scispace - formally typeset
Search or ask a question
Author

Lizzie Coles-Kemp

Bio: Lizzie Coles-Kemp is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Information security & Security through obscurity. The author has an hindex of 13, co-authored 52 publications receiving 542 citations. Previous affiliations of Lizzie Coles-Kemp include Edith Cowan University & University of London.


Papers
More filters
Book ChapterDOI
04 Jun 2012
TL;DR: A security ceremony expands a security protocol with everything that is considered out of band for it, and incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks.
Abstract: A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.

49 citations

Proceedings ArticleDOI
21 Apr 2018
TL;DR: Key findings show that the mobile phone offers security for individuals and a safe space for newcomers to establish a new life in a new land as well as capitalising on other spaces of safety, such as maintaining old ties.
Abstract: Framed within the theoretical lens of positive and negative security, this paper presents a study of newcomers to Sweden and the roles of mobile phones in the establishment of a new life. Using creative engagement methods through a series of workshops, two researchers engaged 70 adult participants enrolled into further education colleges in Sweden. Group narratives about mobile phone use were captured in creative outputs, researcher observations and notes and were analysed using thematic analysis. Key findings show that the mobile phone offers security for individuals and a safe space for newcomers to establish a new life in a new land as well as capitalising on other spaces of safety, such as maintaining old ties. This usage produces a series of threats and vulnerabilities beyond traditional technological security thinking related to mobile phone use. The paper concludes with recommendations for policies and support strategies for those working with newcomers.

48 citations

Book ChapterDOI
01 Jan 2010
TL;DR: The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.
Abstract: The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

42 citations

Journal ArticleDOI
TL;DR: This article briefly outlines some of the areas of research where sociotechnical studies might contribute to information security management.

41 citations

Proceedings ArticleDOI
02 May 2019
TL;DR: A study of mobile phone use by people settling in a new land to access state provided digital services shows that digital literacy and access to technology are not the only resources needed to successfully access digital services and do not guarantee a straightforward resettlement process.
Abstract: This paper presents a study of mobile phone use by people settling in a new land to access state provided digital services. It shows that digital literacy and access to technology are not the only resources and capabilities needed to successfully access digital services and do not guarantee a straightforward resettlement process. Using creative engagement methods, the research involved 132 "newcomers" seeking to settle in Sweden. Ribot and Peluso's theory of access (2003) was employed to examine the complex web of access experienced by our participants. We uncover that when communities are dealing with high levels of precarity, their primary concerns are related to accessing the benefits of a service, rather than controlling access. Broadening the HCI framework, the paper concludes that a sociotechnical model of access needs to connect access control and access benefit to facilitate the design of an effective digital service.

37 citations


Cited by
More filters
Journal Article
TL;DR: Thaler and Sunstein this paper described a general explanation of and advocacy for libertarian paternalism, a term coined by the authors in earlier publications, as a general approach to how leaders, systems, organizations, and governments can nudge people to do the things the nudgers want and need done for the betterment of the nudgees, or of society.
Abstract: NUDGE: IMPROVING DECISIONS ABOUT HEALTH, WEALTH, AND HAPPINESS by Richard H. Thaler and Cass R. Sunstein Penguin Books, 2009, 312 pp, ISBN 978-0-14-311526-7This book is best described formally as a general explanation of and advocacy for libertarian paternalism, a term coined by the authors in earlier publications. Informally, it is about how leaders, systems, organizations, and governments can nudge people to do the things the nudgers want and need done for the betterment of the nudgees, or of society. It is paternalism in the sense that "it is legitimate for choice architects to try to influence people's behavior in order to make their lives longer, healthier, and better", (p. 5) It is libertarian in that "people should be free to do what they like - and to opt out of undesirable arrangements if they want to do so", (p. 5) The built-in possibility of opting out or making a different choice preserves freedom of choice even though people's behavior has been influenced by the nature of the presentation of the information or by the structure of the decisionmaking system. I had never heard of libertarian paternalism before reading this book, and I now find it fascinating.Written for a general audience, this book contains mostly social and behavioral science theory and models, but there is considerable discussion of structure and process that has roots in mathematical and quantitative modeling. One of the main applications of this social system is economic choice in investing, selecting and purchasing products and services, systems of taxes, banking (mortgages, borrowing, savings), and retirement systems. Other quantitative social choice systems discussed include environmental effects, health care plans, gambling, and organ donations. Softer issues that are also subject to a nudge-based approach are marriage, education, eating, drinking, smoking, influence, spread of information, and politics. There is something in this book for everyone.The basis for this libertarian paternalism concept is in the social theory called "science of choice", the study of the design and implementation of influence systems on various kinds of people. The terms Econs and Humans, are used to refer to people with either considerable or little rational decision-making talent, respectively. The various libertarian paternalism concepts and systems presented are tested and compared in light of these two types of people. Two foundational issues that this book has in common with another book, Network of Echoes: Imitation, Innovation and Invisible Leaders, that was also reviewed for this issue of the Journal are that 1 ) there are two modes of thinking (or components of the brain) - an automatic (intuitive) process and a reflective (rational) process and 2) the need for conformity and the desire for imitation are powerful forces in human behavior. …

3,435 citations

01 Jan 2003
TL;DR: Shove as discussed by the authors investigated the evolution of these changes, as well as the social meaning of the practices themselves, concluding that routine consumption is controlled by conceptions of normality and profoundly shaped by cultural and economic forces, and that habits are not just changing, but are changing in ways that imply escalating and standardizing patterns of consumption.
Abstract: Over the past few generations, expectations of comfort, cleanliness and convenience have altered radically, but these dramatic changes have largely gone unnoticed. This intriguing book brings together the sociology of consumption and technology to investigate the evolution of these changes, as well the social meaning of the practices themselves. Homes, offices, domestic appliances and clothes play a crucial role in our lives, but not many of us question exactly how and why we perform so many daily rituals associated with them. Showers, heating, air-conditioning and clothes washing are simply accepted as part of our normal, everyday lives, but clearly this was not always the case. When did the daily shower become de rigueur? What effect has air conditioning had on the siesta at one time an integral part of Mediterranean life and culture? This book interrogates the meaning and supposed normality of these practices and draws disturbing conclusions. There is clear evidence supporting the view that routine consumption is controlled by conceptions of normality and profoundly shaped by cultural and economic forces. Shove maintains that habits are not just changing, but are changing in ways that imply escalating and standardizing patterns of consumption. This shrewd and engrossing analysis shows just how far the social meanings and practices of comfort, cleanliness and convenience have eluded us.

1,198 citations

Journal ArticleDOI
TL;DR: This paper aims to provide an overview of four emerging unobtrusive and wearable technologies, which are essential to the realization of pervasive health information acquisition, including: 1) unobTrusive sensing methods, 2) smart textile technology, 3) flexible-stretchable-printable electronics, and 4) sensor fusion.
Abstract: The aging population, prevalence of chronic diseases, and outbreaks of infectious diseases are some of the major challenges of our present-day society. To address these unmet healthcare needs, especially for the early prediction and treatment of major diseases, health informatics, which deals with the acquisition, transmission, processing, storage, retrieval, and use of health information, has emerged as an active area of interdisciplinary research. In particular, acquisition of health-related information by unobtrusive sensing and wearable technologies is considered as a cornerstone in health informatics. Sensors can be weaved or integrated into clothing, accessories, and the living environment, such that health information can be acquired seamlessly and pervasively in daily living. Sensors can even be designed as stick-on electronic tattoos or directly printed onto human skin to enable long-term health monitoring. This paper aims to provide an overview of four emerging unobtrusive and wearable technologies, which are essential to the realization of pervasive health information acquisition, including: 1) unobtrusive sensing methods, 2) smart textile technology, 3) flexible-stretchable-printable electronics, and 4) sensor fusion, and then to identify some future directions of research.

647 citations