Image

United Kingdom
885 followers 500+ connections

Image Image Image

Join to view profile

About

A highly skilled Information Security leader with deep technical knowledge and a…

Activity

Join now to see all activity

Experience & Education

  • Image

    The Go-Ahead Group

View James’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Image

    Carer

    Private/Personal Care

    - 2 years 10 months

  • (ISC)² Graphic

    Membership Chair

    (ISC)²

    - Present 5 years

    Membership Chair for ISC² North East Chapter

Publications

  • Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance

    Frontiers in Psychology

    Despite their best intentions, people struggle with the realities of privacy protection and
    will often sacrifice privacy for convenience in their online activities. Individuals show
    systematic, personality dependent differences in their privacy decision making, which
    makes it interesting for those who seek to design ‘nudges’ designed to manipulate
    privacy behaviors. We explore such effects in a cookie decision task. Two hundred and
    ninety participants were given an incidental…

    Despite their best intentions, people struggle with the realities of privacy protection and
    will often sacrifice privacy for convenience in their online activities. Individuals show
    systematic, personality dependent differences in their privacy decision making, which
    makes it interesting for those who seek to design ‘nudges’ designed to manipulate
    privacy behaviors. We explore such effects in a cookie decision task. Two hundred and
    ninety participants were given an incidental website review task that masked the true aim
    of the study. At the task outset, they were asked whether they wanted to accept a cookie
    in a message that either contained a social framing ‘nudge’ (they were told that either a
    majority or a minority of users like themselves had accepted the cookie) or contained no
    information about social norms (control). At the end of the task, participants were asked
    to complete a range of personality assessments (impulsivity, risk-taking, willingness
    to self-disclose and sociability). We found social framing to be an effective behavioral
    nudge, reducing cookie acceptance in the minority social norm condition. Further, we
    found personality effects in that those scoring highly on risk-taking and impulsivity were
    significantly more likely to accept the cookie. Finally, we found that the application of a
    social nudge could attenuate the personality effects of impulsivity and risk-taking. We
    explore the implications for those working in the privacy-by-design space.

    Other authors
    See publication Image
  • Nudging towards security: Developing an application for wireless network selection for android phones.

    ACM digital library (in press).

    Peer-reviewed conference paper, accepted to British HCI, University of Lincoln, UK, 13-17 July 2015.

    Other authors
    See publication Image
  • Addressing consumerization of IT risks with nudging

    International Journal of Information Systems and Project Management

    In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary,
    less strict, more flexible Information Security policies, based on risk assessment of device…

    In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary,
    less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.

    Other authors
    See publication Image
  • Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging

    Elsevier - CENTERIS 2014 - Conference on ENTERprise Information Systems

    In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose acomplementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behaviour by…

    In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose acomplementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behaviour by nudging. We argue that nudging,by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions.

    Other authors
    See publication Image

Honors & Awards

  • Cyber Innovation Challenge (Double Winner) Raytheon - Metropolitan Police

    Raytheon & Metropolitan Police

    5 day event in London hosted by Raytheon and the Metropolitan Police.

    • Design and implement two software solutions for two separate problems.
    - First: Design and implement a system to detect malicious traffic between network nodes.
     Use of an innovative Peer to Peer solution
    - Second: Design and implement a system to aid in police crime rapid response and assessment.
     Crowd source solution
     Allow users to…

    5 day event in London hosted by Raytheon and the Metropolitan Police.

    • Design and implement two software solutions for two separate problems.
    - First: Design and implement a system to detect malicious traffic between network nodes.
     Use of an innovative Peer to Peer solution
    - Second: Design and implement a system to aid in police crime rapid response and assessment.
     Crowd source solution
     Allow users to vote
     Distribute crimes between officers.
     Web based front end to visually display crime location.
     Building of a mobile application to allow users (member of the public) to submit video, pictures anonymously (if desired)

Organizations

  • British Computing Society

    -

More activity by James

View James’ full profile

  • See who you know in common
  • Get introduced
  • Contact James directly
Join to view full profile

Other similar profiles

Image

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses