A. WhitleyInformation Systems Journal (ISJ)
Artificial Intelligence for a Better FutureBernd Carsten StahlSpringerBriefs in Research and Innovation Governance
Industrial espionage – A systematic literature review (SLR)Tie Hou, Victoria WangComputers & Security, Volume 98, November 2020
Blockchain Technology in Current Agricultural Systems: From Techniques to ApplicationsWeijun Lin, Xinghong Huang, Hui Fang, Victoria Wang, Yining Hua, Jingjie Wang, Haining Yin, Dewei Yi, Laihung YauIEEE Access
Exploring the extent of openness of open government data – A critique of open government datasets in the UKVictoria Wang, David ShepherdGovernment Information Quarterly, Volume 37, Issue 1, January 2020
Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare SystemYangyang Bao, Weidong Qiu, Xiaochun ChengIEEE Internet of Things Journal
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchainShuhui Fan, Shaojing Fu, Haoran Xu, Xiaochun ChengInformation Processing & Management, Volume 58, Issue 4
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemicHarjinder Singh Lallie, Lynsay A. Shepherd, Jason R.C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier BellekensComputers & Security, Volume 105, June 2021
Formal Modelling and Security Analysisof Bitcoin’s Payment ProtocolPaolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng HaoComputers & Security, Elsevier, 2021
Autonomy and visibility: The rewards of mobile workingMartin Joseph Gallagher, Lesley Diack, William GrahamPolicing Insight
The Influence of Traits Associated with Autism Spectrum Disorder (ASD) on the Detection of Fake NewsJacqui Taylor-Jackson, Sophie MatthewsHCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media
Regulating Online Behavioural Advertising Through Data Protection LawJiahong ChenEdward Elgar Publishing
PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigationsKaren Renaud, Ivano Bongiovanni, Sara Wilford, Alastair IronsScience & Justice, Volume 61, Issue 5
he “three M’s” counter-measures to children’s risky online behaviors: mentor, mitigate and monitorKaren Renaud, Suzanne PriorInformation and Computer Security
Accessible authentication: dyslexia and password strategiesKaren Renaud, Graham Johnson, Jacques OphoffInformation and Computer Security
Ethical funding for trustworthy AI: proposals to address the responsibilities of funders to ensure that projects adhere to trustworthy AI practiceAllison Gardner, Adam Leon Smith, Adam Steventon, Ellen Coughlan, Marie OldfieldAI Ethics (2021)
Ethical Funding for Trustworthy AI: initial workshop outcomesA. Gardner, A. Leon Smith, M. A. Oldfield, A. Steventon, E. CoughlanThe Society for the Study of Artificial Intelligence and Simulation of Behaviour
Scanning the Cycle: Timing-based Authentication on PLCsChuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya MathurASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
Surveillance, trust, and policing at music festivalsKara C. Hoover, Jeremy W. Crampton, Harrison Smith, J. Colette BerbesqueThe Canadian Geographer / Le Géographe canadien
Observing Data-Driven Approaches to Covid-19: Reflections from a Distributed, Remote, Interdisciplinary Research ProjectRachel Allsopp, Claire Bessant, Keith Ditcham, Ardi Janjeva, Guangquan Li, Marion Oswald, Mark Warner Journal of Legal Research Methodology
Analytical modelling and UK Government policyMarie Oldfield, Ella HaigAI and Ethics
Creative Malfunction: Finding fault with RowhammerMatt SpencerComputational Culture: a journal of software studies
A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEsKaren Renaud, Jacques OphoffOrganizational Cybersecurity Journal: Practice, Process and People
Developing a cyber security culture: Current practices and future needsBetsy Uchendu, Jason R.C. Nurse, Maria Bada, Steven FurnellComputers & Security
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home DevicesSarah Turner, Jason Nurse, Shujun LiHuman Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings
SherLOCKED: A Detective-Themed Serious Game for Cyber Security EducationAlice Jaffray, Conor Finn, Jason R. C. NurseHuman Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and PrivacyJason R. C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John Blythe, Ben KoppelmanHCI International 2021 - Posters: 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part III
The Case for Adaptive Security InterventionsIrum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk Van der Linden, John Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar NuseibehACM Transactions on Software Engineering and Methodology
The Interplay between Personal Relationships & Shoulder Surfing MitigationHabiba Farzand, Kinshuk Bhardwaj, Karola Marky, Mohamed KhamisMensch und Computer 2021 (MuC ’21), September 5–8, 2021, Ingolstadt, Germany. ACM
Reconfiguring governance: How cyber security regulations are reconfiguring water governanceOla Michalec, Sveta Milyaeva, Awais RashidRegulation & Governance
A Quantum Leap for Financial ServicesPavle Avramovic, Sam Qayyum, Dr Rupesh Srivastava, Evert GeurtsenInsight: Opinion and Analysis Hosted by the FCA
A Communication Toolkit to Build Trust: Lessons from Northern Ireland’s Civil Society PeacebuildersCharis Rice, Emily Stanton, Maureen Taylor VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations
MailTrout: a machine learning browser extension for detecting phishing emailsPaul Boyle, Lynsay A. Shepherd33rd British Human Computer Interaction Conference: Post-Pandemic HCI – Living digitally
Infiltrating security into development: exploring the world’s largest software security studyCharles Weir, Sammy Migues, Mike Ware, Laurie WilliamsESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19Steven Kemp, David Buil-Gil, Asier Moneva, Fernando Miró-Llinares, Nacho Díaz-CastañoJournal of Contemporary Criminal Justice
TEL: Low-Latency Failover Traffic Engineering in Data PlaneHabib Mostafaei, Mohammad Shojafar, Mauro ContiIEEE Transactions on Network and Service Management
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing SystemFarooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim TafazolliACM Transactions on Internet Technology
Link Latency Attack in Software-Defined NetworksSanaz Soltani, Mohammad Shojafar, Habib Mostafaei, Zahra Pooranian, Rahim Tafazolli17th IEEE International Conference on Network and Service Management (IEEE CNSM 2021)
A Two-layer Collaborative Vehicle-Edge Intrusion Detection System for Vehicular CommunicationsParya Haji Mirzaee, Mohammad Shojafar, Hamidreza Bagher, Tsz Hin Chan, Haitham Cruickshank, Rahim TafazolliIEEE 94th Vehicular Technology Conference: VTC2021-Fall

Call for Events is now open! We're supporting Members and Expert Fellows to lead activities that explore aspects of TIPS in the Digital Economy. We will help to organise the activity with up to £5,000 to cover the associated costs.