Private Data Harvesting on Alexa using Third-Party Skills

Abstract We are currently seeing an increase in the use of voice assistants which are used for various purposes. These assistants have a wide range of inbuilt functionalities with the possibility of installing third-party applications. In this work, we will focus on analyzing and identifying vulnerabilities that are introduced by these third-party applications. In particular, […]

BY Erisa Karafili

Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment

Abstract: Small and medium-sized enterprises (SMEs) rarely conduct a thorough cyber-risk assessment and they may face various internal issues when attempting to set up cyber-risk strategies. In this work, we apply a user-journey approach to model human behavior and visually map SMEs’ practices and threats, along with a visualization of the socio-technical actor-network, targeted specifically […]

BY Costas Boletsis, Ragnhild Halvorsrud, J Brian Pickering, Stephen Phillips and Mike Surridge

It’s Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness

Abstract: Small and medium enterprises (SMEs) make up a significant part of European economies. They are often described as poorly place to deal with cyber risks though because of resource constraints or commercial interests. Providing appropriate tooling would facilitate a greater appreciation of the risks and provide mitigation strategies. In a series of workshops demonstrating […]

BY J Brian Pickering, Konstantinos Boletsis, Ragnhild Halvorsrud, Stephen Phillips and Mike Surridge
Next Page »