About
Activity
-
Recognising the importance of maintaining essential bus connections, our colleagues at Go Cornwall Bus, part of Go South West, will be expanding its…
Recognising the importance of maintaining essential bus connections, our colleagues at Go Cornwall Bus, part of Go South West, will be expanding its…
Liked by James Turland
-
We’re thrilled to share that several of our colleagues and operating companies were recognised at the UK Bus Awards for their outstanding…
We’re thrilled to share that several of our colleagues and operating companies were recognised at the UK Bus Awards for their outstanding…
Liked by James Turland
-
From due diligence to value creation, cyber security is now central to the investment lifecycle. A few weeks ago, we sponsored the Private Equity…
From due diligence to value creation, cyber security is now central to the investment lifecycle. A few weeks ago, we sponsored the Private Equity…
Liked by James Turland
Experience & Education
Licenses & Certifications
Volunteer Experience
Publications
-
Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance
Frontiers in Psychology
Despite their best intentions, people struggle with the realities of privacy protection and
will often sacrifice privacy for convenience in their online activities. Individuals show
systematic, personality dependent differences in their privacy decision making, which
makes it interesting for those who seek to design ‘nudges’ designed to manipulate
privacy behaviors. We explore such effects in a cookie decision task. Two hundred and
ninety participants were given an incidental…Despite their best intentions, people struggle with the realities of privacy protection and
will often sacrifice privacy for convenience in their online activities. Individuals show
systematic, personality dependent differences in their privacy decision making, which
makes it interesting for those who seek to design ‘nudges’ designed to manipulate
privacy behaviors. We explore such effects in a cookie decision task. Two hundred and
ninety participants were given an incidental website review task that masked the true aim
of the study. At the task outset, they were asked whether they wanted to accept a cookie
in a message that either contained a social framing ‘nudge’ (they were told that either a
majority or a minority of users like themselves had accepted the cookie) or contained no
information about social norms (control). At the end of the task, participants were asked
to complete a range of personality assessments (impulsivity, risk-taking, willingness
to self-disclose and sociability). We found social framing to be an effective behavioral
nudge, reducing cookie acceptance in the minority social norm condition. Further, we
found personality effects in that those scoring highly on risk-taking and impulsivity were
significantly more likely to accept the cookie. Finally, we found that the application of a
social nudge could attenuate the personality effects of impulsivity and risk-taking. We
explore the implications for those working in the privacy-by-design space.Other authorsSee publication -
Nudging towards security: Developing an application for wireless network selection for android phones.
ACM digital library (in press).
Peer-reviewed conference paper, accepted to British HCI, University of Lincoln, UK, 13-17 July 2015.
Other authorsSee publication -
Addressing consumerization of IT risks with nudging
International Journal of Information Systems and Project Management
In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary,
less strict, more flexible Information Security policies, based on risk assessment of device…In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary,
less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.Other authorsSee publication -
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging
Elsevier - CENTERIS 2014 - Conference on ENTERprise Information Systems
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose acomplementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behaviour by…
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose acomplementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behaviour by nudging. We argue that nudging,by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions.
Other authorsSee publication
Honors & Awards
-
Cyber Innovation Challenge (Double Winner) Raytheon - Metropolitan Police
Raytheon & Metropolitan Police
5 day event in London hosted by Raytheon and the Metropolitan Police.
• Design and implement two software solutions for two separate problems.
- First: Design and implement a system to detect malicious traffic between network nodes.
Use of an innovative Peer to Peer solution
- Second: Design and implement a system to aid in police crime rapid response and assessment.
Crowd source solution
Allow users to…5 day event in London hosted by Raytheon and the Metropolitan Police.
• Design and implement two software solutions for two separate problems.
- First: Design and implement a system to detect malicious traffic between network nodes.
Use of an innovative Peer to Peer solution
- Second: Design and implement a system to aid in police crime rapid response and assessment.
Crowd source solution
Allow users to vote
Distribute crimes between officers.
Web based front end to visually display crime location.
Building of a mobile application to allow users (member of the public) to submit video, pictures anonymously (if desired)
Organizations
-
British Computing Society
-
More activity by James
-
Happy to be at Money 20/20 in Riyadh with our partners Finbridge Global. Here for a couple of days, let’s catch up on all things cyber. OSec…
Happy to be at Money 20/20 in Riyadh with our partners Finbridge Global. Here for a couple of days, let’s catch up on all things cyber. OSec…
Liked by James Turland
-
After more than a decade as Chief Information Security Officer at Global Atlantic, my time with this exceptional organization has come to an…
After more than a decade as Chief Information Security Officer at Global Atlantic, my time with this exceptional organization has come to an…
Liked by James Turland
-
⭐⭐⭐Congrats O.agency on 20 years of business!! You've been an important part of North East Chamber of Commerce journey this last year and we…
⭐⭐⭐Congrats O.agency on 20 years of business!! You've been an important part of North East Chamber of Commerce journey this last year and we…
Liked by James Turland
Other similar profiles
-
Geraint (Gez) J.
Geraint (Gez) J.
-
Naresh Ragula
Naresh Ragula
-
Julian Glendinning
Julian Glendinning
-
Andy Cocallis
Andy Cocallis
-
Nick O'Kelly
Nick O'Kelly
-
Mohamed Ashik (Ashiq JA)
Mohamed Ashik (Ashiq JA)
-
David Cousins
David Cousins
-
Gary Langham BA(Hons) MCMI
Gary Langham BA(Hons) MCMI
-
Paul Jeffries
Paul Jeffries
-
Megan Buckley
Megan Buckley
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreAdd new skills with these courses
-
10h 39m
Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
12m
A Standalone Project: Create a Simple Vulnerability Scanning Tool That Scans for Common Vulnerabilities