Showing 1 - 19 results of 19 for search '"privacy"', query time: 0.07s Refine Results
  1. 1

    Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches by Williams, M

    Published 2018
    “…<p>While the public claim to be concerned about privacy, they rarely express protective behaviour. …”
    Thesis
  2. 2

    Privacy salience: taxonomies and research opportunities by Williams, M, Nurse, J, Creese, S

    Published 2017
    “…Privacy is a well-understood concept in the physical world, with us all desiring some escape from the public gaze. …”
    Journal article
  3. 3

    Future scenarios and challenges for security and privacy by Williams, M, Axon, L, Nurse, J, Creese, S

    Published 2016
    “…As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. …”
    Conference item
  4. 4

    Perspectives on privacy in the use of online systems by Williams, M, Nurse, J

    Published 2016
    “…Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. …”
    Conference item
  5. 5
  6. 6

    The perfect storm: The privacy paradox and the Internet-of-Things by Williams, M, Nurse, J, Creese, S

    Published 2016
    “…<p>Privacy is a concept found throughout human history and opinion polls suggest that the public value this principle. …”
    Conference item
  7. 7

    "Privacy is the boring Bit": User perceptions and behaviour in the Internet-of-Things by Williams, M, Nurse, J, Creese, S

    Published 2018
    “…In opinion polls, the public frequently claim to value their privacy. However, individuals often seem to overlook the principle, contributing to a disparity labelled the ‘Privacy Paradox’. …”
    Conference item
  8. 8

    Optional data disclosure and the online privacy paradox: a UK perspective by Williams, M, Nurse, J

    Published 2016
    “…Opinion polls suggest that the public value their privacy, with majorities calling for greater control of their data. …”
    Conference item
  9. 9

    A capability-oriented approach to assessing privacy risk in smart home ecosystems by Sturgess, J, Nurse, J, Zhao, J

    Published 2018
    “…Smart devices are increasingly ubiquitous; the multitude of risks they pose to user privacy continues to grow, but assessing such risks has proven difficult. …”
    Conference item
  10. 10

    Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home by Nurse, J, Atamli, A, Martin, A

    Published 2016
    “…While these bring several advantages in terms of convenience and assisted living, security and privacy risks are also a concern. In this article, we consider this risk problem from the perspective of technology users in the smart home, and set out to provide a usable framework for modelling security and privacy risks. …”
    Conference item
  11. 11

    Unwinding Ariadne's identity thread: Privacy risks with fitness trackers and online social networks by Aktypi, A, Nurse, J, Goldsmith, M

    Published 2017
    “…The tool also illustrates the privacy risks that arise from information that people expose, which could be exploited by malicious parties such as fraudsters, stalkers and other online and offline criminals. …”
    Conference item
  12. 12

    Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic by Taylor, V, Nurse, J, Hodges, D

    Published 2014
    “…We also discovered that in some cases, improper application design rendered SSL encryption useless at preventing privacy leaks. We discuss ways in which an attacker can use both active and passive attacks to identify and track a user or invade their privacy. …”
    Working paper
  13. 13

    A data−reachability model for elucidating privacy and security risks related to the use of online social networks by Creese, S, Goldsmith, M, Nurse, J, Phillips, E

    Published 2012
    “…Privacy and security within Online Social Networks (OSNs) has become a major concern over recent years. …”
    Conference item
  14. 14
  15. 15

    Smart insiders: exploring the threat from insiders using the Internet-of-Things by Nurse, J, Erola, A, Agrafiotis, I, Goldsmith, M, Creese, S

    Published 2016
    “…While there are substantial opportunities accompanying IoT, spanning from Healthcare to Energy, there are an equal number of concerns regarding the security and privacy of this plethora of ubiquitous devices. In this position paper we approach security and privacy in IoT from a different perspective to existing research, by considering the impact that IoT may have on the growing problem of insider threat within enterprises. …”
    Conference item
  16. 16

    Investigating the leakage of sensitive personal and organisational information in email headers by Nurse, J, Erola, A, Goldsmith, M, Creese, S

    Published 2015
    “…In this paper, we consider this topic of outgoing emails and unintentional information leakage to better appreciate the security and privacy concerns related to the simple activity of sending an email. …”
    Journal article
  17. 17

    Using visualizations to enhance users’ understanding of app activities on Android devices by Eze, C, Nurse, J, Happa, J

    Published 2016
    “…The ever-increasing number of third-party applications developed for Android devices has resulted in a growing interest in the secondary activities that these applications perform and how they affect a user’s privacy. Unfortunately, users continue to install these applications without any concrete knowledge of the breadth of these activities; hence, they have little insight into the sensitive information and resources accessed by these applications. …”
    Journal article
  18. 18

    Investigating the leakage of sensitive personal and organisational information in email headers by Nurse, J, Erola, A, Goldsmith, M, Creese, S

    Published 2015
    “…In this paper, we consider this topic of outgoing emails and unintentional information leakage to better appreciate the security and privacy concerns related to the simple activity of sending an email. …”
    Journal article
  19. 19

    Inferring Social Relationships from Technology−Level Device Connections by Nurse, J, Pumphrey, J, Gibson−Robinson, T, Goldsmith, M, Creese, S

    Published 2014
    “…A key motivation here is to better understand and elucidate the privacy risks associated with the digital footprints that we as humans (often inadvertently) create. …”
    Conference item