Research Interests

Following on from the research undertaken as part of her first mini project, her PhD will investigate to what extent we can apply social network analysis techniques to various types of communication data in order to identify influential players within a network. This in turn will allow us to identify any potential insiders within an organisation by highlighting those individuals that have greater influence than their role entails and the results can be combined with other indicators obtain from other means, including both technical and psychological metrics. The end result will be an expansion of the tool support created as part of the mini project, which will allow users to navigate their way through a communication network and highlight individuals of interest.

A full summary of my research can be seen here.

Mini Projects:

As part of my course, I conducted two Mini Projects. The first was entitled Applying Social Network Analysis to Security and the second is designed to Designing a cybersecurity curriculum for South Africa.

Previous Work:

During my time as a Research intern for Oxford University's Cyber Security Group, my initial work was to explore the effects of PII propogation across cyberspace. During this work, we were able to highlight the ease ar which we can use previously obtained PII to establish new PII with varying degrees of accuracy and ease. The work culmilated with the creation of a Data Reachability Model (DRM) that highlights all inferences possible at a particular moment in time as well as a tool that allows the user to decide which data points they will attempt to achieve first as well as the likely success rate of that inference.

My Masters project involved redefining the currently existing "accuracy" and "ease" dimension and splitting these dimensions into 8 dimensions to help reflect the complexity of performing such a transformation. These additional sub-dimensions allowed us to clearly express the difficulty criteria and also allowed us to create personalised profiles for analysts depending on their ability and resources available. This was combined with further development of the tool support to allow for a more personalised use.

During the summer of 2013, I joined the newly developed Cyber Security Capacity Building Centre held at the Oxford Martin School. The work involved creating the initial scoping work for Dimensions 3 and 5 which involved conducting research into currently existing technological standards in Cybersecurity across developed and developing Countries (including Computer Emergency Response Teams) as well as investigating current Cyber Security Educational techniques used in order to improve the Cyber Literacy of nation's citizens and industries.

For further information, see my CV and my academic transcript.

Published Papers:

  1. Extracting Social Structure from Metadata on Dark Web Forums
    Elizabeth Phillips, Jason R.C. Nurse, Michael Goldsmith and Sadie Creese
    In The Fifth International Conference on Social Media Technologies, Communication, and Informatics (SOTICS '15) SOTICS 2015
  2. Applying Social Network Analysis to Security
    Elizabeth Phillips, Jason R.C. Nurse, Michael Goldsmith and Sadie Creese
    In International Conference on Cyber Security for Sustainable Society
    Details Bibtex Pdf
    Also appears in WiCyS 2015. Pdf
  3. The Information Assurance / Information Security Career Framework:- The case for a global skills framework for IT security practitioners based upon SFIA.
    Elizabeth Phillips, Paul D Jagger and Christopher Jagger
    In BCS Learning and Development
  4. Computer Security Incident Response Teams (CSIRTs): An Overview
    Maria Bada, Sadie Creese, Michael Goldsmith, Chris Mitchell and Elizabeth Phillips
    In Global Cyber Security Capacity Centre - Cybersecurity Capacity Portal
    Pdf Website article
  5. A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks
    Sadie Creese, Michael Goldsmith, Jason R.C. Nurse and Elizabeth Phillips
    11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)
    Details Bibtex Pdf