Featured Publications

Cybersecurity Investment Decision-Making: Best Practice Guide for SMEs

A new publication to guide Small and Medium-sized Enterprises (SMEs) has been published as an outcome of a RISCS-funded project Economic Metrics for Supporting Cyber Security Investment Decision-Making. There are 6 million Small and Medium-Sized Enterprises (SMEs) in...

Remote Working and Cyber Security – Literature Review

While various research strands have started exploring the impact of remote working on employees’ mental health and productivity, there is little insight on how approaches to cyber risk and resilience have been impacted through the shift. Our research objectives focus...

Emerging Insights: Cyber Security Incentives and the Role of Cyber Insurance

Flo Greatrix, RISCS Policy Impact Officer A new report by James Sullivan (RUSI) and Jason Nurse (University of Kent) has been recently published as part of their RISCS Funded project: ‘Incentivising cybersecurity through cyber insurance’. It considers the...

New RISCS Policy briefing: a framework to assess evidence quality in cyber security policy making

We are thrilled to share our new policy briefing based on the Evaluating Cyber Security Evidence for Policy Advice” (ECSEPA) project led by Professor Madeline Carr (UCL) and Professor Siraj Shaikh (Coventry University). Civil servants across the UK Government are...

Cyber Insurance and Risk Management: Challenges and Opportunities

UCL gates in March 2020 A new playground for underwriters? Corporate boards the world over are scrambling to address the unique challenges of the COVID-19 global pandemic – particularly the impact of social distancing. In addition to the obvious problems this causes...

Talking about Security with Professional Developers

Tamara Lopez, Helen Sharp, Thein Tun, Arosha Bandara (School of Computing & Communications, The Open University) and Mark Levine (Department of Psychology, University of Exeter) and Bashar Nuseibeh (Lero – The Irish Software Research Centre, University of Limerick).

An Anatomy of Security Conversations in Stack Overflow

Abstract As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important societal concern. This paper examines how secure coding practice...

An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement

Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software security this may encourage. This study joins...

Captchat: A Messaging Tool to Frustrate Ubiquitous Surveillance

Paul Dunphy, Johannes Schöning, James Nicholson, Patrick Olivier Abstract There is currently a widespread uncertainty regarding the ability of citizens to control privacy online in the face of ubiquitous surveillance. This is a huge and complex societal problem....

Do You Love Me? Psychological Characteristics of Romance Scam Victims

Abstract The online dating romance scam is an Advance Fee Fraud, typically conducted by international criminal groups via online dating sites and social networking sites. This type of mass-marketing fraud (MMF) is the most frequently reported type of MMF in most...

All Publications

An Anatomy of Security Conversations in Stack Overflow

Abstract As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important societal concern. This paper examines how secure coding practice...

Barriers to Usable Security? Three Organizational Case Studies

Deanna D. Caputo, Shari Lawrence Pfleeger and M. Angela Sasse Abstract Usable security assumes that when security functions are more usable, people are more likely to use them, leading to an improvement in overall security. Existing software design and engineering...

Captchat: A Messaging Tool to Frustrate Ubiquitous Surveillance

Paul Dunphy, Johannes Schöning, James Nicholson, Patrick Olivier Abstract There is currently a widespread uncertainty regarding the ability of citizens to control privacy online in the face of ubiquitous surveillance. This is a huge and complex societal problem....

Comparing Decision Support Approaches for Cyber Security Investment

Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi Abstract When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security...

Cybersecurity Games and Investments: A Decision Support Approach

Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi Abstract In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly interested in examining cases where the organization suffers from an...

Decision justifications for wireless network selection

Debora Jeske, Lynne Coventry and Pam Briggs Abstract A number of security risks are associated with the selection of wireless networks. We examined wireless network choices in a study involving 104 undergraduate social science students. One research goal was to...

Decision support approaches for cyber security investment

Andrew Fieldera, Emmanouil Panaousisb, Pasquale Malacariac, Chris Hankina, Fabrizio Smeraldi Abstract When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security...