Guest Seminar Series
2019/20 Guest Seminar Series:
Title: Responses to Cyber-Enabled Scams and Fears of Cybercrime: Rethinking the Standard Models
Abstract: Government strategies have involved adapting counter-terrorism models to all serious and organised crime, including cyber-enabled crimes. Based on research over the last decade, the aim is to re-examine public policing and public-private partnership policing to consider what may be required to ‘satisfice’ victimisation, repeat victimisation, and fear of cyber scams.
Wednesday 29th April 2020 - Emily Overton (Records Management Girl Consultancy)
Title: Reducing the Attack Surface with Records Management
Abstract: Looking into the depths of how information security incidents can potential be prevented or reduced using records management techniques. Addressing the incidents and considering the privacy, trust and data protection impacts of those incidents and whether or not if good records management was considered to be more than just filing, it would have helped.
Wednesday 6th May 2020 - Delaram Kahrobaei (University of York)
Title: Post Quantum Algebraic Cryptography
Title: Reframing Digital Security Inquiry: Unknotting Some of the Paradoxes of Digital Technology Use
Abstract: The use of digital technology is often described as paradoxical; for example, whilst there might be a desire for privacy, people routinely use digital technology to disclose personal information without privacy protection. This talk presents a creative security approach that is designed to critically examine lived experiences of digital technology and, in so doing, unknot technology practices that might seem paradoxical. The theoretical framing of this approach, together with their use, is explained through a presentation of a case study that examines the use of smart technology in the home.
Title: Anonymisation Debate with Prof. Mark Elliot
Wednesday 19th February 2019 - Wendy Moncur (University of Dundee)
Title: Keeping Secrets Online:
Abstract: What strategies do people deploy in keeping secrets online? And how can these strategies be repurposed to (i) enhance the capacity of UK security agencies to detect & mitigate threats generated via online channels, and (ii) support those who keep secrets as parts of their jobs in countering UK & International security threats.
We reviewed over 7500 research papers, uncovering a range of strategies, barriers and enablers involved in keeping secrets online. Three example contexts were used: supply and purchase of illegal drugs, escaping from intimate partner violence, and infidelity. We then condensed our findings, producing a short graphic novel - the “Illustrated Guide to Keeping secrets Online” – for use with security and law enforcement stakeholders in a series of well-received interactive workshops.
This talk describes the approach taken, key findings, development of the Guide and subsequent impact workshops with stakeholders.