Events External Events

SASIG: Fighting Cybercrime (Tuesday 8th October)

SASIG are delighted to present a trilogy of events this October on cybercrime. We start the week off with a workshop that looks at the UK’s growing and evolving capability to counter cybercrime at the national, regional and local levels. The fundamental nature of criminality in the digital age is...
Read More
Events External Events

ISG Smart Card and IoT Security Centre (SCC) Open-Day

The ISG Smart Card and IoT Security Centre (SCC) Open-Day will take place on Wednesday 28th August 2019. This will mark the 17th anniversary of the Centre. This year, the event will be held in memory of Mike Walker, who set up the Smart Card Centre in 2002. The event...
Read More
Calls External Calls

2019 E4J Initiative Grant Programme for Higher Education Institutions (deadline: 31 August 2019)

The Education for Justice (E4J) initiative is delighted to announce an exceptional opportunity for professors, lecturers and academics teaching at Higher Education Institutions – the 2019 E4J Initiative Grant Programme for Higher Education Institutions. As an innovative initiative, E4J is designed to support educators teaching the next generation to better...
Read More
Calls External Calls

ESRC Standing Group on Organised Crime Call for Papers – Special issue

The Role of State and Non-State Actors in Enabling and Disabling Cybercrime: Complementary, competitive, coherent? Cybercrime is understood as ‘criminal acts committed using electronic communications networks and information systems or against networks and systems’ (European Commission, 2007: 2). Ranging from offences such as identity theft to distributing illegal content to...
Read More
Events

Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Autumn Showcase Event

The RITICS 2019 Autumn Showcase will present cyber security research and activities from the Research Institute in Trustworthy Inter-connected Cyber-physical Systems. The event is free to attend and open to those working in academia, industry and government with an interest in cyber security and cyber physical security. The event is...
Read More
Jobs

Policy Adviser x 2 – Cyber Security for ‘Smart’ Products (DCMS)

Policy Adviser x 2 - Cyber Security for 'Smart' Products Job description The DCMS is looking for two exceptional policy advisers to join the Secure by Design team, which is part of the Cyber Security & Data Policy directorate. The roles provide an incredible opportunity to shape the future of the...
Read More
Jobs

PETRAS Impact Champion

UCL Department / Division: Science, Technology, Engineering and Public Policy Location of position: London Hours: Full Time (Job share considered) Salary (inclusive of London allowance): £43,844 - £51,769 per annum Duties and Responsibilities The PETRAS National Centre of Excellence for IoT Systems Cybersecurity (PETRAS NCE) is a strategic initiative funded...
Read More
Jobs

Research Fellow (University of Surrey)

The Department of Computer Science at the University of Surrey is looking for a post-doctoral researcher to study compositional verification of secure systems as a part of the 18.5 month NCSC-funded project “FaCT: Faithful Composition of Trust”. We would be grateful if you could get us in touch with someone...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing why software fails and who is to blame, or why a piece of software is flawed and how to prevent such faults in the future. Errors are examined in the...
Read More
Past Events

Cyber Liability and Cyber Insurance April 2019

RISCS Community Meeting - April 2019
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and although business organization research recognized this a long time ago, in Software Engineering research, we have not. As a result, thirty years of research on motivation in software engineering has...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there are many papers written about motivation in software engineering, the field lacks a comprehensive overview of the area. In particular, several models of motivation have been proposed, but they either...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in the midst of everyday practice, and developers are commonly understood to form theories and strategies for dealing with them. Errors in this sense are not bugs left behind in software,...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society increase. In public services to support the vulnerable, such as welfare, monitoring and surveillance functionality is often regarded by system designers as important components in defences against fraud and system...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities required to analyze digital personas and provide investigators with clues to the identity of the individual or group hiding behind one or more personas. Date: April 2013 Published: Computer (Volume: 46, Issue: 4,...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important  for  a  range  of  purposes,  from  open-source intelligence  applications  to  forming  semantic  web  connections. Yet  replication  of  research  in  this  area  is  hampered  by  the  lack of  access  to  ground-truth ...
Read More
Blog People

IoT security failures as product defect: the coming wave of strict liability: Robert Carolina

Victims of defective products are not required to demonstrate the “fault” of a product manufacturer. It’s enough to demonstrate the existence of a defect in the product that causes harm. Under European laws, “a product is defective when it does not provide the safety which a person is entitled to...
Read More
Blog Current Projects News

Cyber Readiness for Boards: Experts to support global companies against cyber threats

The Cyber Readiness for Boards project, which is jointly funded by the National Cyber Security Centre and the Lloyd’s Register Foundation, has launched to explore the factors shaping UK board decisions around cyber risk and develop interventions to provide guidance and support. https://www.ucl.ac.uk/news/2019/mar/experts-support-global-companies-against-cyber-threats
Read More
1 Reply
Publications

Uncertainty & Complexity in the Internet of Things: Analysis of the IoT Smart Family Workshop

On May 24, 2018, RISCS held a workshop in London that looked at highly complex decision-making. It followed on from the previous day’s look at the utility of cyber security metrics. On Day 2, we asked, “What happens when levels of complexity and uncertainty go beyond the capabilities of cyber...
Read More
Meeting reports Publications

Cyber Metrics: Getting the conversation straight between technical and non-technical actors

On May 23, 2018, RISCS held a workshop in London that looked at the utility of cyber security metrics. The purpose of the workshop was to develop a deeper understanding of the ways in which cyber security metrics are used in decision-making more generally, and also to raise questions about...
Read More
1 2 3 10

Events External Events

SASIG: Fighting Cybercrime (Tuesday 8th October)

SASIG are delighted to present a trilogy of events this October on cybercrime. We start the week off with a...
Read More
Events External Events

ISG Smart Card and IoT Security Centre (SCC) Open-Day

The ISG Smart Card and IoT Security Centre (SCC) Open-Day will take place on Wednesday 28th August 2019. This will...
Read More
Calls External Calls

2019 E4J Initiative Grant Programme for Higher Education Institutions (deadline: 31 August 2019)

The Education for Justice (E4J) initiative is delighted to announce an exceptional opportunity for professors, lecturers and academics teaching at...
Read More
Calls External Calls

ESRC Standing Group on Organised Crime Call for Papers – Special issue

The Role of State and Non-State Actors in Enabling and Disabling Cybercrime: Complementary, competitive, coherent? Cybercrime is understood as ‘criminal...
Read More
Events

Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Autumn Showcase Event

The RITICS 2019 Autumn Showcase will present cyber security research and activities from the Research Institute in Trustworthy Inter-connected Cyber-physical...
Read More
Jobs

Policy Adviser x 2 – Cyber Security for ‘Smart’ Products (DCMS)

Policy Adviser x 2 - Cyber Security for 'Smart' Products Job description The DCMS is looking for two exceptional policy advisers...
Read More
Jobs

PETRAS Impact Champion

UCL Department / Division: Science, Technology, Engineering and Public Policy Location of position: London Hours: Full Time (Job share considered)...
Read More
Jobs

Research Fellow (University of Surrey)

The Department of Computer Science at the University of Surrey is looking for a post-doctoral researcher to study compositional verification...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing...
Read More
Past Events

Cyber Liability and Cyber Insurance April 2019

RISCS Community Meeting - April 2019
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important ...
Read More
Blog People

IoT security failures as product defect: the coming wave of strict liability: Robert Carolina

Victims of defective products are not required to demonstrate the “fault” of a product manufacturer. It’s enough to demonstrate the...
Read More
Blog Current Projects News

Cyber Readiness for Boards: Experts to support global companies against cyber threats

The Cyber Readiness for Boards project, which is jointly funded by the National Cyber Security Centre and the Lloyd’s Register...
Read More
1 Reply
Publications

Uncertainty & Complexity in the Internet of Things: Analysis of the IoT Smart Family Workshop

On May 24, 2018, RISCS held a workshop in London that looked at highly complex decision-making. It followed on from...
Read More
Meeting reports Publications

Cyber Metrics: Getting the conversation straight between technical and non-technical actors

On May 23, 2018, RISCS held a workshop in London that looked at the utility of cyber security metrics. The...
Read More
1 2 3 10

Events External Events

SASIG: Fighting Cybercrime (Tuesday 8th October)

SASIG are delighted to present a trilogy of events this October on cybercrime. We start the week off with a...
Read More
Events External Events

ISG Smart Card and IoT Security Centre (SCC) Open-Day

The ISG Smart Card and IoT Security Centre (SCC) Open-Day will take place on Wednesday 28th August 2019. This will...
Read More
Calls External Calls

2019 E4J Initiative Grant Programme for Higher Education Institutions (deadline: 31 August 2019)

The Education for Justice (E4J) initiative is delighted to announce an exceptional opportunity for professors, lecturers and academics teaching at...
Read More
Calls External Calls

ESRC Standing Group on Organised Crime Call for Papers – Special issue

The Role of State and Non-State Actors in Enabling and Disabling Cybercrime: Complementary, competitive, coherent? Cybercrime is understood as ‘criminal...
Read More
Events

Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Autumn Showcase Event

The RITICS 2019 Autumn Showcase will present cyber security research and activities from the Research Institute in Trustworthy Inter-connected Cyber-physical...
Read More
Jobs

Policy Adviser x 2 – Cyber Security for ‘Smart’ Products (DCMS)

Policy Adviser x 2 - Cyber Security for 'Smart' Products Job description The DCMS is looking for two exceptional policy advisers...
Read More
Jobs

PETRAS Impact Champion

UCL Department / Division: Science, Technology, Engineering and Public Policy Location of position: London Hours: Full Time (Job share considered)...
Read More
Jobs

Research Fellow (University of Surrey)

The Department of Computer Science at the University of Surrey is looking for a post-doctoral researcher to study compositional verification...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing...
Read More
Past Events

Cyber Liability and Cyber Insurance April 2019

RISCS Community Meeting - April 2019
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important ...
Read More
Blog People

IoT security failures as product defect: the coming wave of strict liability: Robert Carolina

Victims of defective products are not required to demonstrate the “fault” of a product manufacturer. It’s enough to demonstrate the...
Read More
Blog Current Projects News

Cyber Readiness for Boards: Experts to support global companies against cyber threats

The Cyber Readiness for Boards project, which is jointly funded by the National Cyber Security Centre and the Lloyd’s Register...
Read More
1 Reply
Publications

Uncertainty & Complexity in the Internet of Things: Analysis of the IoT Smart Family Workshop

On May 24, 2018, RISCS held a workshop in London that looked at highly complex decision-making. It followed on from...
Read More
Meeting reports Publications

Cyber Metrics: Getting the conversation straight between technical and non-technical actors

On May 23, 2018, RISCS held a workshop in London that looked at the utility of cyber security metrics. The...
Read More
1 2 3 10

Events External Events

SASIG: Fighting Cybercrime (Tuesday 8th October)

SASIG are delighted to present a trilogy of events this October on cybercrime. We start the week off with a...
Read More
Events External Events

ISG Smart Card and IoT Security Centre (SCC) Open-Day

The ISG Smart Card and IoT Security Centre (SCC) Open-Day will take place on Wednesday 28th August 2019. This will...
Read More
Calls External Calls

2019 E4J Initiative Grant Programme for Higher Education Institutions (deadline: 31 August 2019)

The Education for Justice (E4J) initiative is delighted to announce an exceptional opportunity for professors, lecturers and academics teaching at...
Read More
Calls External Calls

ESRC Standing Group on Organised Crime Call for Papers – Special issue

The Role of State and Non-State Actors in Enabling and Disabling Cybercrime: Complementary, competitive, coherent? Cybercrime is understood as ‘criminal...
Read More
Events

Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Autumn Showcase Event

The RITICS 2019 Autumn Showcase will present cyber security research and activities from the Research Institute in Trustworthy Inter-connected Cyber-physical...
Read More
Jobs

Policy Adviser x 2 – Cyber Security for ‘Smart’ Products (DCMS)

Policy Adviser x 2 - Cyber Security for 'Smart' Products Job description The DCMS is looking for two exceptional policy advisers...
Read More
Jobs

PETRAS Impact Champion

UCL Department / Division: Science, Technology, Engineering and Public Policy Location of position: London Hours: Full Time (Job share considered)...
Read More
Jobs

Research Fellow (University of Surrey)

The Department of Computer Science at the University of Surrey is looking for a post-doctoral researcher to study compositional verification...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing...
Read More
Past Events

Cyber Liability and Cyber Insurance April 2019

RISCS Community Meeting - April 2019
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important ...
Read More
Blog People

IoT security failures as product defect: the coming wave of strict liability: Robert Carolina

Victims of defective products are not required to demonstrate the “fault” of a product manufacturer. It’s enough to demonstrate the...
Read More
Blog Current Projects News

Cyber Readiness for Boards: Experts to support global companies against cyber threats

The Cyber Readiness for Boards project, which is jointly funded by the National Cyber Security Centre and the Lloyd’s Register...
Read More
1 Reply
Publications

Uncertainty & Complexity in the Internet of Things: Analysis of the IoT Smart Family Workshop

On May 24, 2018, RISCS held a workshop in London that looked at highly complex decision-making. It followed on from...
Read More
Meeting reports Publications

Cyber Metrics: Getting the conversation straight between technical and non-technical actors

On May 23, 2018, RISCS held a workshop in London that looked at the utility of cyber security metrics. The...
Read More
1 2 3 10