While modern society benefits from a range of technological advancements...
As cyber-attacks continue to increase in frequency and sophistication,
o...
In this highly digitised world, fake news is a challenging problem that ...
Automatic keyword extraction (AKE) has gained more importance with the
i...
The security and privacy of smart home systems, particularly from a home...
The Internet of Things (IoT) is increasingly present in many family home...
Current research on users` perspectives of cyber security and privacy re...
Recently, there has been a rise in the development of powerful pre-train...
The rapid integration of the Internet into our daily lives has led to ma...
This study considers how well an autoethnographic diary study helps as a...
As users increasingly introduce Internet-connected devices into their ho...
Recently, there had been little notable activity from the once prominent...
Gamification and Serious Games are progressively being used over a host ...
Through advances in their conversational abilities, chatbots have starte...
COVID-19 has radically changed society as we know it. To reduce the spre...
While the creation of a strong security culture has been researched and
...
We introduce StockBabble, a conversational agent designed to support
und...
Emojis have established themselves as a popular means of communication i...
As cybercrime becomes one of the most significant threats facing society...
Cybersecurity awareness can be viewed as the level of appreciation,
unde...
A major cyber security incident can represent a cyber crisis for an
orga...
The rapid expansion of cyberspace has greatly facilitated the strategic ...
Cyber insurance is a key component in risk management, intended to trans...
Journalists have long been the targets of both physical and cyber-attack...
The COVID-19 pandemic was a remarkable unprecedented event which altered...
The hacktivist group Anonymous is unusual in its public-facing nature. U...
Conversational agents open the world to new opportunities for human
inte...
Augmented Reality (AR) bridges the gap between the physical and virtual
...
Cyber-attacks have become as commonplace as the Internet itself. Each ye...
The emergence of online services in our daily lives has been accompanied...
Purpose: An essential component of an organisation's cybersecurity strat...
The Internet and, in particular, Online Social Networks have changed the...
While the public claim concern for their privacy, they frequently appear...
There is an increasing shift in technology towards biometric solutions, ...
Equipment shortages in Africa undermine Science, Technology, Engineering...
As new technologies such as the Internet of Things (IoT) are integrated ...
A comparative empirical analysis is performed to define a high-level
pot...
This paper proposes a methodology for designing decision support systems...
Cybercrime investigators face numerous challenges when policing online
c...
Social media communications are becoming increasingly prevalent; some us...
The present paper focuses on Cyber Security Awareness Campaigns, and aim...
While cybercrime can often be an individual activity pursued by lone hac...
Cybercrime is a significant challenge to society, but it can be particul...
Information security risk assessment methods have served us well over th...
The concept of social machines is increasingly being used to characteris...
The EU General Data Protection Regulation (GDPR), enforced from 25th May...
In Security Operations Centres (SOCs) security practitioners work using ...
In recent years, situation awareness has been recognised as a critical p...
In opinion polls, the public frequently claim to value their privacy.
Ho...
Through Augmented Reality (AR), virtual graphics can transform the physi...