The Impact of Data Breach Announcements on Company Value in European Markets

Conference paper


Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of Data Breach Announcements on Company Value in European Markets. WEIS 2021: The 20th Annual Workshop on the Economics of Information Security. 28 - 29 Jun 2021
AuthorsFord, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J.
TypeConference paper
Abstract

Recent research on the economic impact of data breach announcements on publicly listed companies was found to be sparse, with the majority of existing studies having a strong US bias. Here, a dataset of 45 data breach disclosures between 2017 and 2019 relevant to European publicly listed companies was hand-gathered (from various sources) and detailed analyses of share price impact carried out using event study techniques with the aim of supporting business cases for firms to invest in cyber security. Differences from existing studies (in particular, the US market) are highlighted and discussed along with pointers to future research in this area. Although some evidence of negative cumulative abnormal returns (CAR) in the days surrounding the announcement were observed, along with one extreme case leading to insolvency, the results were not statistically significant overall with the notable exception of the Spanish market, which appeared to be more sensitive to data breaches, reacting rapidly. Therefore, justification for cyber security investment purely based on the market value effect of a data breach disclosure would be challenging. Other factors would need to be taken into consideration such as risk appetite, industry sector and nature of the information compromised as well as relevant legislation. Certain other observations were noted such as the lack of a comprehensive breach database for Europe (unlike US) and the effect of the introduction of the General Data Protection Regulation (GDPR). This research would be of benefit to business management, practitioners of cyber security, investors and shareholders as well as researchers in cyber security or related fields.

Keywordscyber security; data breaches; event study; market value; economic impact
Year2021
ConferenceWEIS 2021: The 20th Annual Workshop on the Economics of Information Security
Accepted author manuscript
License
File Access Level
Anyone
Publication process dates
Completed28 Jun 2021
Accepted27 May 2021
Deposited01 Dec 2021
Web address (URL)https://weis2021.econinfosec.org/
Copyright holder© 2021 The Authors
Permalink -

https://repository.uel.ac.uk/item/89zxz

Download files


Accepted author manuscript
weis21-final12.pdf
License: All rights reserved
File access level: Anyone

  • 220
    total views
  • 117
    total downloads
  • 5
    views this month
  • 0
    downloads this month

Export as

Related outputs

A real-time fingerprint-based indoor positioning using deep learning and preceding states
Nabati, M. and Ghorashi, S. 2023. A real-time fingerprint-based indoor positioning using deep learning and preceding states. Expert Systems with Applications. 213 (Art. 118889). https://doi.org/10.1016/j.eswa.2022.118889
European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report
Davidson, J., Aiken, M., Phillips, K. and Farr, R. 2022. European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report. London, United Kingdom Institute for Connected Communities, University of East London.
Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems
Alwan, A., Brimicombe, A., Ciupala, A., Ghorashi, S., Baravalle, A. and Falcarin, P. 2022. Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems. Computer Networks. 218 (Art. 109384). https://doi.org/10.1016/j.comnet.2022.109384
Confidence interval estimation for fingerprint-based indoor localization
Nabati, M., Ghorashi, S. and Shahbazian, R. 2022. Confidence interval estimation for fingerprint-based indoor localization. Ad Hoc Networks. 134 (Art. 102877). https://doi.org/10.1016/j.adhoc.2022.102877
JGPR: a computationally efficient multi-target Gaussian process regression algorithm
Nabati, M., Ghorashi, S. A. and Shahbazian, R. 2022. JGPR: a computationally efficient multi-target Gaussian process regression algorithm. Machine Learning. 111, pp. 1987-2010. https://doi.org/10.1007/s10994-022-06170-3
Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies
Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S. and Aiken, M. P. 2022. Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences. 2 (2), pp. 379-398. https://doi.org/10.3390/forensicsci2020028
The Impact of CISO Appointment Announcements on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2022. The Impact of CISO Appointment Announcements on the Market Value of Firms. 17th International Conference on Cyber Warfare and Security (ICCWS 2022). Albany, New York, USA 17 - 18 Mar 2022 Academic Conferences International Limited.
A Machine Learning Framework for House Price Estimation
Awonaike, A., Ghorashi, S. and Hammad, R. 2022. A Machine Learning Framework for House Price Estimation. 21st International Conference on Intelligent Systems Design and Applications (ISDA 2021). Online 13 - 15 Dec 2021 Springer. https://doi.org/10.1007/978-3-030-96308-8_90
Data quality challenges in large-scale cyber-physical systems: A systematic review
Alwan, A., Ciupala, A., Brimicombe, A., Ghorashi, S., Baravalle, A. and Falcarin, P. 2021. Data quality challenges in large-scale cyber-physical systems: A systematic review. Information Systems. 105 (Art. 101951). https://doi.org/10.1016/j.is.2021.101951
The Impact of GDPR Infringement Fines on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of GDPR Infringement Fines on the Market Value of Firms. ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security. 24 - 25 Jun 2021 Academic Conferences International Limited. https://doi.org/10.34190/EWS.21.088
A CSI-Based Human Activity Recognition Using Deep Learning
Fard Moshiri, P., Shahbazian, R., Nabati, M. and Ghorashi, S. A. 2021. A CSI-Based Human Activity Recognition Using Deep Learning. Sensors. https://doi.org/10.3390/s21217225
Reconfigurable Linear Antenna Arrays for Beam-Pattern Matching in Collocated MIMO Radars
Kavousi Ghafi, E., Ghorashi, S. and Mehrshahi, E. 2021. Reconfigurable Linear Antenna Arrays for Beam-Pattern Matching in Collocated MIMO Radars. IEEE Transactions on Aerospace and Electronic Systems. 57 (5), pp. 2715-2724. https://doi.org/10.1109/TAES.2021.3062173
Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation
Navidan, H., Fard Moshiri, P., Nabati, M., Shahbazian, R., Ghorashi, S., Shah-Mansouri, V. and Windridge, D. 2021. Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation. Computer Networks. 194 (Art. 108149). https://doi.org/10.1016/j.comnet.2021.108149
Joint Coordinate Optimization in Fingerprint-Based Indoor Positioning
Nabati, M., Ghorashi, S. and Shahbazian, R. 2021. Joint Coordinate Optimization in Fingerprint-Based Indoor Positioning. IEEE Communications Letters. 25 (4), pp. 1192-1195. https://doi.org/10.1109/LCOMM.2020.3047352
Safer technology, safer users: The UK as a world-leader in Safety Tech
Donaldson, S., Davidson, J. and Aiken, M. 2020. Safer technology, safer users: The UK as a world-leader in Safety Tech. Perspective Economics for Department for Digital, Culture, Media & Sport.
Exploring Policing and Industry Practice in the Prevention of Online Child Sexual Abuse
Davidson, J., Schimmenti, A., Caretti, V., Puccia, A., Corbari, E., Bogaerts, S., Schilder, J. D., Scally, M., Bifulco, A. and DeMarco, J. N. 2020. Exploring Policing and Industry Practice in the Prevention of Online Child Sexual Abuse. in: Bryce, I. and Petherick, W. (ed.) Child Sexual Abuse: Forensic Issues in Evidence, Impact, and Management Academic Press. pp. 657-677
A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine
Ezzati Khatab, Z., Hajihoseini Gazestani, A., Ghorashi, S. and Ghavami, M. 2020. A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine. Signal Processing. 181 (Art. 107915). https://doi.org/10.1016/j.sigpro.2020.107915
Joint Optimization of Power and Location in Full-Duplex UAV Enabled Systems
Gazestani A. H., Ghorashi, S. A., Yang, Z. and Shikh-Bahaei, M. 2020. Joint Optimization of Power and Location in Full-Duplex UAV Enabled Systems. IEEE Systems Journal. 16 (1), pp. 914-921. https://doi.org/10.1109/JSYST.2020.3036275
Fingerprinting Based Indoor Localization Considering the Dynamic Nature of Wi-Fi Signals
Alikhani, N., Moghtadaiee, V. and Ghorashi, S. 2020. Fingerprinting Based Indoor Localization Considering the Dynamic Nature of Wi-Fi Signals. Wireless Personal Communications. 115 (2), pp. 1445-1464. https://doi.org/10.1007/s11277-020-07636-0
Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks
Hajihoseini Gazestani, A., Ghorashi, S. A., Yang, Z. and Shikh-Bahaei, M 2020. Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks. IEEE Transactions on Mobile Computing. 21 (3), pp. 1049-1060. https://doi.org/10.1109/TMC.2020.3017137
Privacy preserving in indoor fingerprint localization and radio map expansion
Ghorashi, S. A., Sazdar, A. M., Alikhani, N. and Khonsari, A. 2020. Privacy preserving in indoor fingerprint localization and radio map expansion. Peer-to-Peer Networking and Applications. 14, p. 121–134. https://doi.org/10.1007/s12083-020-00950-1
A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Sazdar, A. M., Ghorashi, S. A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53 (Art. 102515). https://doi.org/10.1016/j.jisa.2020.102515
Using Synthetic Data to Enhance the Accuracy of Fingerprint-Based Localization: A Deep Learning Approach
Nabati, M., Navidan, H., Shahbazian, R., Ghorashi, S. A. and Windridge, D. 2020. Using Synthetic Data to Enhance the Accuracy of Fingerprint-Based Localization: A Deep Learning Approach. IEEE Sensors Letters. 4 (Art. 6000204). https://doi.org/10.1109/LSENS.2020.2971555
Power Allocation for D2D Communications Using Max-Min Message-Passing Algorithm
Kazemi Rashed, S, Asvadi, R., Rajabi, S., Ghorashi, S. A. and Martini, M. G. 2020. Power Allocation for D2D Communications Using Max-Min Message-Passing Algorithm. IEEE Transactions on Vehicular Technology. 69 (8), pp. 8443-8458. https://doi.org/10.1109/TVT.2020.2995534
Throughput Improvement by Mode Selection in Hybrid Duplex Wireless Networks
Mousavinasab, B., Gazestani, A. H., Ghorashi, S. A. and Shikh-Bahaei, M. 2020. Throughput Improvement by Mode Selection in Hybrid Duplex Wireless Networks. Wireless Networks. 26, p. 3687–3699. https://doi.org/10.1007/s11276-020-02286-3
Researching the Affects That Online Pornography Has on U.K. Adolescents Aged 11 to 16
Martellozzo, E., Monaghan, A., Davidson, J. and Adler, J. 2020. Researching the Affects That Online Pornography Has on U.K. Adolescents Aged 11 to 16. SAGE Open. 10 (1). https://doi.org/10.1177/2158244019899462
Adult Online Hate, Harassment and Abuse: A rapid evidence assessment
Davidson, J., Livingstone, S., Jenkins, S., Gekoski, A., Choak, C., Ike,T. and Phillips, K. 2019. Adult Online Hate, Harassment and Abuse: A rapid evidence assessment. UK Council for Child Internet Safety (UKCCIS).
Child Online Protection in Rwanda
Davidson, J., Kidron, B. and Phillips, K. 2019. Child Online Protection in Rwanda. 5Rights Foundation.
New Reconstructed Database for Cost Reduction in Indoor Fingerprinting Localization
Moghatdaiee, V., Ghorashi, S. and Ghavami, G. 2019. New Reconstructed Database for Cost Reduction in Indoor Fingerprinting Localization. IEEE Access. 7, pp. 104462-104477. https://doi.org/10.1109/ACCESS.2019.2932024
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Ebenuwa, S., Sharif, S., Al-Nemrat, A., Al-Bayatti, A. H., Alalwan, N., Alzahrani, A. I. and Alfarraj, O. 2019. Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry. 11 (Art. 1504). https://doi.org/10.3390/sym11121504
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666. https://doi.org/10.1109/ACCESS.2019.2899578
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse
Horvath, Miranda A. H., Davidson, J., Grove-Hills, Julie, Gekoski, Anna and Choak, Clare 2014. It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse. London, UK Office of the Children's Commissioner.
The development of specialist support services for young people who have offended and who have also been victims of crime, abuse and/or violence: final report
Porteous, David, Adler, Joanna R. and Davidson, J. 2015. The development of specialist support services for young people who have offended and who have also been victims of crime, abuse and/or violence: final report. London MOPAC.
Child online protection in the MENA region
Patrick, Burton, Monica, Bulger, Davidson, J., Ali, Mariya, Davison, Patrick, Day, Emma, DeMarco, Jeffrey, Rasul, Majida, Razai, Sara, Scally, Mia and Wex, Bronwyn 2016. Child online protection in the MENA region. Centre for Justice and Crime Prevention.
"I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people
Martellozzo, Elena, Monaghan, Andrew, Adler, Joanna R., Davidson, J., Leyva, Rodolfo and Horvath, Miranda A. H. 2016. "I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people. Middlesex University, NSPCC, OCC. https://doi.org/10.6084/m9.figshare.3382393
Child Sexual Abuse: Media Representations and Government Reactions
Davidson, J. 2008. Child Sexual Abuse: Media Representations and Government Reactions. London, UK Routledge-Cavendish.
Protecting children online: towards a safer internet
Davidson, J. and Martellozzo, Elena 2008. Protecting children online: towards a safer internet. in: Letherby, Gayle, Williams, Kate, Birch, Philip and Cain, Maureen E. (ed.) Sex as Crime? Willan Publishing. pp. 338-355
Internet Sex Offenders: Individual Autonomy, 'Folk Devils' and State Control
Martellozzo, Elena and Davidson, J. 2009. Internet Sex Offenders: Individual Autonomy, 'Folk Devils' and State Control. in: Day Sclater, Shelley, Ebtehaj, Fatemeh, Jackson, Emily and Richards, Martin (ed.) Regulating autonomy: sex, reproduction and family Oxford, UK Hart Publishing. pp. 129-146
Online groomers: Profiling, policing and prevention
Davidson, J. and Gottschalk, Petter 2009. Online groomers: Profiling, policing and prevention. Lyme Regis, UK Russell House.
Urbanization and Security: Moving Forward, Key Themes, and Challenges
Davidson, J. and Martellozzo, Elena 2009. Urbanization and Security: Moving Forward, Key Themes, and Challenges. in: Cordner, Gary, Cordner, AnnMarie and Das, Dilip K. (ed.) Urbanization, Policing and Security: Global Perspectives CRC Press. pp. 435-440
Legislation and Policy: Protecting Young People, Sentencing and Managing Internet Sex Offenders
Davidson, J. 2011. Legislation and Policy: Protecting Young People, Sentencing and Managing Internet Sex Offenders. in: Davidson, Julia and Gottschalk, Petter (ed.) Internet Child Abuse: Current Research and Policy Abingdon, U.K. Routledge-Cavendish. pp. 8-26
Online offending behaviour and child victimisation: new findings and policy
Webster, Stephen, Davidson, J. and Bifulco, Antonia 2015. Online offending behaviour and child victimisation: new findings and policy. Basingstoke, Hampshire Palgrave Macmillan.
International perspectives on child victimisation
Davidson, J. and Hamerton, Christopher 2018. International perspectives on child victimisation. London, UK Routledge.
Victims Speak: Comparing Child Sexual Abusers’ and Child Victims’ Accounts, Perceptions, and Interpretations of Sexual Abuse
Davidson, J. 2006. Victims Speak: Comparing Child Sexual Abusers’ and Child Victims’ Accounts, Perceptions, and Interpretations of Sexual Abuse. Victims & Offenders. 1 (2), pp. 159-174. https://doi.org/10.1080/15564880600626114
Child victims of sexual abuse: Children's experience of the investigative process in the criminal justice system
Davidson, J., Bifulco, Antonia, Thomas, Geraldine and Ramsay, Margaret 2006. Child victims of sexual abuse: Children's experience of the investigative process in the criminal justice system. Practice. 18 (4), pp. 247-263. https://doi.org/10.1080/09503150601025253
Digital forensics in law enforcement: the case of online victimisation of children
Davidson, J. and Gottschalk, Petter 2008. Digital forensics in law enforcement: the case of online victimisation of children. Electronic Government. 5 (4), pp. 445-451. https://doi.org/10.1504/EG.2008.019526
Protecting vulnerable young people in cyberspace from sexual abuse: raising awareness and responding globally
Davidson, J. and Martellozzo, Elena 2008. Protecting vulnerable young people in cyberspace from sexual abuse: raising awareness and responding globally. Police Practice and Research. 9 (4), pp. 277-289. https://doi.org/10.1080/15614260802349965
Investigating police practice in the UK: achieving best evidence in work with young victims of abuse
Davidson, J. and Bifulco, Antonia 2009. Investigating police practice in the UK: achieving best evidence in work with young victims of abuse. Pakistan Journal of Criminology. 1 (3), pp. 19-46.
Characteristics of the Internet for criminal child sexual abuse by online groomers
Davidson, J. and Gottschalk, Petter 2011. Characteristics of the Internet for criminal child sexual abuse by online groomers. Criminal Justice Studies. 24 (1), pp. 23-36. https://doi.org/10.1080/1478601X.2011.544188
Exploring Young People's Use of Social Networking Sites and Digital Media in the Internet Safety Context
Davidson, J. and Martellozzo, Elena 2012. Exploring Young People's Use of Social Networking Sites and Digital Media in the Internet Safety Context. Information, Communication & Society. 16 (9), pp. 1456-1476. https://doi.org/10.1080/1369118X.2012.701655
The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions
Bergen, Emilia, Davidson, J., Schulz, Anja, Schuhmann, Petya, Johansson, Ada, Santtila, Pekka and Jern, Patrick 2014. The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions. Victims & Offenders. 9 (3), pp. 276-298. https://doi.org/10.1080/15564886.2013.873750
Cyber safety for adolescent girls: bullying, harassment, sexting, pornography, and solicitation
Smith, Peter K., Thompson, Fran and Davidson, J. 2014. Cyber safety for adolescent girls: bullying, harassment, sexting, pornography, and solicitation. Current Opinion in Obstetrics and Gynecology. 26 (5), pp. 360-365. https://doi.org/10.1097/GCO.0000000000000106
The effectiveness and impact of the child protection and criminal justice systems in cases of intrafamilial child sexual abuse
Gekoski, Anna, Horvath, Miranda A.H and Davidson, J. 2016. The effectiveness and impact of the child protection and criminal justice systems in cases of intrafamilial child sexual abuse. Journal of Criminological Research, Policy and Practice. 2 (1), pp. 54-66. https://doi.org/10.1108/JCRPP-06-2015-0023
EU online child safety: what does the literature say?
DeMarco, Jeffrey, Davidson, J., Bifulco, Antonia, Scally, Mia, Cheevers, Carly, Schimmenti, Adriano, Caretti, Vincenzo, Puccia, Angelo, Corbari, Elisa, Schilder, Janneke and Bogaerts, Stefan 2016. EU online child safety: what does the literature say? Crimen et Delictum: International Journal of Criminological and Investigative Sciences. 11 (1), pp. 1-19.
Evaluation of CEOP ThinkUKnow internet safety programme and exploration of young people's internet safety knowledge.
Davidson, J., Martellozzo, Elena and Lorenz, Mia 2009. Evaluation of CEOP ThinkUKnow internet safety programme and exploration of young people's internet safety knowledge. Centre for Abuse & Trauma Studies and Kingston University.
Child abuse & child protection: Contemporary issues in research, policy & practice
Davidson, J. and Bifulco, Antonia 2018. Child abuse & child protection: Contemporary issues in research, policy & practice. Routledge.
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment
Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32. https://doi.org/10.1007/s10844-013-0300-5
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
Intelligent Detection of MAC Spoofing Attack in 802.11 Network
Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking ACM.
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3) 2017. London, UK 18 - 20 Jan 2017 Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_10
Digital dangers and cyber-victimisation: a study of European adolescent online risky behaviour for sexual exploitation
DeMarco, Jeffrey, Cheevers, Carly, Davidson, Julia, Bogaerts, Stefan, Pace, Ugo, Aiken, Mary, Caretti, Vincenzo, Schimmenti, Adriano and Bifulco, Antonia 2017. Digital dangers and cyber-victimisation: a study of European adolescent online risky behaviour for sexual exploitation. Clinical Neuropsychiatry. 14 (1), pp. 104-112.
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
Enhancing police and industry practice
Davidson, Julia, DeMarco, Jeffrey, Bifulco, Antonia, Bogaerts, Stefan, Caretti, Vincenzo, Aiken, Mary, Chevers, Carly, Corbari, Elisa, Scally, Mia, Schimmenti, Adriano and Puccia, Angelo 2016. Enhancing police and industry practice. Middlesex University.
Youth pathways into cybercrime
Aiken, M., Davidson, J. and Amann, Philippe 2016. Youth pathways into cybercrime. Paladin Capital Group.
The prevalence, nature, and impact of intrafamilial child sexual abuse: findings from a rapid evidence assessment
Gekoski, Anna, Davidson, J. and Horvath, Miranda A. H. 2016. The prevalence, nature, and impact of intrafamilial child sexual abuse: findings from a rapid evidence assessment. Journal of Criminological Research, Policy and Practice. 2 (4), pp. 231-243. https://doi.org/10.1108/JCRPP-05-2016-0008
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Statistical Sampling Approach to Investigate Child Pornography Cases
Sarantinos, N., Al-Nemrat, A. and Naeem, U. 2013. Statistical Sampling Approach to Investigate Child Pornography Cases. 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC). Sydney NSW, Australia 21 - 22 Nov 2013 IEEE. https://doi.org/10.1109/CTC.2013.14