The Impact of GDPR Infringement Fines on the Market Value of Firms

Conference paper


Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of GDPR Infringement Fines on the Market Value of Firms. ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security. 24 - 25 Jun 2021 Academic Conferences International Limited. https://doi.org/10.34190/EWS.21.088
AuthorsFord, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J.
TypeConference paper
Abstract

Previous studies have shown (varying degrees of) evidence of a negative impact of data breach announcements on the share price of publicly listed companies. Following on from this research, further studies have been carried out in assessing the economic impact of the introduction of legislation in this area to encourage firms to invest in cyber security and protect the privacy of data subjects. Existing research has been predominantly US-centric. This paper looks at the impact of the General Data Protection Regulation (GDPR) infringement fine announcements on the market value of mostly European publicly listed companies with a view to reinforcing the importance of data privacy compliance, thereby informing cyber security investment strategies for organisations. Using event study techniques, a dataset of 25 GDPR fine announcement events was analysed, and statistically significant cumulative abnormal returns (CAR) of around-1% on average up to three days after the event were identified. In almost all cases, this negative economic impact on market value far outweighed the monetary value of the fine itself, and relatively minor fines could result in major market valuation losses for companies, even those having large market capitalisations. A further dataset of four announcements where sizeable GDPR fines were subsequently appealed was also analysed and although positive returns for successful appeals were observed (and the reverse), they could not be shown to be statistically significant-perhaps due, at least in part, to COVID-19 related market volatility at that time. This research would be of benefit to business management, practitioners of cyber security, investors and shareholders as well as researchers in cyber security or related fields (pointers to future research are given). Data protection authorities may also find this work of interest.

Year2021
ConferenceECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security
PublisherAcademic Conferences International Limited
Publisher's version
License
File Access Level
Anyone
Publication dates
Print25 Jun 2021
Publication process dates
Deposited30 Nov 2021
Journal citationpp. 473-481
ISSN2048-8610
2048-8602
Book titleECCWS 2021: Proceeding of the 20th European Conference on Cyber Warfare and Security
Book editorEze, T.
ISBN978-1-912764-43-3
978-1-912764-99-0
Digital Object Identifier (DOI)https://doi.org/10.34190/EWS.21.088
Web address (URL)https://www.academic-bookshop.com/ourshop/prod_7595390-ECCWS-2021-PDF-VERSION-Proceeding-of-the-20th-European-Conference-on-Cyber-Warfare-and-Security.html
Copyright holder© 2021 The Authors
Permalink -

https://repository.uel.ac.uk/item/89zxy

Download files


Publisher's version
ECCWS21-Proceedings EWS-088.pdf
License: All rights reserved
File access level: Anyone

  • 139
    total views
  • 171
    total downloads
  • 0
    views this month
  • 7
    downloads this month

Export as

Related outputs

A real-time fingerprint-based indoor positioning using deep learning and preceding states
Nabati, M. and Ghorashi, S. 2023. A real-time fingerprint-based indoor positioning using deep learning and preceding states. Expert Systems with Applications. 213 (Art. 118889). https://doi.org/10.1016/j.eswa.2022.118889
European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report
Davidson, J., Aiken, M., Phillips, K. and Farr, R. 2022. European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report. London, United Kingdom Institute for Connected Communities, University of East London.
Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems
Alwan, A., Brimicombe, A., Ciupala, A., Ghorashi, S., Baravalle, A. and Falcarin, P. 2022. Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems. Computer Networks. 218 (Art. 109384). https://doi.org/10.1016/j.comnet.2022.109384
Confidence interval estimation for fingerprint-based indoor localization
Nabati, M., Ghorashi, S. and Shahbazian, R. 2022. Confidence interval estimation for fingerprint-based indoor localization. Ad Hoc Networks. 134 (Art. 102877). https://doi.org/10.1016/j.adhoc.2022.102877
JGPR: a computationally efficient multi-target Gaussian process regression algorithm
Nabati, M., Ghorashi, S. A. and Shahbazian, R. 2022. JGPR: a computationally efficient multi-target Gaussian process regression algorithm. Machine Learning. 111, pp. 1987-2010. https://doi.org/10.1007/s10994-022-06170-3
Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies
Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S. and Aiken, M. P. 2022. Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences. 2 (2), pp. 379-398. https://doi.org/10.3390/forensicsci2020028
The Impact of CISO Appointment Announcements on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2022. The Impact of CISO Appointment Announcements on the Market Value of Firms. 17th International Conference on Cyber Warfare and Security (ICCWS 2022). Albany, New York, USA 17 - 18 Mar 2022 Academic Conferences International Limited.
A Machine Learning Framework for House Price Estimation
Awonaike, A., Ghorashi, S. and Hammad, R. 2022. A Machine Learning Framework for House Price Estimation. 21st International Conference on Intelligent Systems Design and Applications (ISDA 2021). Online 13 - 15 Dec 2021 Springer. https://doi.org/10.1007/978-3-030-96308-8_90
Data quality challenges in large-scale cyber-physical systems: A systematic review
Alwan, A., Ciupala, A., Brimicombe, A., Ghorashi, S., Baravalle, A. and Falcarin, P. 2021. Data quality challenges in large-scale cyber-physical systems: A systematic review. Information Systems. 105 (Art. 101951). https://doi.org/10.1016/j.is.2021.101951
The Impact of Data Breach Announcements on Company Value in European Markets
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of Data Breach Announcements on Company Value in European Markets. WEIS 2021: The 20th Annual Workshop on the Economics of Information Security. 28 - 29 Jun 2021
A CSI-Based Human Activity Recognition Using Deep Learning
Fard Moshiri, P., Shahbazian, R., Nabati, M. and Ghorashi, S. A. 2021. A CSI-Based Human Activity Recognition Using Deep Learning. Sensors. https://doi.org/10.3390/s21217225
Reconfigurable Linear Antenna Arrays for Beam-Pattern Matching in Collocated MIMO Radars
Kavousi Ghafi, E., Ghorashi, S. and Mehrshahi, E. 2021. Reconfigurable Linear Antenna Arrays for Beam-Pattern Matching in Collocated MIMO Radars. IEEE Transactions on Aerospace and Electronic Systems. 57 (5), pp. 2715-2724. https://doi.org/10.1109/TAES.2021.3062173
Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation
Navidan, H., Fard Moshiri, P., Nabati, M., Shahbazian, R., Ghorashi, S., Shah-Mansouri, V. and Windridge, D. 2021. Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation. Computer Networks. 194 (Art. 108149). https://doi.org/10.1016/j.comnet.2021.108149
Joint Coordinate Optimization in Fingerprint-Based Indoor Positioning
Nabati, M., Ghorashi, S. and Shahbazian, R. 2021. Joint Coordinate Optimization in Fingerprint-Based Indoor Positioning. IEEE Communications Letters. 25 (4), pp. 1192-1195. https://doi.org/10.1109/LCOMM.2020.3047352
Safer technology, safer users: The UK as a world-leader in Safety Tech
Donaldson, S., Davidson, J. and Aiken, M. 2020. Safer technology, safer users: The UK as a world-leader in Safety Tech. Perspective Economics for Department for Digital, Culture, Media & Sport.
Exploring Policing and Industry Practice in the Prevention of Online Child Sexual Abuse
Davidson, J., Schimmenti, A., Caretti, V., Puccia, A., Corbari, E., Bogaerts, S., Schilder, J. D., Scally, M., Bifulco, A. and DeMarco, J. N. 2020. Exploring Policing and Industry Practice in the Prevention of Online Child Sexual Abuse. in: Bryce, I. and Petherick, W. (ed.) Child Sexual Abuse: Forensic Issues in Evidence, Impact, and Management Academic Press. pp. 657-677
A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine
Ezzati Khatab, Z., Hajihoseini Gazestani, A., Ghorashi, S. and Ghavami, M. 2020. A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine. Signal Processing. 181 (Art. 107915). https://doi.org/10.1016/j.sigpro.2020.107915
Joint Optimization of Power and Location in Full-Duplex UAV Enabled Systems
Gazestani A. H., Ghorashi, S. A., Yang, Z. and Shikh-Bahaei, M. 2020. Joint Optimization of Power and Location in Full-Duplex UAV Enabled Systems. IEEE Systems Journal. 16 (1), pp. 914-921. https://doi.org/10.1109/JSYST.2020.3036275
Fingerprinting Based Indoor Localization Considering the Dynamic Nature of Wi-Fi Signals
Alikhani, N., Moghtadaiee, V. and Ghorashi, S. 2020. Fingerprinting Based Indoor Localization Considering the Dynamic Nature of Wi-Fi Signals. Wireless Personal Communications. 115 (2), pp. 1445-1464. https://doi.org/10.1007/s11277-020-07636-0
Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks
Hajihoseini Gazestani, A., Ghorashi, S. A., Yang, Z. and Shikh-Bahaei, M 2020. Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks. IEEE Transactions on Mobile Computing. 21 (3), pp. 1049-1060. https://doi.org/10.1109/TMC.2020.3017137
Privacy preserving in indoor fingerprint localization and radio map expansion
Ghorashi, S. A., Sazdar, A. M., Alikhani, N. and Khonsari, A. 2020. Privacy preserving in indoor fingerprint localization and radio map expansion. Peer-to-Peer Networking and Applications. 14, p. 121–134. https://doi.org/10.1007/s12083-020-00950-1
A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Sazdar, A. M., Ghorashi, S. A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53 (Art. 102515). https://doi.org/10.1016/j.jisa.2020.102515
Using Synthetic Data to Enhance the Accuracy of Fingerprint-Based Localization: A Deep Learning Approach
Nabati, M., Navidan, H., Shahbazian, R., Ghorashi, S. A. and Windridge, D. 2020. Using Synthetic Data to Enhance the Accuracy of Fingerprint-Based Localization: A Deep Learning Approach. IEEE Sensors Letters. 4 (Art. 6000204). https://doi.org/10.1109/LSENS.2020.2971555
Power Allocation for D2D Communications Using Max-Min Message-Passing Algorithm
Kazemi Rashed, S, Asvadi, R., Rajabi, S., Ghorashi, S. A. and Martini, M. G. 2020. Power Allocation for D2D Communications Using Max-Min Message-Passing Algorithm. IEEE Transactions on Vehicular Technology. 69 (8), pp. 8443-8458. https://doi.org/10.1109/TVT.2020.2995534
Throughput Improvement by Mode Selection in Hybrid Duplex Wireless Networks
Mousavinasab, B., Gazestani, A. H., Ghorashi, S. A. and Shikh-Bahaei, M. 2020. Throughput Improvement by Mode Selection in Hybrid Duplex Wireless Networks. Wireless Networks. 26, p. 3687–3699. https://doi.org/10.1007/s11276-020-02286-3
Researching the Affects That Online Pornography Has on U.K. Adolescents Aged 11 to 16
Martellozzo, E., Monaghan, A., Davidson, J. and Adler, J. 2020. Researching the Affects That Online Pornography Has on U.K. Adolescents Aged 11 to 16. SAGE Open. 10 (1). https://doi.org/10.1177/2158244019899462
Adult Online Hate, Harassment and Abuse: A rapid evidence assessment
Davidson, J., Livingstone, S., Jenkins, S., Gekoski, A., Choak, C., Ike,T. and Phillips, K. 2019. Adult Online Hate, Harassment and Abuse: A rapid evidence assessment. UK Council for Child Internet Safety (UKCCIS).
Child Online Protection in Rwanda
Davidson, J., Kidron, B. and Phillips, K. 2019. Child Online Protection in Rwanda. 5Rights Foundation.
New Reconstructed Database for Cost Reduction in Indoor Fingerprinting Localization
Moghatdaiee, V., Ghorashi, S. and Ghavami, G. 2019. New Reconstructed Database for Cost Reduction in Indoor Fingerprinting Localization. IEEE Access. 7, pp. 104462-104477. https://doi.org/10.1109/ACCESS.2019.2932024
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Ebenuwa, S., Sharif, S., Al-Nemrat, A., Al-Bayatti, A. H., Alalwan, N., Alzahrani, A. I. and Alfarraj, O. 2019. Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry. 11 (Art. 1504). https://doi.org/10.3390/sym11121504
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666. https://doi.org/10.1109/ACCESS.2019.2899578
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse
Horvath, Miranda A. H., Davidson, J., Grove-Hills, Julie, Gekoski, Anna and Choak, Clare 2014. It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse. London, UK Office of the Children's Commissioner.
The development of specialist support services for young people who have offended and who have also been victims of crime, abuse and/or violence: final report
Porteous, David, Adler, Joanna R. and Davidson, J. 2015. The development of specialist support services for young people who have offended and who have also been victims of crime, abuse and/or violence: final report. London MOPAC.
Child online protection in the MENA region
Patrick, Burton, Monica, Bulger, Davidson, J., Ali, Mariya, Davison, Patrick, Day, Emma, DeMarco, Jeffrey, Rasul, Majida, Razai, Sara, Scally, Mia and Wex, Bronwyn 2016. Child online protection in the MENA region. Centre for Justice and Crime Prevention.
"I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people
Martellozzo, Elena, Monaghan, Andrew, Adler, Joanna R., Davidson, J., Leyva, Rodolfo and Horvath, Miranda A. H. 2016. "I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people. Middlesex University, NSPCC, OCC. https://doi.org/10.6084/m9.figshare.3382393
Child Sexual Abuse: Media Representations and Government Reactions
Davidson, J. 2008. Child Sexual Abuse: Media Representations and Government Reactions. London, UK Routledge-Cavendish.
Protecting children online: towards a safer internet
Davidson, J. and Martellozzo, Elena 2008. Protecting children online: towards a safer internet. in: Letherby, Gayle, Williams, Kate, Birch, Philip and Cain, Maureen E. (ed.) Sex as Crime? Willan Publishing. pp. 338-355
Internet Sex Offenders: Individual Autonomy, 'Folk Devils' and State Control
Martellozzo, Elena and Davidson, J. 2009. Internet Sex Offenders: Individual Autonomy, 'Folk Devils' and State Control. in: Day Sclater, Shelley, Ebtehaj, Fatemeh, Jackson, Emily and Richards, Martin (ed.) Regulating autonomy: sex, reproduction and family Oxford, UK Hart Publishing. pp. 129-146
Online groomers: Profiling, policing and prevention
Davidson, J. and Gottschalk, Petter 2009. Online groomers: Profiling, policing and prevention. Lyme Regis, UK Russell House.
Urbanization and Security: Moving Forward, Key Themes, and Challenges
Davidson, J. and Martellozzo, Elena 2009. Urbanization and Security: Moving Forward, Key Themes, and Challenges. in: Cordner, Gary, Cordner, AnnMarie and Das, Dilip K. (ed.) Urbanization, Policing and Security: Global Perspectives CRC Press. pp. 435-440
Legislation and Policy: Protecting Young People, Sentencing and Managing Internet Sex Offenders
Davidson, J. 2011. Legislation and Policy: Protecting Young People, Sentencing and Managing Internet Sex Offenders. in: Davidson, Julia and Gottschalk, Petter (ed.) Internet Child Abuse: Current Research and Policy Abingdon, U.K. Routledge-Cavendish. pp. 8-26
Online offending behaviour and child victimisation: new findings and policy
Webster, Stephen, Davidson, J. and Bifulco, Antonia 2015. Online offending behaviour and child victimisation: new findings and policy. Basingstoke, Hampshire Palgrave Macmillan.
International perspectives on child victimisation
Davidson, J. and Hamerton, Christopher 2018. International perspectives on child victimisation. London, UK Routledge.
Victims Speak: Comparing Child Sexual Abusers’ and Child Victims’ Accounts, Perceptions, and Interpretations of Sexual Abuse
Davidson, J. 2006. Victims Speak: Comparing Child Sexual Abusers’ and Child Victims’ Accounts, Perceptions, and Interpretations of Sexual Abuse. Victims & Offenders. 1 (2), pp. 159-174. https://doi.org/10.1080/15564880600626114
Child victims of sexual abuse: Children's experience of the investigative process in the criminal justice system
Davidson, J., Bifulco, Antonia, Thomas, Geraldine and Ramsay, Margaret 2006. Child victims of sexual abuse: Children's experience of the investigative process in the criminal justice system. Practice. 18 (4), pp. 247-263. https://doi.org/10.1080/09503150601025253
Digital forensics in law enforcement: the case of online victimisation of children
Davidson, J. and Gottschalk, Petter 2008. Digital forensics in law enforcement: the case of online victimisation of children. Electronic Government. 5 (4), pp. 445-451. https://doi.org/10.1504/EG.2008.019526
Protecting vulnerable young people in cyberspace from sexual abuse: raising awareness and responding globally
Davidson, J. and Martellozzo, Elena 2008. Protecting vulnerable young people in cyberspace from sexual abuse: raising awareness and responding globally. Police Practice and Research. 9 (4), pp. 277-289. https://doi.org/10.1080/15614260802349965
Investigating police practice in the UK: achieving best evidence in work with young victims of abuse
Davidson, J. and Bifulco, Antonia 2009. Investigating police practice in the UK: achieving best evidence in work with young victims of abuse. Pakistan Journal of Criminology. 1 (3), pp. 19-46.
Characteristics of the Internet for criminal child sexual abuse by online groomers
Davidson, J. and Gottschalk, Petter 2011. Characteristics of the Internet for criminal child sexual abuse by online groomers. Criminal Justice Studies. 24 (1), pp. 23-36. https://doi.org/10.1080/1478601X.2011.544188
Exploring Young People's Use of Social Networking Sites and Digital Media in the Internet Safety Context
Davidson, J. and Martellozzo, Elena 2012. Exploring Young People's Use of Social Networking Sites and Digital Media in the Internet Safety Context. Information, Communication & Society. 16 (9), pp. 1456-1476. https://doi.org/10.1080/1369118X.2012.701655
The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions
Bergen, Emilia, Davidson, J., Schulz, Anja, Schuhmann, Petya, Johansson, Ada, Santtila, Pekka and Jern, Patrick 2014. The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions. Victims & Offenders. 9 (3), pp. 276-298. https://doi.org/10.1080/15564886.2013.873750
Cyber safety for adolescent girls: bullying, harassment, sexting, pornography, and solicitation
Smith, Peter K., Thompson, Fran and Davidson, J. 2014. Cyber safety for adolescent girls: bullying, harassment, sexting, pornography, and solicitation. Current Opinion in Obstetrics and Gynecology. 26 (5), pp. 360-365. https://doi.org/10.1097/GCO.0000000000000106
The effectiveness and impact of the child protection and criminal justice systems in cases of intrafamilial child sexual abuse
Gekoski, Anna, Horvath, Miranda A.H and Davidson, J. 2016. The effectiveness and impact of the child protection and criminal justice systems in cases of intrafamilial child sexual abuse. Journal of Criminological Research, Policy and Practice. 2 (1), pp. 54-66. https://doi.org/10.1108/JCRPP-06-2015-0023
EU online child safety: what does the literature say?
DeMarco, Jeffrey, Davidson, J., Bifulco, Antonia, Scally, Mia, Cheevers, Carly, Schimmenti, Adriano, Caretti, Vincenzo, Puccia, Angelo, Corbari, Elisa, Schilder, Janneke and Bogaerts, Stefan 2016. EU online child safety: what does the literature say? Crimen et Delictum: International Journal of Criminological and Investigative Sciences. 11 (1), pp. 1-19.
Evaluation of CEOP ThinkUKnow internet safety programme and exploration of young people's internet safety knowledge.
Davidson, J., Martellozzo, Elena and Lorenz, Mia 2009. Evaluation of CEOP ThinkUKnow internet safety programme and exploration of young people's internet safety knowledge. Centre for Abuse & Trauma Studies and Kingston University.
Child abuse & child protection: Contemporary issues in research, policy & practice
Davidson, J. and Bifulco, Antonia 2018. Child abuse & child protection: Contemporary issues in research, policy & practice. Routledge.
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment
Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32. https://doi.org/10.1007/s10844-013-0300-5
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
Intelligent Detection of MAC Spoofing Attack in 802.11 Network
Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking ACM.
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3) 2017. London, UK 18 - 20 Jan 2017 Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_10
Digital dangers and cyber-victimisation: a study of European adolescent online risky behaviour for sexual exploitation
DeMarco, Jeffrey, Cheevers, Carly, Davidson, Julia, Bogaerts, Stefan, Pace, Ugo, Aiken, Mary, Caretti, Vincenzo, Schimmenti, Adriano and Bifulco, Antonia 2017. Digital dangers and cyber-victimisation: a study of European adolescent online risky behaviour for sexual exploitation. Clinical Neuropsychiatry. 14 (1), pp. 104-112.
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
Enhancing police and industry practice
Davidson, Julia, DeMarco, Jeffrey, Bifulco, Antonia, Bogaerts, Stefan, Caretti, Vincenzo, Aiken, Mary, Chevers, Carly, Corbari, Elisa, Scally, Mia, Schimmenti, Adriano and Puccia, Angelo 2016. Enhancing police and industry practice. Middlesex University.
Youth pathways into cybercrime
Aiken, M., Davidson, J. and Amann, Philippe 2016. Youth pathways into cybercrime. Paladin Capital Group.
The prevalence, nature, and impact of intrafamilial child sexual abuse: findings from a rapid evidence assessment
Gekoski, Anna, Davidson, J. and Horvath, Miranda A. H. 2016. The prevalence, nature, and impact of intrafamilial child sexual abuse: findings from a rapid evidence assessment. Journal of Criminological Research, Policy and Practice. 2 (4), pp. 231-243. https://doi.org/10.1108/JCRPP-05-2016-0008
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Statistical Sampling Approach to Investigate Child Pornography Cases
Sarantinos, N., Al-Nemrat, A. and Naeem, U. 2013. Statistical Sampling Approach to Investigate Child Pornography Cases. 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC). Sydney NSW, Australia 21 - 22 Nov 2013 IEEE. https://doi.org/10.1109/CTC.2013.14