The Impact of CISO Appointment Announcements on the Market Value of Firms

Conference paper


Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2022. The Impact of CISO Appointment Announcements on the Market Value of Firms. 17th International Conference on Cyber Warfare and Security (ICCWS 2022). Albany, New York, USA 17 - 18 Mar 2022 Academic Conferences International (ACI).
AuthorsFord, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J.
TypeConference paper
Abstract

Previous studies concerning the economic impact of security events on publicly listed companies have focussed on the negative effect of data breaches and cyberattacks with a view to encouraging firms to improve their cyber security posture to avoid such incidents. This paper is an initial study on the impact of investment in human capital related to security, specifically appointments of chief information security officers (CISO), chief security officers (CSO) or similar overall head of security roles. Using event study techniques, a dataset of 37 CISO type appointment announcements spanning multiple world markets between 2012 and 2019 was analysed and statistically significant (at the 5% level) positive cumulative abnormal returns (CAR) of around 0.8% on average were observed over the three-day period before, during and after the announcement. Furthermore, this positive CAR was found to be highest, at nearly 1.8% on average, within the financial services sector and showing statistical significance at the 1% level. In addition to the industry sector, other characteristics were investigated such as job title, reporting structure, comparison of internal versus external appointments, gender and variations between markets. Although these findings were not as conclusive they are, nevertheless, good pointers for future research in this area. This overall positive market reaction to CISO related announcements is a strong case for publicly listed firms to be transparent in such appointments and to, perhaps, review where that function sits within their organisation to ensure it delivers the greatest benefits. As 24% of the firms analysed were listed outside the US, this study also begins to counter the strong US bias seen in similar and related studies. This research is expected to be of interest to business management, cyber security practitioners, investors and shareholders as well as researchers in cyber security or related fields.

Keywordscyber security; CISO; CSO; market value; economic impact; event study
Year2022
Conference17th International Conference on Cyber Warfare and Security (ICCWS 2022)
PublisherAcademic Conferences International (ACI)
Publisher's version
License
File Access Level
Anyone
Publication dates
Online02 Mar 2022
Print18 Mar 2022
Publication process dates
Deposited25 Mar 2022
Journal citationpp. 375-384
ISSN2048-9889
2048-9870
Book titleProceedings of the 17th International Conference on Cyber Warfare and Security
ISBN978-1-914587-27-6
978-1-914587-26-9
Web address (URL)https://papers.academic-conferences.org/index.php/iccws
Copyright holder© 2022 The Authors
Permalink -

https://repository.uel.ac.uk/item/8q68z

Download files


Publisher's version
Ford+108.pdf
License: All rights reserved
File access level: Anyone

  • 534
    total views
  • 740
    total downloads
  • 23
    views this month
  • 3
    downloads this month

Export as

Related outputs

Building a Human-Centric SOC: A New Framework for Success
Mwangi, J., Wall, J., Ismail, U. and Al-Nemrat, A. 2025. Building a Human-Centric SOC: A New Framework for Success. 16th International Conference on Global Security, Safety & Sustainability, ICGS3-24. Online 25 - 27 Nov 2024 Springer.
An exploratory cross-cultural study of community-based health literacy interventions to promote the mental well-being of disadvantaged and disabled young Africans: a multi-method approach
Sharpe, D., Rajabi, M., Galicia Mesa, L., Hanafiah, A., Obuaku-Igwe, C., Davidson, J. and Chileshe, K. 2024. An exploratory cross-cultural study of community-based health literacy interventions to promote the mental well-being of disadvantaged and disabled young Africans: a multi-method approach. Frontiers in Psychiatry. 15 (Art. 1424836). https://doi.org/10.3389/fpsyt.2024.1424836
Understanding Adolescent Criminal and Risky Online Sexual Behaviors in the Context of Mental Health and Well-Being: Findings from a Multi- National European Cybercrime Study
Davidson, J., Aiken, M., Gekoski, A., Netuveli, G., Farr, R. and Deac, A. 2024. Understanding Adolescent Criminal and Risky Online Sexual Behaviors in the Context of Mental Health and Well-Being: Findings from a Multi- National European Cybercrime Study. Victims & Offenders. p. 1–26. https://doi.org/10.1080/15564886.2024.2408675
VIRRAC Toolkit Report: Virtual Reality Risks Against Children
Davidson, J., Martellozzo, E., Farr, R., Bradbury, P. and Meggyesfalvi, B. 2024. VIRRAC Toolkit Report: Virtual Reality Risks Against Children. Institute for Connected Communities, University of East London.
Efficiently Improving the Wi-Fi-Based Human Activity Recognition, Using Auditory Features, Autoencoders, and Fine-Tuning
Rahdar, A., Chahoushi, M. and Ghorashi, S. 2024. Efficiently Improving the Wi-Fi-Based Human Activity Recognition, Using Auditory Features, Autoencoders, and Fine-Tuning. Computers in Biology and Medicine. 172 (Art. 108232). https://doi.org/10.1016/j.compbiomed.2024.108232
Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking
Aiken, M. P., Davidson, J. C., Walrave, M., Ponnet, K. S., Phillips, K. and Farr, R. R. 2024. Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking. Forensic Sciences. 4 (1), pp. 24-41. https://doi.org/10.3390/forensicsci4010003
A CSI-based Human Activity Recognition using Canny Edge Detector
Shahverdi, H., Moshiri, P. F., Nabati, M., Asvadi, R. and Ghorashi, S. 2024. A CSI-based Human Activity Recognition using Canny Edge Detector. in: Ahad, M., Inoue, S., Lopez, G. and Hossain, T. (ed.) Human Activity and Behavior Analysis: Advances in Computer Vision and Sensors: Volume 2 CRC Press: Taylor & Francis Group. pp. 67-82
Evidence Review on Online Risks to Children
Bryce, J., Livingstone, S., Davidson, J., Hall, B. and Smith, J. 2023. Evidence Review on Online Risks to Children. London NSPCC.
CC-DRIVER Policy Brief No. 8: European Youth Survey
Davidson, J., Aiken, M., Phillips, K. and Farr, R. 2023. CC-DRIVER Policy Brief No. 8: European Youth Survey . London Trilaterial Research.
Complexity Reduction in Beamforming of Uniform Array Antennas for MIMO Radars
Faghand, E., Mehrshahi, E. and Ghorashi, S. A. 2023. Complexity Reduction in Beamforming of Uniform Array Antennas for MIMO Radars. IEEE Transactions on Radar Systems. 1, pp. 413-422. https://doi.org/10.1109/TRS.2023.3309579
Enhancing CSI-Based Human Activity Recognition by Edge Detection Techniques
Shahverdi, H., Nabati, M., Fard Moshiri, P., Asvadi, R. and Ghorashi, S. 2023. Enhancing CSI-Based Human Activity Recognition by Edge Detection Techniques. Information. 14 (7), p. 404. https://doi.org/https://doi.org/10.3390/info14070404
MIMO Virtual Array Design for mmWave 4D-Imaging Radar Sensors
Sichani, N. K., Ahmadi, M., Raei, E., Alaee-Kerahroodi, M., Shankar, M. R. B., Mehrshahi, E. and Ghorashi, S. 2023. MIMO Virtual Array Design for mmWave 4D-Imaging Radar Sensors. EUSIPCO 2023: 31st European Signal Processing Conference . Helsinki, Finland 04 - 08 Sep 2023 IEEE. https://doi.org/10.23919/EUSIPCO58844.2023.10290050
Waveform Design for 4D-Imaging mmWave PMCW MIMO Radars with Spectrum Compatibility
Sichani, N. K., Alaee-Kerahroodi, M., Shankar, M. R. B., Mehrshahi, E. and Ghorashi, S. 2023. Waveform Design for 4D-Imaging mmWave PMCW MIMO Radars with Spectrum Compatibility. European Radar Conference 2023. Berlin, Germany. 20 - 22 Sep 2023 IEEE. https://doi.org/10.23919/EuRAD58043.2023.10289319
CSI-Based Human Activity Recognition Using Multi-Input Multi-Output Autoencoder and Fine-Tuning
Chahoushi, M., Nabati, M., Asvadi, R. and Ghorashi, S. 2023. CSI-Based Human Activity Recognition Using Multi-Input Multi-Output Autoencoder and Fine-Tuning. Sensors. 23 (7), p. 3591. https://doi.org/10.3390/s23073591
On the economic impact of information security announcements: an event study analysis
Ford, A. 2023. On the economic impact of information security announcements: an event study analysis. Prof Doc Thesis University of East London School of Architecture, Computing and Engineering https://doi.org/10.15123/uel.8vy57
A real-time fingerprint-based indoor positioning using deep learning and preceding states
Nabati, M. and Ghorashi, S. 2023. A real-time fingerprint-based indoor positioning using deep learning and preceding states. Expert Systems with Applications. 213 (Art. 118889). https://doi.org/10.1016/j.eswa.2022.118889
European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report
Davidson, J., Aiken, M., Phillips, K. and Farr, R. 2022. European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report. London, United Kingdom Institute for Connected Communities, University of East London.
Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems
Alwan, A., Brimicombe, A., Ciupala, A., Ghorashi, S., Baravalle, A. and Falcarin, P. 2022. Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems. Computer Networks. 218 (Art. 109384). https://doi.org/10.1016/j.comnet.2022.109384
Confidence interval estimation for fingerprint-based indoor localization
Nabati, M., Ghorashi, S. and Shahbazian, R. 2022. Confidence interval estimation for fingerprint-based indoor localization. Ad Hoc Networks. 134 (Art. 102877). https://doi.org/10.1016/j.adhoc.2022.102877
JGPR: a computationally efficient multi-target Gaussian process regression algorithm
Nabati, M., Ghorashi, S. A. and Shahbazian, R. 2022. JGPR: a computationally efficient multi-target Gaussian process regression algorithm. Machine Learning. 111, pp. 1987-2010. https://doi.org/10.1007/s10994-022-06170-3
Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies
Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S. and Aiken, M. P. 2022. Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences. 2 (2), pp. 379-398. https://doi.org/10.3390/forensicsci2020028
A Machine Learning Framework for House Price Estimation
Awonaike, A., Ghorashi, S. and Hammad, R. 2022. A Machine Learning Framework for House Price Estimation. 21st International Conference on Intelligent Systems Design and Applications (ISDA 2021). Online 13 - 15 Dec 2021 Springer. https://doi.org/10.1007/978-3-030-96308-8_90
Research on Protection of Minors: A literature Review and Interconnected Frameworks Implications for VSP Regulation and Beyond
Davidson, J., Aiken, M., Gekoski, A., Phillips, K. and Farr, R. 2021. Research on Protection of Minors: A literature Review and Interconnected Frameworks Implications for VSP Regulation and Beyond. London Institute of Connected Communities, University of East London for Ofcom.
CSI-Based Human Activity Recognition using Convolutional Neural Networks
Fard Moshiri, P., Nabati, M., Shahbazian, R. and Ghorashi, S. 2021. CSI-Based Human Activity Recognition using Convolutional Neural Networks. 11th International Conference on Computer and Knowledge Engineering (ICCKE 2021). Ferdowsi University of Mashhad, Mashhad, Iran 28 - 29 Oct 2021 IEEE. https://doi.org/10.1109/ICCKE54056.2021.9721516
Data quality challenges in large-scale cyber-physical systems: A systematic review
Alwan, A., Ciupala, A., Brimicombe, A., Ghorashi, S., Baravalle, A. and Falcarin, P. 2021. Data quality challenges in large-scale cyber-physical systems: A systematic review. Information Systems. 105 (Art. 101951). https://doi.org/10.1016/j.is.2021.101951
The Impact of Data Breach Announcements on Company Value in European Markets
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of Data Breach Announcements on Company Value in European Markets. WEIS 2021: The 20th Annual Workshop on the Economics of Information Security. 28 - 29 Jun 2021
The Impact of GDPR Infringement Fines on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of GDPR Infringement Fines on the Market Value of Firms. ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security. 24 - 25 Jun 2021 Academic Conferences International (ACI). https://doi.org/10.34190/EWS.21.088
A CSI-Based Human Activity Recognition Using Deep Learning
Fard Moshiri, P., Shahbazian, R., Nabati, M. and Ghorashi, S. A. 2021. A CSI-Based Human Activity Recognition Using Deep Learning. Sensors. https://doi.org/10.3390/s21217225
Reconfigurable Linear Antenna Arrays for Beam-Pattern Matching in Collocated MIMO Radars
Kavousi Ghafi, E., Ghorashi, S. and Mehrshahi, E. 2021. Reconfigurable Linear Antenna Arrays for Beam-Pattern Matching in Collocated MIMO Radars. IEEE Transactions on Aerospace and Electronic Systems. 57 (5), pp. 2715-2724. https://doi.org/10.1109/TAES.2021.3062173
Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation
Navidan, H., Fard Moshiri, P., Nabati, M., Shahbazian, R., Ghorashi, S., Shah-Mansouri, V. and Windridge, D. 2021. Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation. Computer Networks. 194 (Art. 108149). https://doi.org/10.1016/j.comnet.2021.108149
Joint Coordinate Optimization in Fingerprint-Based Indoor Positioning
Nabati, M., Ghorashi, S. and Shahbazian, R. 2021. Joint Coordinate Optimization in Fingerprint-Based Indoor Positioning. IEEE Communications Letters. 25 (4), pp. 1192-1195. https://doi.org/10.1109/LCOMM.2020.3047352
Safer technology, safer users: The UK as a world-leader in Safety Tech
Donaldson, S., Davidson, J. and Aiken, M. 2020. Safer technology, safer users: The UK as a world-leader in Safety Tech. Perspective Economics for Department for Digital, Culture, Media & Sport.
Exploring Policing and Industry Practice in the Prevention of Online Child Sexual Abuse
Davidson, J., Schimmenti, A., Caretti, V., Puccia, A., Corbari, E., Bogaerts, S., Schilder, J. D., Scally, M., Bifulco, A. and DeMarco, J. N. 2020. Exploring Policing and Industry Practice in the Prevention of Online Child Sexual Abuse. in: Bryce, I. and Petherick, W. (ed.) Child Sexual Abuse: Forensic Issues in Evidence, Impact, and Management Academic Press. pp. 657-677
A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine
Ezzati Khatab, Z., Hajihoseini Gazestani, A., Ghorashi, S. and Ghavami, M. 2020. A fingerprint technique for indoor localization using autoencoder based semi-supervised deep extreme learning machine. Signal Processing. 181 (Art. 107915). https://doi.org/10.1016/j.sigpro.2020.107915
Joint Optimization of Power and Location in Full-Duplex UAV Enabled Systems
Gazestani A. H., Ghorashi, S. A., Yang, Z. and Shikh-Bahaei, M. 2020. Joint Optimization of Power and Location in Full-Duplex UAV Enabled Systems. IEEE Systems Journal. 16 (1), pp. 914-921. https://doi.org/10.1109/JSYST.2020.3036275
Fingerprinting Based Indoor Localization Considering the Dynamic Nature of Wi-Fi Signals
Alikhani, N., Moghtadaiee, V. and Ghorashi, S. 2020. Fingerprinting Based Indoor Localization Considering the Dynamic Nature of Wi-Fi Signals. Wireless Personal Communications. 115 (2), pp. 1445-1464. https://doi.org/10.1007/s11277-020-07636-0
Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks
Hajihoseini Gazestani, A., Ghorashi, S. A., Yang, Z. and Shikh-Bahaei, M 2020. Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks. IEEE Transactions on Mobile Computing. 21 (3), pp. 1049-1060. https://doi.org/10.1109/TMC.2020.3017137
Privacy preserving in indoor fingerprint localization and radio map expansion
Ghorashi, S. A., Sazdar, A. M., Alikhani, N. and Khonsari, A. 2020. Privacy preserving in indoor fingerprint localization and radio map expansion. Peer-to-Peer Networking and Applications. 14, p. 121–134. https://doi.org/10.1007/s12083-020-00950-1
A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Sazdar, A. M., Ghorashi, S. A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53 (Art. 102515). https://doi.org/10.1016/j.jisa.2020.102515
Using Synthetic Data to Enhance the Accuracy of Fingerprint-Based Localization: A Deep Learning Approach
Nabati, M., Navidan, H., Shahbazian, R., Ghorashi, S. A. and Windridge, D. 2020. Using Synthetic Data to Enhance the Accuracy of Fingerprint-Based Localization: A Deep Learning Approach. IEEE Sensors Letters. 4 (Art. 6000204). https://doi.org/10.1109/LSENS.2020.2971555
Power Allocation for D2D Communications Using Max-Min Message-Passing Algorithm
Kazemi Rashed, S, Asvadi, R., Rajabi, S., Ghorashi, S. A. and Martini, M. G. 2020. Power Allocation for D2D Communications Using Max-Min Message-Passing Algorithm. IEEE Transactions on Vehicular Technology. 69 (8), pp. 8443-8458. https://doi.org/10.1109/TVT.2020.2995534
Throughput Improvement by Mode Selection in Hybrid Duplex Wireless Networks
Mousavinasab, B., Gazestani, A. H., Ghorashi, S. A. and Shikh-Bahaei, M. 2020. Throughput Improvement by Mode Selection in Hybrid Duplex Wireless Networks. Wireless Networks. 26, p. 3687–3699. https://doi.org/10.1007/s11276-020-02286-3
Researching the Affects That Online Pornography Has on U.K. Adolescents Aged 11 to 16
Martellozzo, E., Monaghan, A., Davidson, J. and Adler, J. 2020. Researching the Affects That Online Pornography Has on U.K. Adolescents Aged 11 to 16. SAGE Open. 10 (1). https://doi.org/10.1177/2158244019899462
Adult Online Hate, Harassment and Abuse: A rapid evidence assessment
Davidson, J., Livingstone, S., Jenkins, S., Gekoski, A., Choak, C., Ike,T. and Phillips, K. 2019. Adult Online Hate, Harassment and Abuse: A rapid evidence assessment. UK Council for Child Internet Safety (UKCCIS).
Child Online Protection in Rwanda
Davidson, J., Kidron, B. and Phillips, K. 2019. Child Online Protection in Rwanda. 5Rights Foundation.
New Reconstructed Database for Cost Reduction in Indoor Fingerprinting Localization
Moghatdaiee, V., Ghorashi, S. and Ghavami, G. 2019. New Reconstructed Database for Cost Reduction in Indoor Fingerprinting Localization. IEEE Access. 7, pp. 104462-104477. https://doi.org/10.1109/ACCESS.2019.2932024
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Ebenuwa, S., Sharif, S., Al-Nemrat, A., Al-Bayatti, A. H., Alalwan, N., Alzahrani, A. I. and Alfarraj, O. 2019. Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry. 11 (Art. 1504). https://doi.org/10.3390/sym11121504
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666. https://doi.org/10.1109/ACCESS.2019.2899578
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse
Horvath, Miranda A. H., Davidson, J., Grove-Hills, Julie, Gekoski, Anna and Choak, Clare 2014. It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse. London, UK Office of the Children's Commissioner.
The development of specialist support services for young people who have offended and who have also been victims of crime, abuse and/or violence: final report
Porteous, David, Adler, Joanna R. and Davidson, J. 2015. The development of specialist support services for young people who have offended and who have also been victims of crime, abuse and/or violence: final report. London MOPAC.
Child online protection in the MENA region
Patrick, Burton, Monica, Bulger, Davidson, J., Ali, Mariya, Davison, Patrick, Day, Emma, DeMarco, Jeffrey, Rasul, Majida, Razai, Sara, Scally, Mia and Wex, Bronwyn 2016. Child online protection in the MENA region. Centre for Justice and Crime Prevention.
"I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people
Martellozzo, Elena, Monaghan, Andrew, Adler, Joanna R., Davidson, J., Leyva, Rodolfo and Horvath, Miranda A. H. 2016. "I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people. Middlesex University, NSPCC, OCC. https://doi.org/10.6084/m9.figshare.3382393
Child Sexual Abuse: Media Representations and Government Reactions
Davidson, J. 2008. Child Sexual Abuse: Media Representations and Government Reactions. London, UK Routledge-Cavendish.
Protecting children online: towards a safer internet
Davidson, J. and Martellozzo, Elena 2008. Protecting children online: towards a safer internet. in: Letherby, Gayle, Williams, Kate, Birch, Philip and Cain, Maureen E. (ed.) Sex as Crime? Willan Publishing. pp. 338-355
Internet Sex Offenders: Individual Autonomy, 'Folk Devils' and State Control
Martellozzo, Elena and Davidson, J. 2009. Internet Sex Offenders: Individual Autonomy, 'Folk Devils' and State Control. in: Day Sclater, Shelley, Ebtehaj, Fatemeh, Jackson, Emily and Richards, Martin (ed.) Regulating autonomy: sex, reproduction and family Oxford, UK Hart Publishing. pp. 129-146
Online groomers: Profiling, policing and prevention
Davidson, J. and Gottschalk, Petter 2009. Online groomers: Profiling, policing and prevention. Lyme Regis, UK Russell House.
Urbanization and Security: Moving Forward, Key Themes, and Challenges
Davidson, J. and Martellozzo, Elena 2009. Urbanization and Security: Moving Forward, Key Themes, and Challenges. in: Cordner, Gary, Cordner, AnnMarie and Das, Dilip K. (ed.) Urbanization, Policing and Security: Global Perspectives CRC Press. pp. 435-440
Legislation and Policy: Protecting Young People, Sentencing and Managing Internet Sex Offenders
Davidson, J. 2011. Legislation and Policy: Protecting Young People, Sentencing and Managing Internet Sex Offenders. in: Davidson, Julia and Gottschalk, Petter (ed.) Internet Child Abuse: Current Research and Policy Abingdon, U.K. Routledge-Cavendish. pp. 8-26
Online offending behaviour and child victimisation: new findings and policy
Webster, Stephen, Davidson, J. and Bifulco, Antonia 2015. Online offending behaviour and child victimisation: new findings and policy. Basingstoke, Hampshire Palgrave Macmillan.
International perspectives on child victimisation
Davidson, J. and Hamerton, Christopher 2018. International perspectives on child victimisation. London, UK Routledge.
Victims Speak: Comparing Child Sexual Abusers’ and Child Victims’ Accounts, Perceptions, and Interpretations of Sexual Abuse
Davidson, J. 2006. Victims Speak: Comparing Child Sexual Abusers’ and Child Victims’ Accounts, Perceptions, and Interpretations of Sexual Abuse. Victims & Offenders. 1 (2), pp. 159-174. https://doi.org/10.1080/15564880600626114
Child victims of sexual abuse: Children's experience of the investigative process in the criminal justice system
Davidson, J., Bifulco, Antonia, Thomas, Geraldine and Ramsay, Margaret 2006. Child victims of sexual abuse: Children's experience of the investigative process in the criminal justice system. Practice. 18 (4), pp. 247-263. https://doi.org/10.1080/09503150601025253
Digital forensics in law enforcement: the case of online victimisation of children
Davidson, J. and Gottschalk, Petter 2008. Digital forensics in law enforcement: the case of online victimisation of children. Electronic Government. 5 (4), pp. 445-451. https://doi.org/10.1504/EG.2008.019526
Protecting vulnerable young people in cyberspace from sexual abuse: raising awareness and responding globally
Davidson, J. and Martellozzo, Elena 2008. Protecting vulnerable young people in cyberspace from sexual abuse: raising awareness and responding globally. Police Practice and Research. 9 (4), pp. 277-289. https://doi.org/10.1080/15614260802349965
Investigating police practice in the UK: achieving best evidence in work with young victims of abuse
Davidson, J. and Bifulco, Antonia 2009. Investigating police practice in the UK: achieving best evidence in work with young victims of abuse. Pakistan Journal of Criminology. 1 (3), pp. 19-46.
Characteristics of the Internet for criminal child sexual abuse by online groomers
Davidson, J. and Gottschalk, Petter 2011. Characteristics of the Internet for criminal child sexual abuse by online groomers. Criminal Justice Studies. 24 (1), pp. 23-36. https://doi.org/10.1080/1478601X.2011.544188
Exploring Young People's Use of Social Networking Sites and Digital Media in the Internet Safety Context
Davidson, J. and Martellozzo, Elena 2012. Exploring Young People's Use of Social Networking Sites and Digital Media in the Internet Safety Context. Information, Communication & Society. 16 (9), pp. 1456-1476. https://doi.org/10.1080/1369118X.2012.701655
The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions
Bergen, Emilia, Davidson, J., Schulz, Anja, Schuhmann, Petya, Johansson, Ada, Santtila, Pekka and Jern, Patrick 2014. The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions. Victims & Offenders. 9 (3), pp. 276-298. https://doi.org/10.1080/15564886.2013.873750
Cyber safety for adolescent girls: bullying, harassment, sexting, pornography, and solicitation
Smith, Peter K., Thompson, Fran and Davidson, J. 2014. Cyber safety for adolescent girls: bullying, harassment, sexting, pornography, and solicitation. Current Opinion in Obstetrics and Gynecology. 26 (5), pp. 360-365. https://doi.org/10.1097/GCO.0000000000000106
The effectiveness and impact of the child protection and criminal justice systems in cases of intrafamilial child sexual abuse
Gekoski, Anna, Horvath, Miranda A.H and Davidson, J. 2016. The effectiveness and impact of the child protection and criminal justice systems in cases of intrafamilial child sexual abuse. Journal of Criminological Research, Policy and Practice. 2 (1), pp. 54-66. https://doi.org/10.1108/JCRPP-06-2015-0023
EU online child safety: what does the literature say?
DeMarco, Jeffrey, Davidson, J., Bifulco, Antonia, Scally, Mia, Cheevers, Carly, Schimmenti, Adriano, Caretti, Vincenzo, Puccia, Angelo, Corbari, Elisa, Schilder, Janneke and Bogaerts, Stefan 2016. EU online child safety: what does the literature say? Crimen et Delictum: International Journal of Criminological and Investigative Sciences. 11 (1), pp. 1-19.
Evaluation of CEOP ThinkUKnow internet safety programme and exploration of young people's internet safety knowledge.
Davidson, J., Martellozzo, Elena and Lorenz, Mia 2009. Evaluation of CEOP ThinkUKnow internet safety programme and exploration of young people's internet safety knowledge. Centre for Abuse & Trauma Studies and Kingston University.
Child abuse & child protection: Contemporary issues in research, policy & practice
Davidson, J. and Bifulco, Antonia 2018. Child abuse & child protection: Contemporary issues in research, policy & practice. Routledge.
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment
Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32. https://doi.org/10.1007/s10844-013-0300-5
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
Intelligent Detection of MAC Spoofing Attack in 802.11 Network
Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking Association for Computing Machinery (ACM).
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3) 2017. London, UK 18 - 20 Jan 2017 Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_10
Digital dangers and cyber-victimisation: a study of European adolescent online risky behaviour for sexual exploitation
DeMarco, Jeffrey, Cheevers, Carly, Davidson, Julia, Bogaerts, Stefan, Pace, Ugo, Aiken, Mary, Caretti, Vincenzo, Schimmenti, Adriano and Bifulco, Antonia 2017. Digital dangers and cyber-victimisation: a study of European adolescent online risky behaviour for sexual exploitation. Clinical Neuropsychiatry. 14 (1), pp. 104-112.
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
Enhancing police and industry practice
Davidson, Julia, DeMarco, Jeffrey, Bifulco, Antonia, Bogaerts, Stefan, Caretti, Vincenzo, Aiken, Mary, Chevers, Carly, Corbari, Elisa, Scally, Mia, Schimmenti, Adriano and Puccia, Angelo 2016. Enhancing police and industry practice. Middlesex University.
Youth pathways into cybercrime
Aiken, M., Davidson, J. and Amann, Philippe 2016. Youth pathways into cybercrime. Paladin Capital Group.
The prevalence, nature, and impact of intrafamilial child sexual abuse: findings from a rapid evidence assessment
Gekoski, Anna, Davidson, J. and Horvath, Miranda A. H. 2016. The prevalence, nature, and impact of intrafamilial child sexual abuse: findings from a rapid evidence assessment. Journal of Criminological Research, Policy and Practice. 2 (4), pp. 231-243. https://doi.org/10.1108/JCRPP-05-2016-0008
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Statistical Sampling Approach to Investigate Child Pornography Cases
Sarantinos, N., Al-Nemrat, A. and Naeem, U. 2013. Statistical Sampling Approach to Investigate Child Pornography Cases. 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC). Sydney NSW, Australia 21 - 22 Nov 2013 IEEE. https://doi.org/10.1109/CTC.2013.14