Featured Projects

Current Projects

Filter the current projects by Research Theme

Cyber Security Cartographies

Games and Abstraction: The Science of Cyber Security

ChAISe: Choice Architecture for Information Security

Productive Security: Improving security compliance and productivity through measurement

EMPHASIS: the Economical, Psychological and Societal Impact of Ransomware

Victims of Computer Misuse Crime

Online Ties Taking Over? (OTTO) – A longitudinal study into actual vs perceived cybercriminal behaviour of offline vs online social ties among youth

Understanding, Preventing and Responding to Cybercrime: Investigative interviewing of cybercrime victims to gain best evidence

Gentle Interventions for Security (GIFS)

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

Connecting delayed pre-commitment with cyber awareness in order to address the perception gap and present bias

Case by Case: Building a database on Cybercriminal Business Models

AMoC: Advanced Modelling of Cyber Criminal Careers – New technology and intelligence from online evidence bases

You Get Where You’re Looking for: the Impact of Information Sources on Code Security

Visualising Access Control Policies

cSALSA: Cyber Security Across the Life Span

UK Cybersecurity Policy Map

Leveraging the Multi-Stakeholder Nature of Cyber Security

Motivating Jenny to Write Secure Software

Why Johnny Doesn’t Write Secure Software: Secure software development by the masses

Coming soon…

Keeping the Internet of Things Secure: Investigating Incentives for ISPs and Individuals in the UK and Japan

MERIT: a fraMEwoRk to model and IncenTivise cyber security investment decisions

Social Machines

Incentivising Cybersecurity through Cyber Insurance

Economic Metrics for Supporting Cyber Security Investment Decision-Making

DAPM: Detecting and Preventing Mass Marketing Fraud

CR4B: Cyber Readiness for Boards

ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary Approach to Reducing Human-related Risks

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

Case by Case: Building a database on Cybercriminal Business Models

Connecting Delayed Pre-commitment with Cyber Awareness to Address the Perception Gap and Bias