RISCS Project Catalogue

The RISCS Project Catalogue is a key publication intended to be a succinct summary of all completed and ongoing projects. It is developed and maintained by the RISCS Policy Adviser, and as such it is tailored for a policy audience. Nonetheless, the content will be of relevance to industry, academic, and general-interest readers.

 

You can download the most recent version of the Catalogue here.

UK Cyber Security Policy Making Interactive Map

This interactive map attempts to represent how cyber security is organised within the UK Government. It consists approximately 2400 nodes representing data points, along with 2000 active links out to websites.

 

You can find out more and access the map here.

Featured Publications

New edition of the RISCS Project Catalogue

We are pleased to share with you the December 2021 version of the RISCS Project Catalogue, as well as the accompanying Catalogue Annexe, consisting of a list of publications resulting from the listed projects. The RISCS project catalogue is intended to be a succinct...

RISCS Anticipation and Futures Literacy – Policy Workshop Report

RISCS held an online policy workshop on 14th July 2021 with 20 participants from Government, academia, and the wider community as part of the RISCS Anticipation theme led by Fellow Professor Genevieve Liveley. The aim of this session was to generate ideas for the...

Optimising the use of UK Government survey data on cyber security – new publication and competition

The Research Institute for Sociotechnical Cyber Security (RISCS) held an online policy workshop on 22nd July 2021 with 28 participants from Government, academia, law enforcement and the cyber sector as part of the Quantification and Cyber Risk Fellowship theme led by...

New publication: Remote Working and (In)Security

We are pleased to release a new RISCS briefing exploring the impact of the COVID-19 pandemic on cyber security of organisations, created as part of the RISCS Fellowship in Leadership and Culture. Remote Working and (In)SecurityDownload Already in March 2020, it was...

Cybersecurity Investment Decision-Making: Best Practice Guide for SMEs

A new publication to guide Small and Medium-sized Enterprises (SMEs) has been published as an outcome of a RISCS-funded project Economic Metrics for Supporting Cyber Security Investment Decision-Making. There are 6 million Small and Medium-Sized Enterprises (SMEs) in...

Annual Report & Project Catalogue 2020

We have recently launched our RISCS Annual Report for 2020 and our first project catalogue. You can take a look a both documents by following this link: https://www.riscs.org.uk/riscs-annual-report-and-project-catalogue/

Remote Working and Cyber Security – Literature Review

While various research strands have started exploring the impact of remote working on employees’ mental health and productivity, there is little insight on how approaches to cyber risk and resilience have been impacted through the shift. Our research objectives focus...

Emerging Insights: Cyber Security Incentives and the Role of Cyber Insurance

Flo Greatrix, RISCS Policy Impact Officer A new report by James Sullivan (RUSI) and Jason Nurse (University of Kent) has been recently published as part of their RISCS Funded project: ‘Incentivising cybersecurity through cyber insurance’. It considers the...

New RISCS Policy briefing: a framework to assess evidence quality in cyber security policy making

We are thrilled to share our new policy briefing based on the Evaluating Cyber Security Evidence for Policy Advice” (ECSEPA) project led by Professor Madeline Carr (UCL) and Professor Siraj Shaikh (Coventry University). Civil servants across the UK Government are...

Cyber Insurance and Risk Management: Challenges and Opportunities

UCL gates in March 2020 A new playground for underwriters? Corporate boards the world over are scrambling to address the unique challenges of the COVID-19 global pandemic – particularly the impact of social distancing. In addition to the obvious problems this causes...

All Publications

A Formal Model for Soft Enforcement: Influencing the Decision-Maker

Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad van Moorsel Abstract We propose in this paper a formal model for soft enforcement, where a decision-maker is influenced towards a decision, rather than forced to select that decision. This novel type of enforcement...

A Tactile Visual Library To Support User Experience Storytelling

Makayla Lewis and Lizzie Coles-Kemp Abstract This paper presents an adult visual narrative stimulus (tactile visual library) that supports the reduction of physical distance between the user-centred design practitioner (maker of the visual narrative artefact) and the...

A Year is a Short Time in Cyber-Space

Date: June 2014Published: Industry & Parliament Trust Report: Cyber Security 2.0: Reflections on UK/EU Cyber-Security Co-OperationPublisher: Industry and Parliament TrustPublisher URL: http://www.ipt.org.ukFull Text:...

Adding Insult to Injury

Jennett, Charlene; Brostoff, Sacha; Malheiros, Miguel; Sasse, M. Angela Abstract: To inspire confidence in consumer credit and improve outcomes for consumers, negative experiences such as being denied credit must be handled appropriately. We conducted an online survey...

Addressing Consumerisation of IT Risks with Nudging

Iryna Yevseyeva, James Turland, Charles Morisset, Lynne Coventry, Thomas Gross, Christopher Laing, Aad van Moorsel Abstract In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities...

An Anatomy of Security Conversations in Stack Overflow

Abstract As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important societal concern. This paper examines how secure coding practice...

Barriers to Usable Security? Three Organizational Case Studies

Deanna D. Caputo, Shari Lawrence Pfleeger and M. Angela Sasse Abstract Usable security assumes that when security functions are more usable, people are more likely to use them, leading to an improvement in overall security. Existing software design and engineering...

Captchat: A Messaging Tool to Frustrate Ubiquitous Surveillance

Paul Dunphy, Johannes Schöning, James Nicholson, Patrick Olivier Abstract There is currently a widespread uncertainty regarding the ability of citizens to control privacy online in the face of ubiquitous surveillance. This is a huge and complex societal problem....

Comparing Decision Support Approaches for Cyber Security Investment

Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi Abstract When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security...

Cybersecurity Games and Investments: A Decision Support Approach

Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi Abstract In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly interested in examining cases where the organization suffers from an...