Jobs

Call for applications for PhD studentships in Cyber Security (2020 entry) – University of Kent

The Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) at the University of Kent is calling for applications for three batches of PhD studentships (2+3+20). Five of these studentships will be funded by the University of Kent fully. There are up to 20 more studentships for all academics of the...
Read More
External Events

Automotive Cyber Resilience: Operationalizing, Standards and Research

Presenting the work of AESIN and the UK Automotive Council and Zenzic, supported by Queens University Belfast, University of South Wales, University of Edinburgh and the Turing Institute and with further support from BSI, this series of workshops is designed to: Present and discuss the limitations with existing standards in...
Read More
RISCS Roundup: October 2019
News

RISCS Roundup: October 2019

Welcome to the October edition of the RISCS Roundup. This is our new monthly online update which will showcase the latest activity from across all RISCS Projects. RISCS has been a hive of activity over the summer months. Head over to the RISCS website to see our new pages on Events and...
Read More
RISCS Phase 1 Projects
RISCS Projects

RISCS Phase 1 Projects

Read More
RISCS Phase 2 Projects
RISCS Projects

RISCS Phase 2 Projects

The following projects are part of RISCS phase 2. Click on a project title to see further information. ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks PI: Professor Shujun Li, University of Kent April 2017 -February 2020 cSALSA: Cyber Security Across the Lifespan PI: Professor Adam...
Read More
Motivating Jenny to Write Secure Software
Projects

Motivating Jenny to Write Secure Software

Many real-world security vulnerabilities in software relate to a few known classes of attack such as code injection. Secure coding practices and technologies for detecting and preventing vulnerabilities in software are likewise established, such as input sanitisation and non-escaping strings. However, it is not clear why many professional software developers...
Read More
1 Reply
Why Johnny Doesn’t Write Secure Software: Secure software development by the masses
Projects

Why Johnny Doesn’t Write Secure Software: Secure software development by the masses

Developing software is no longer the domain of the select few with deep technical skills, training and knowledge. A wide range of people from diverse backgrounds are developing software for smart phones, websites and IoT devices used by millions of people. Johnny is our psuedonym for such a developer. Currently,...
Read More
1 Reply
Leveraging the Multi-Stakeholder Nature of Cyber Security
Projects

Leveraging the Multi-Stakeholder Nature of Cyber Security

Cyber Security (CyS) is a challenging, distributed, multi-stakeholder problem. It is distributed in the sense that the expertise to comprehensively assess the level of security of a given IT system is commonly not all available in one location; e.g. detail on the IT components within a company is available within...
Read More
1 Reply
ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience
Projects

ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience

PI: Professor Madeline Carr, UCL and Professor Siraj Shaikh, Coventry University The quality of a state’s capacity to respond to the challenges of cyber security is rapidly coming to be recognised as an important element of global competitiveness. This project seeks to understand the challenges faced by the UK’s policy...
Read More
DAPM: Detecting and Preventing Mass Marketing Fraud
Projects

DAPM: Detecting and Preventing Mass Marketing Fraud

PI: Professor Monica Whitty, University of Warwick The DAPM project will develop novel techniques to detect and prevent online mass marketing fraud (MMF), a major and growing problem that generates significant social anxiety and psychological impact. DAPM will establish new foundations for: Detecting assumed identities and persuasive messaging used by...
Read More
1 Reply
ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks
Projects

ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks

PI: Professor Shujun Li, University of Kent Researchers and practitioners have acknowledged human-related risks among the most important factors in cybersecurity, e.g. an IBM report (2014) shows that over 95% of security incidents involved "human errors". Responses to human-related cyber risks remain undermined by a conceptual problem: the mindset associated...
Read More
1 Reply
Cyber Crime Projects
RISCS Projects

Cyber Crime Projects

In 2018 RISCS expanded its interdisciplinary research community to develop further collaboration between the social sciences and cyber security professions. This was complemented by development of a new cyber crime-focused research programme, commissioned by the Home Office, via funding from the National Cyber Security Programme. The research programme comprises both...
Read More
Jobs

Opportunities at University at Albany (New York State)

Please find below details of posts currently being advertised at the University at Albany Professor, Cybersecurity (Open Rank) Professor, Informatics (Open Rank) Professor, Homeland Security (Open Rank)  
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing why software fails and who is to blame, or why a piece of software is flawed and how to prevent such faults in the future. Errors are examined in the...
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and although business organization research recognized this a long time ago, in Software Engineering research, we have not. As a result, thirty years of research on motivation in software engineering has...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there are many papers written about motivation in software engineering, the field lacks a comprehensive overview of the area. In particular, several models of motivation have been proposed, but they either...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in the midst of everyday practice, and developers are commonly understood to form theories and strategies for dealing with them. Errors in this sense are not bugs left behind in software,...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society increase. In public services to support the vulnerable, such as welfare, monitoring and surveillance functionality is often regarded by system designers as important components in defences against fraud and system...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities required to analyze digital personas and provide investigators with clues to the identity of the individual or group hiding behind one or more personas. Date: April 2013 Published: Computer (Volume: 46, Issue: 4,...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important  for  a  range  of  purposes,  from  open-source intelligence  applications  to  forming  semantic  web  connections. Yet  replication  of  research  in  this  area  is  hampered  by  the  lack of  access  to  ground-truth ...
Read More
1 2 3 11

Jobs

Call for applications for PhD studentships in Cyber Security (2020 entry) – University of Kent

The Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) at the University of Kent is calling for applications for three...
Read More
External Events

Automotive Cyber Resilience: Operationalizing, Standards and Research

Presenting the work of AESIN and the UK Automotive Council and Zenzic, supported by Queens University Belfast, University of South...
Read More
RISCS Roundup: October 2019
News

RISCS Roundup: October 2019

Welcome to the October edition of the RISCS Roundup. This is our new monthly online update which will showcase the...
Read More
RISCS Phase 1 Projects
RISCS Projects

RISCS Phase 1 Projects

Read More
RISCS Phase 2 Projects
RISCS Projects

RISCS Phase 2 Projects

The following projects are part of RISCS phase 2. Click on a project title to see further information. ACCEPT: Addressing Cybersecurity...
Read More
Motivating Jenny to Write Secure Software
Projects

Motivating Jenny to Write Secure Software

Many real-world security vulnerabilities in software relate to a few known classes of attack such as code injection. Secure coding...
Read More
1 Reply
Why Johnny Doesn’t Write Secure Software: Secure software development by the masses
Projects

Why Johnny Doesn’t Write Secure Software: Secure software development by the masses

Developing software is no longer the domain of the select few with deep technical skills, training and knowledge. A wide...
Read More
1 Reply
Leveraging the Multi-Stakeholder Nature of Cyber Security
Projects

Leveraging the Multi-Stakeholder Nature of Cyber Security

Cyber Security (CyS) is a challenging, distributed, multi-stakeholder problem. It is distributed in the sense that the expertise to comprehensively...
Read More
1 Reply
ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience
Projects

ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience

PI: Professor Madeline Carr, UCL and Professor Siraj Shaikh, Coventry University The quality of a state’s capacity to respond to...
Read More
DAPM: Detecting and Preventing Mass Marketing Fraud
Projects

DAPM: Detecting and Preventing Mass Marketing Fraud

PI: Professor Monica Whitty, University of Warwick The DAPM project will develop novel techniques to detect and prevent online mass...
Read More
1 Reply
ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks
Projects

ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks

PI: Professor Shujun Li, University of Kent Researchers and practitioners have acknowledged human-related risks among the most important factors in...
Read More
1 Reply
Cyber Crime Projects
RISCS Projects

Cyber Crime Projects

In 2018 RISCS expanded its interdisciplinary research community to develop further collaboration between the social sciences and cyber security professions....
Read More
Jobs

Opportunities at University at Albany (New York State)

Please find below details of posts currently being advertised at the University at Albany Professor, Cybersecurity (Open Rank) Professor, Informatics...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing...
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important ...
Read More
1 2 3 11

Jobs

Call for applications for PhD studentships in Cyber Security (2020 entry) – University of Kent

The Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) at the University of Kent is calling for applications for three...
Read More
External Events

Automotive Cyber Resilience: Operationalizing, Standards and Research

Presenting the work of AESIN and the UK Automotive Council and Zenzic, supported by Queens University Belfast, University of South...
Read More
RISCS Roundup: October 2019
News

RISCS Roundup: October 2019

Welcome to the October edition of the RISCS Roundup. This is our new monthly online update which will showcase the...
Read More
RISCS Phase 1 Projects
RISCS Projects

RISCS Phase 1 Projects

Read More
RISCS Phase 2 Projects
RISCS Projects

RISCS Phase 2 Projects

The following projects are part of RISCS phase 2. Click on a project title to see further information. ACCEPT: Addressing Cybersecurity...
Read More
Motivating Jenny to Write Secure Software
Projects

Motivating Jenny to Write Secure Software

Many real-world security vulnerabilities in software relate to a few known classes of attack such as code injection. Secure coding...
Read More
1 Reply
Why Johnny Doesn’t Write Secure Software: Secure software development by the masses
Projects

Why Johnny Doesn’t Write Secure Software: Secure software development by the masses

Developing software is no longer the domain of the select few with deep technical skills, training and knowledge. A wide...
Read More
1 Reply
Leveraging the Multi-Stakeholder Nature of Cyber Security
Projects

Leveraging the Multi-Stakeholder Nature of Cyber Security

Cyber Security (CyS) is a challenging, distributed, multi-stakeholder problem. It is distributed in the sense that the expertise to comprehensively...
Read More
1 Reply
ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience
Projects

ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience

PI: Professor Madeline Carr, UCL and Professor Siraj Shaikh, Coventry University The quality of a state’s capacity to respond to...
Read More
DAPM: Detecting and Preventing Mass Marketing Fraud
Projects

DAPM: Detecting and Preventing Mass Marketing Fraud

PI: Professor Monica Whitty, University of Warwick The DAPM project will develop novel techniques to detect and prevent online mass...
Read More
1 Reply
ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks
Projects

ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks

PI: Professor Shujun Li, University of Kent Researchers and practitioners have acknowledged human-related risks among the most important factors in...
Read More
1 Reply
Cyber Crime Projects
RISCS Projects

Cyber Crime Projects

In 2018 RISCS expanded its interdisciplinary research community to develop further collaboration between the social sciences and cyber security professions....
Read More
Jobs

Opportunities at University at Albany (New York State)

Please find below details of posts currently being advertised at the University at Albany Professor, Cybersecurity (Open Rank) Professor, Informatics...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing...
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important ...
Read More
1 2 3 11

Jobs

Call for applications for PhD studentships in Cyber Security (2020 entry) – University of Kent

The Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) at the University of Kent is calling for applications for three...
Read More
External Events

Automotive Cyber Resilience: Operationalizing, Standards and Research

Presenting the work of AESIN and the UK Automotive Council and Zenzic, supported by Queens University Belfast, University of South...
Read More
RISCS Roundup: October 2019
News

RISCS Roundup: October 2019

Welcome to the October edition of the RISCS Roundup. This is our new monthly online update which will showcase the...
Read More
RISCS Phase 1 Projects
RISCS Projects

RISCS Phase 1 Projects

Read More
RISCS Phase 2 Projects
RISCS Projects

RISCS Phase 2 Projects

The following projects are part of RISCS phase 2. Click on a project title to see further information. ACCEPT: Addressing Cybersecurity...
Read More
Motivating Jenny to Write Secure Software
Projects

Motivating Jenny to Write Secure Software

Many real-world security vulnerabilities in software relate to a few known classes of attack such as code injection. Secure coding...
Read More
1 Reply
Why Johnny Doesn’t Write Secure Software: Secure software development by the masses
Projects

Why Johnny Doesn’t Write Secure Software: Secure software development by the masses

Developing software is no longer the domain of the select few with deep technical skills, training and knowledge. A wide...
Read More
1 Reply
Leveraging the Multi-Stakeholder Nature of Cyber Security
Projects

Leveraging the Multi-Stakeholder Nature of Cyber Security

Cyber Security (CyS) is a challenging, distributed, multi-stakeholder problem. It is distributed in the sense that the expertise to comprehensively...
Read More
1 Reply
ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience
Projects

ECSEPA: Evaluating Cyber Security Evidence for a Policy Audience

PI: Professor Madeline Carr, UCL and Professor Siraj Shaikh, Coventry University The quality of a state’s capacity to respond to...
Read More
DAPM: Detecting and Preventing Mass Marketing Fraud
Projects

DAPM: Detecting and Preventing Mass Marketing Fraud

PI: Professor Monica Whitty, University of Warwick The DAPM project will develop novel techniques to detect and prevent online mass...
Read More
1 Reply
ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks
Projects

ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks

PI: Professor Shujun Li, University of Kent Researchers and practitioners have acknowledged human-related risks among the most important factors in...
Read More
1 Reply
Cyber Crime Projects
RISCS Projects

Cyber Crime Projects

In 2018 RISCS expanded its interdisciplinary research community to develop further collaboration between the social sciences and cyber security professions....
Read More
Jobs

Opportunities at University at Albany (New York State)

Please find below details of posts currently being advertised at the University at Albany Professor, Cybersecurity (Open Rank) Professor, Informatics...
Read More
Publications

Error Detection and Recovery in Software Development

Abstract Software rarely works as intended when it is first written. Software engineering research has long been concerned with assessing...
Read More
Publications

Motivated software engineers are engaged and focused, while satisfied ones are happy

César França, Helen Sharp, Fabio Q. B. da Silva Abstract Context – Motivation and job satisfaction are not the same thing, and...
Read More
Publications

Models of motivation in software engineering

Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson Abstract Motivation in software engineering is recognized as a key success factor for software projects, but although there...
Read More
Publications

Examining Active Error in Software Development

Tamara Lopez, Marian Petre, Bashar Nuseibeh Abstract Software rarely works as intended while it is being written. Things go wrong in...
Read More
Publications

Watching You Watching Me: The Art of Playing the Panopticon

Lizzie Coles-Kemp, Alf Zugenmaier, Makayla Lewis Abstract As governments increasingly deliver services over the Internet, the opportunities for monitoring and surveillance of society...
Read More
Publications

Who Am I? Analyzing Digital Personas in Cybercrime Investigations

Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood and James Walkerdine ABSTRACT The Isis toolkit offers the sophisticated capabilities...
Read More
Publications

Sampling Labelled Profile Data for Identity Resolution

  Matthew Edwards, Stephen Wattam, Paul Rayson and Awais Rashid Abstract Identity  resolution  capability  for  social  networking profiles  is  important ...
Read More
1 2 3 11