Social Cybersecurity

"Puppet" flickr photo by MorkiRo https://flickr.com/photos/b3ni/2674595981 shared under a Creative Commons (BY-NC-ND) license

“Puppet” flickr photo by MorkiRo https://flickr.com/photos/b3ni/2674595981 shared under a Creative Commons (BY-NC-ND) license

Our research interests in social cybersecurity are on the intersection between cybersecurity and cyber psychology.

We are particularly interested in identity, hacking, cognitive biases and decision making, risk and social engineering.

Contacts: John McAlaney, Shamal Faily, Jacqui Taylor

Projects: Group processes & social identities within online hacking communities

Related Publications

  • T. Skinner, J. Taylor, J. Dale, and J. McAlaney, “The Development of Intervention E-Learning Materials and Implementation Techniques for Cyber-Security Behaviour Change,” in Convention of the Study of Artificial Intelligence and Simulation of Behaviour (AISB), 2018, p. 29–34.
    [Bibtex]
    @inproceedings{stdm18,
    author = {Tiffany Skinner and Jacqui Taylor and John Dale and John McAlaney},
    booktitle = {{Convention of the Study of Artificial Intelligence and Simulation of Behaviour (AISB)}},
    title = {{The Development of Intervention E-Learning Materials and Implementation Techniques for Cyber-Security Behaviour Change}},
    publisher = {AISB},
    pages = {29--34},
    year = {2018}}
  • H. Thackray and J. McAlaney, “Groups Online: Hacktivism and Social Protest,” in Psychological and Behavioural Examinations in Cybersecurity, J. McAlaney, L. A. Frumkin, and V. Benson, Eds., IGI-Global, 2018, p. 98–108.
    [Bibtex]
    @incollection{thmc18,
    author = {Helen Thackray and John McAlaney},
    booktitle = {{Psychological and Behavioural Examinations in Cybersecurity}},
    editor = {John McAlaney and Lara A. Frumkin and Vladlena Benson},
    title = {{Groups Online: Hacktivism and Social Protest}},
    publisher = {IGI-Global},
    pages = {98--108},
    year = {2018}}
  • J. Taylor, H. Thackray, S. E. Hodge, and J. McAlaney, “Introducing Psychological Concepts and Methods to Cybersecurity Students,” in Psychological and Behavioural Examinations in Cybersecurity, J. McAlaney, L. A. Frumkin, and V. Benson, Eds., IGI-Global, 2018, p. 98–108.
    [Bibtex]
    @incollection{tthm18,
    author = {Jacqui Taylor and Helen Thackray and Sarah E. Hodge and John McAlaney},
    booktitle = {{Psychological and Behavioural Examinations in Cybersecurity}},
    editor = {John McAlaney and Lara A. Frumkin and Vladlena Benson},
    title = {{Introducing Psychological Concepts and Methods to Cybersecurity Students}},
    publisher = {IGI-Global},
    pages = {98--108},
    year = {2018}}
  • J. McAlanaey, H. Thackray, J. Taylor, C. Richardson, and H. Dogan, “Motivations, Group Processes and Decision Making of Hackers and Hacktivists,” in Symposium on Cyber Security, Foreign and Commonwealth Office, 2017.
    [Bibtex]
    @incollection{mttrd17,
    author = {J. McAlanaey and H. Thackray and J. Taylor and C. Richardson and H. Dogan},
    booktitle = {{Symposium on Cyber Security}},
    title = {{Motivations, Group Processes and Decision Making of Hackers and Hacktivists}},
    publisher = {Foreign and Commonwealth Office},
    year = {2017}}
  • J. McAlanaey, J. Taylor, S. Hodge, H. Thackray, S. James, and J. Dale, “Incorporating Psychology into Cyber Security Education,” in Proceedings of the International Workshop on Realigning Cyber Security Education, Australian Defence Force Academy, 2017.
    [Bibtex]
    @incollection{mthtjd17,
    author = {J. McAlanaey and J. Taylor and S. Hodge and H. Thackray and S. James and J. Dale},
    booktitle = {{Proceedings of the International Workshop on Realigning Cyber Security Education}},
    title = {{Incorporating Psychology into Cyber Security Education}},
    publisher = {Australian Defence Force Academy},
    year = {2017}}
  • H. Thackray, C. Richardson, H. Dogan, J. Taylor, and J. McAlaney, “Surveying the Hackers: The Challenges of Data Collection from a Secluded Community,” in Proceedings of 16th European Conference on Cyber Warfare and Security, 2017, p. 745–748.
    [Bibtex]
    @inproceedings{thrd17,
    Author = {Helen Thackray and Chris Richardson and Huseyin Dogan and Jacqui Taylor and John McAlaney},
    Booktitle = {{Proceedings of 16th European Conference on Cyber Warfare and Security}},
    Title = {{Surveying the Hackers: The Challenges of Data Collection from a Secluded Community}},
    Pages = {745--748},
    Year = {2017}}
  • A. M’manga, “Designing Systems for Risk Based Decision Making,” in British HCI 2017 Doctoral Consortium, 2017.
    [Bibtex]
    @inproceedings{mman17,
    Author = {Andrew M'manga},
    Booktitle = {{British HCI 2017 Doctoral Consortium}},
    Title = {{Designing Systems for Risk Based Decision Making}},
    Year = {2017}}
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk,” in Proceedings of the 3rd Workshop on Security Information Workers, 2017.
    [Bibtex]
    @inproceedings{mfmw17,
    Author = {Andrew M'manga and Shamal Faily and John McAlaney and Christopher Williams},
    Booktitle = {{Proceedings of the 3rd Workshop on Security Information Workers}},
    Publisher = {USENIX Association},
    Title = {{Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk}},
    Year = {2017}}
  • J. Taylor, G. Ollis, J. McAlaney, and H. Thackray, “Observations and Reflections on Teaching Psychological Principle and Methods to Cybersecurity Students,” in Proceedings of the National Conference for Learning and Teaching in Cyber Security, 2017.
    [Bibtex]
    @inproceedings{tomh17,
    Author = {Jacqui Taylor and Gail Ollis and John McAlaney and Helen Thackray},
    Booktitle = {{Proceedings of the National Conference for Learning and Teaching in Cyber Security}},
    Title = {{Observations and Reflections on Teaching Psychological Principle and Methods to Cybersecurity Students}},
    Year = {2017}}
  • J. Taylor, J. McAlaney, S. Hodge, H. Thackray, C. Richardson, S. James, and J. Dale, “Teaching psychological principles to cybersecurity students,” in Proceedings of the IEEE Global Engineering Education Conference, 2017, p. 1782–1789.
    [Bibtex]
    @inproceedings{tmht17,
    Author = {Jacqui Taylor and John McAlaney and Sarah Hodge and Helen Thackray and Chris Richardson and Susie James and John Dale},
    Booktitle = {{Proceedings of the IEEE Global Engineering Education Conference}},
    Pages = {1782--1789},
    Publisher = {IEEE},
    Title = {Teaching Psychological Principles to Cybersecurity Students},
    Year = {2017}}
  • M. Favale, N. McDonald, S. Faily, and C. Gatzidis, “Human aspects in digital rights management: the perspectives of content developers,” SCRIPTed, vol. 13, iss. 3, p. 289–304, 2016.
    [Bibtex]
    @article{famf161,
    Author = {Marcelle Favale and Neil McDonald and Shamal Faily and Christos Gatzidis},
    Journal = {{SCRIPTed}},
    Number = {3},
    Pages = {289--304},
    Title = {Human Aspects in Digital Rights Management: The Perspectives of Content Developers},
    Volume = {13},
    Year = {2016}}
  • J. McAlaney, H. Thackray, and J. Taylor, “The social psychology of cybersecurity,” The psychologist, vol. 29, p. 686–689, 2016.
    [Bibtex]
    @article{mtht16,
    Author = {John McAlaney and Helen Thackray and Jacqui Taylor},
    Journal = {The Psychologist},
    Pages = {686--689},
    Title = {The social psychology of cybersecurity},
    Volume = {29},
    Year = {2016}}
  • [PDF] H. Thackray, J. McAlaney, H. Dogan, J. Taylor, and C. Richardson, “Social Psychology: An under-used tool in Cybersecurity,” in Proceedings of the 30th British HCI Group Annual Conference on People and Security: Fusion, 2016.
    [Bibtex]
    @inproceedings{tmht16,
    Author = {Helen Thackray and John McAlaney and Huseyin Dogan and Jacqui Taylor and Christopher Richardson},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Security: Fusion}},
    Publisher = {BCS},
    Title = {{Social Psychology: An under-used tool in Cybersecurity}},
    Year = {2016}}
  • [PDF] S. Faily, J. McAlaney, and C. Iacob, “Ethical Dilemmas and Dimensions in Penetration Testing,” in Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), 2015, p. 233–242.
    [Bibtex]
    @inproceedings{fami15,
    Author = {Shamal Faily and John McAlaney and Claudia Iacob},
    Booktitle = {{Proceedings of the 9th International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2015)}},
    Pages = {233--242},
    Publisher = {University of Plymouth},
    Title = {{Ethical Dilemmas and Dimensions in Penetration Testing}},
    Year = {2015}}
  • [PDF] J. McAlaney, J. Taylor, and S. Faily, “The social psychology of cybersecurity,” in Proceedings of the 1st International Conference on Cyber Security for Sustainable Society, 2015.
    [Bibtex]
    @inproceedings{mctf15,
    Author = {John McAlaney and Jacqui Taylor and Shamal Faily},
    Booktitle = {{Proceedings of the 1st International Conference on Cyber Security for Sustainable Society}},
    Note = {To Appear},
    Publisher = {Working Papers of the SSN+},
    Title = {The Social Psychology of Cybersecurity},
    Year = {2015}}
  • [PDF] S. Faily and I. Fléchais, “A Model of Security Culture for e-Science,” in Proceedings of the south african information security multi-conference (saismc 2010), 2010, p. 154–164.
    [Bibtex]
    @inproceedings{fafl104,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Booktitle = {Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)},
    Pages = {154--164},
    Publisher = {University of Plymouth},
    Title = {{A Model of Security Culture for e-Science}},
    Year = {2010}}
  • [PDF] S. Faily and I. Fléchais, “Designing and Aligning e-Science Security Culture with Design,” Information management and computer security, vol. 18, iss. 5, p. 339–349, 2010.
    [Bibtex]
    @article{fafl1010,
    Author = {Shamal Faily and Ivan Fl\'{e}chais},
    Journal = {Information Management and Computer Security},
    Number = {5},
    Pages = {339--349},
    Title = {{Designing and Aligning e-Science Security Culture with Design}},
    Volume = {18},
    Year = {2010}}