Category / Computer Science

IT as a Utility Community conference

As part of the community, BUCSU is supporting Southampton University with this UK network.

IT as aUtility: Network+ community conference

                                             Thursday 19th – Friday 20th June 2014

This will be a two-day presentation and reflection on the achievements so far and the future plans of the RCUK-funded IT as a Utility Network+. The event will be an opportunity to further examine the role of IT utilities in the digital economy both now and in the future.

If you are interested in booking onto this event, please book your place via Eventbrite.

In addition to this, BU will be hosting a ‘Data as a utility and analytics as a service’ workshop at the Executive Business Centre on Monday 9th June from 12pm – 6pm.

Understanding Crowdsourcing and CCTV surveillance

 

Staff, students and members of the public are invited to join us for the next Cyber Security Seminar…

‘Understanding Crowdsourcing and CCTV surveillance’

Tuesday, 27th May

Coyne Lecture Theatre 

4pm – 5pm

 

Closed Circuit Television (CCTV) has many different uses but is often considered an archetypal surveillance technology. These infrastructures generate large amounts of data; so much so that the technique of crowdsourcing has recently been applied to the problem of searching for abnormalities in live surveillance video; the premise being that many inexpert watchers are cheaper but as efficient as a small number of experienced security experts. However, the merits of crowdsourcing watchers of surveillance video are largely unknown.

In this talk Dr. Paul Dunphy will describe exemplar infrastructures of this type, and two user studies that assess the performance of the watchers of CCTV video online. The results prompt a discussion regarding the effectiveness of using crowdsourcing in such contexts, and the role such infrastructures can play in society.

Speaker Bio: Paul is a postdoctoral researcher in the Culture Lab at Newcastle University. He is interested in multi-disciplinary approaches to understand and design security and privacy technologies.

 If you would like to join us for this presentation, please book your place via Eventbrite.

Neuroscience@BU seminar: “Emergent oscillatory activity in the cerebral cortex” Friday the 2nd of May 14:00 PG 10 (Poole House)

Next Friday the 2nd of May at 14:00 h in PG10, we will have a research seminar in neuroscience entitled “Emergent oscillatory activity in the cerebral cortex”.

Our guest is Prof. Maria Victoria Sanchez-Vives, http://www.sanchez-vives.org/,  ICREA Research Professor at the IDIBAPS (Institut d’Investigacions Biomediques August Pi i Sunyer) in Barcelona, head of the Systems Neuroscience group.

Prof. Maria Victoria Sanchez-Vives has published a number of influential papers in journals like e.g. Science, Nature Neuroscience or PNAS and is currently the Chief Editor of Frontiers in Systems Neuroscience. She has been funded by Human Frontier Science Program, national and international agencies and has been partner in six European Projects. She is currently coordinator of the FET EU project CORTICONIC.

Her main interests include how neuronal and synaptic properties as well as connectivity determine the emergent activity generated by neuronal networks. The integration of the cortical information giving rise to bodily representation and the combination of brain-computer interfaces and virtual reality for understanding these processes, is another research line of her group.

We strongly suggest not to miss the opportunity to attend to this seminar. Afternoon cakes, coffee and tea will be served during the event.

Best wishes, Emili

Emili Balaguer-Ballester, PhD
Faculty of Science and Technology , Bournemouth University
Bernstein Center for Computational Neuroscience, University of Heidelberg

———————————

Title: “Emergent oscillatory activity in the cerebral cortex”.

Abstract: “Understanding complex systems like brain networks is a challenge. Cortical networks can perform computations of remarkable complexity, accounting for a large variety of behaviours and cognitive states. At the same time, the same networks can engage in stereotypical patterns of spatio-temporal activation, such as the ones that can be observed during sleep, anaesthesia and in cortical slice. Collective phenomena emerging from activity reverberation in cortical circuits at different spatio-temporal scales results in a rich variety of dynamical states. Slow (around or below 1 Hz) and fast (15-100 Hz) rhythms are spontaneously generated by the cortical network and propagate or synchronize populations across the cortex. This is the case even in isolated pieces of the cortical network, or in vitro maintained cortical slices, where both slow and fast oscillations are also spontaneously generated. The similarity between some of these patterns both in vivo and in vitro suggests that they are somehow a default activity from the cortical network. We understand that these emergent patterns provide information on the structure, dynamics and function of the underlying cortical network and their alterations in neurological diseases reveal the circuits dysfunction”.

 

 

 

Low-Power High-Quality Interactive Digital Media: The Challenges

Dear all,

We would like to invite you to an additional guest talk for the Creative Technology Research Centre that will be delivered by Professor Edmond C. Prakash from the University of Bedfordshire.

Title: Low-Power High-Quality Interactive Digital Media: The Challenges

Time: 2:00PM-3:00PM

Date: Thursday 3rd April 2014

Room: P302 (Poole House, Talbot Campus)

Abstract: Traditional GPUs have super graphics performance and have been extremely utilised for media rich applications. However, they are not suitable for low-power mobile devices. Digital media research and development are at the crossroads. This talk looks at some of the key challenges faced in Embedded GPUs for next generation media rich applications (interactive 3D graphics and games) on low-power mobile devices. Graphics programmers, 3D modellers, animators and game developers will benefit from this talk.

Biography:  Edmond is a Professor in Computer Games Technology and the Director for the Institute for Research in Applicable Computing at the University of Bedfordshire. He is the founding editor of the International Journal of Computer Games Technology.  Edmond has worked at top institutions across the globe including MIT, UIUC, BNU, NTU, MMU, PUJ and IISc. Edmond’s research interests are in volume graphics, real-time visualisation, game based learning and game engines.

We hope to see you there,

Dr. David John

Bournemouth European Network in Cyber Security (BENICS)

In recent years, the field of Cybersecurity has attracted researchers and practitioners from academic fields ranging from Computer Science and Design, through to Psychology and Business Studies. To date, however, these communities have not been influenced by each other. Their research are disseminated in a variety of workshops and conferences across these fields. As a result, there is a misunderstanding of the role these different fields play in improving cybersecurity. For example, some researchers describe people are “the weakest link” and encourage designers to build systems that “Homer Simpson” can use safely. Unfortunately, treating users as a problem limits opportunities for innovation when people are engaged as part of a solution. Similarly, treating practitioners like cartoon characters disenfranchises the very people that a design is meant to support. Bournemouth University is one of the few institutions in the world with interests across the disciplines contributing to Cybersecurity, a small enough size for academics across these disciplines to engage with each other, and the vision necessary to fuel this engagement. To take advantage of the opportunities afforded to Bournemouth, an interdisciplinary seminar series in cybersecurity was launched in September 2013. The seminar series has attracted both staff and students from across the university, together with practitioners from local industry with interests in cybersecurity. So far, this has led to connections forming across the Faculty of Science & Technology, and the Media and Business schools. Resulting collaborations with our seminar speakers have also led to prospective KTP and Horizon 2020 proposals, and invitations to deliver guest lectures at other universities.

To build on this momentum in interdisciplinary cybersecurity activity at Bournemouth, we have created the Bournemouth European Network for Interdisciplinary Cyber Security (BENICS): a FUSION funded SMN activity. Over the coming year, BENICS will bring five invited European cybersecurity academics to Bournemouth to engage in short (one-week), focused collaborative visits. These visits will introduce invited academics to Bournemouth’s cybersecurity capabilities, allow them to share their interests with us as part of the cybersecurity seminar series, and engage in short and focused proposal building, research, or teaching resource creation activities.

Following each visit, Bournemouth and the visiting academic will engage in pump-priming activities; these will refine deliverables produced to sustain the momentum created during the visit. These deliverables will form the basis of a joint publication at an agreed international conference or journal.

Watch this space for more information about these visits, and please get in touch if you’re interested in engaging with BENICS and our cybersecurity research in general.

Workshop on Streaming Analytics Thursday 13th March 10:30.

As part of a collaboration between BU and several other EU based universities and intitutions we will be hosting SAAT 2014 a workshop on the emerging area of streaming analytics. The workshop is open to all for the first day (the second day is taken up with management meetings). The focus of this workshop is on the technical aspects of how to provide streaming analytics.

Scalability and responsiveness of algorithms and architectures for large scale data streams are fundamental to harvesting the power of data generated in real-time networks. The workshop seeks to bring together industry and academic partners to explore specifically the requirements of data processing, the real-world target applications and develop from there the techniques required. The scope thus includes applications, scaling algorithms, streaming platforms, integration of streaming and batch algorithms, graph partitioning together with machine learning for streaming, concept drift and dynamic data analysis. Additional topics such as security issues and tool and platform development are of interest.

Aims:
The key aims in this workshop are several fold. Primarily we seek to identify the key issues associated real world streams of data, including key target applications. Integrated  solutions, combining appropriate topics from the scope which target likely directions in this field is the end goal. Specifically, the aim of the workshop is to facilitate interaction as a crucible for consortium building in advance of Horizon 2020 (call 1.A.1.1 from the 2014-15 draft work programme.).

Organisers: Dr. Hamid Bouchachia(DEC) , Dr. Damien Fay (DEC)

Neuroscience@BU seminars next week, Wednesday the 12th and Friday the 14th

Dear colleagues,
Next week we will have two thematic research seminars in neuroscience organized by Dr Julie Kirby and me.

-The first of the seminars of this series will take place next Wednesday the 12th of March, 15:00, P302 LT. The invited speaker is Dr Dimitris Pinotsis, http://iris.ucl.ac.uk/iris/browse/profile?upi=DPINO08.
Dr Pintosis obtained his PhD in September 2006 from the Department of Applied Mathematics and Theoretical Physics (DAMTP) of the University of Cambridge. After an EPRSC Research Fellowship and lectureship in Reading University he moved to UCL where he is working at the Welcome Trust Centre for Neuroimaging ; having secured funding from EPSRC and the Wellcome Trust.
Dr Pinotsis has a strong track record and a number of landmark publications in imaging neuroscience modelling; he is also the author of the most advanced versions of the state-of the art models for neuroimaging data, the dynamic causal models. I am familiar with Dimitris work and I very strongly encourage the attendance to researchers both in machine learning and in cognitive psychology.
The title of his exciting talk is “Electrophysiological Data and the Biophysical Modelling of Local Cortical Circuits”. “Dynamic Causal Modelling (DCM) is a general framework that allows for a formal (Bayesian) analysis of the properties of neuronal populations, based upon realistic biophysical models. In the past few years, a wide variety of such models has been implemented in the DCM framework. In this talk, I will first review some of these recent advances and then focus on models that allow one to infer spatial parameters of cortical infrastructures generating electrophysiological signals (like the extent of lateral connections and the intrinsic conduction speed of signal propagation on the cortex). I will try to highlight the links between different models and address how the experimental hypothesis or question asked might inform the choice of an appropriate model”.

-The second seminar of this series will take place on Friday the 14th of March, at 14:00 in K101. Our guest is Prof. Maria Victoria Sanchez-Vives, http://www.sanchez-vives.org/

Maria V. Victoria Sánchez-Vives, M.D., PhD in Neurosciences has been ICREA Research Professor at the IDIBAPS (Institut d’Investigacions Biomediques August Pi i Sunyer) in Barcelona since 2008, where she is the head of the Systems Neuroscience group. She is currently co-director of the Event Lab (Experimental Virtual Envir onments in Neuroscience and Technology).
After obtaining her PhD at the University of Alicante in Spain, MVSV was postdoctoral fellow/research associate at Rockefeller University (1993-1994) and Yale University (1995-2000). She next established her own laboratory at the Neuroscience Institute of Alicante (Consejo Superior de Investigaciones Científicas) while being Associate Professor of Physiology. Her independent research has been supported by national and international agencies. She has been funded by Human Frontier Science Program and has been partner in six European Projects. She is currently coordinator of the FET EU project CORTICONIC.
Her main interests include how neuronal and synaptic properties as well as connectivity determine the emergent activity generated by neuronal networks. The integration of the cortical information giving rise to bodily representation and the combination of brain-computer interfaces and virtual reality for understanding these processes is another research line of her group.
She is currently Chief Editor of Frontiers in Systems Neuroscience.
For information see www.sanchez-vives.org
Maria Victoria Sanchez-Vives is a renowned neuroscientist which has published a number of highly influential papers in journals like e.g. Science, Nature Neuroscience, PNAS or Journal of Neuroscience. I strongly encourage not missing the opportunity to attend to this seminar and to discuss perhaps potential synergies.
The title of her talk will be “Emergent oscillatory activity in the cerebral cortex”.
“Understanding complex systems like brain networks is a challenge. Cortical networks can perform computations of remarkable complexity, accounting for a large variety of behaviours and cognitive states. At the same time, the same networks can engage in stereotypical patterns of spatio-temporal activation, such as the ones that can be observed during sleep, anaesthesia and in cortical slice. Collective phenomena emerging from activity reverberation in cortical circuits at different spatio-temporal scales results in a rich variety of dynamical states. Slow (around or below 1 Hz) and fast (15-100 Hz) rhythms are spontaneously generated by the cortical network and propagate or synchronize populations across the cortex. This is the case even in isolated pieces of the cortical network, or in vitro maintained cortical slices, where both slow and fast oscillations are also spontaneously generated. The similarity between some of these patterns both in vivo and in vitro suggests that they are somehow a default activity from the cortical network. We understand that these emergent patterns provide information on the structure, dynamics and function of the underlying cortical network and their alterations in neurological diseases reveal the circuits dysfunction”.

If you would like to talk to the guests kindly let me know.
Best wishes, Emili

Emili Balaguer-Ballester, PhD
Faculty of Science and Technology , Bournemouth University
Bernstein Center for Computational Neuroscience, University of Heidelberg

Cyber Security Seminar: Everyday Security for Everyday Lives (Lizzie Coles-Kemp, Royal Holloway)

Our next Interdisciplinary Cyber Security Seminar will take place on Tuesday, 4th March at 5pm.
The seminar will take place in EB202 in the Executive Business Centre, and will be free and open to all. If you would like to attend, please register at https://www.eventbrite.co.uk/e/interdisciplinary-seminar-in-cyber-security-tickets-10691914805

Our speaker will be Dr Lizzie Coles-Kemp. Lizzie is a qualitative researcher, interested in the everyday practices of information production, circulation, curation and consumption within a broad range of communities. She works in Possible Futures Lab within the Information Security Group at Royal Holloway University of London. Her main focus is the interaction between people and security and privacy technologies, how each influences the other and the communities of practice that emerge. As part of this focus, she explores topics such as identity and technology use, gender and information management and information control as a means of power. Current interdisciplinary work includes: value sensitive design in public service delivery, cultural analysis in institutional security and the use of visual research methods in interdisciplinary research.

Abstract: Over the last five years at the Information Security Group, Royal Holloway, a research group called Possible Futures Lab has been working on projects that explore what notions of information control mean in the context of everyday lives. We have two primary objectives: to improve designs related to everyday information production and control and to influence thinking on topics of everyday information security. Each of our projects has started with ethnographic research that has enabled us to identify and observe the relevant spaces and places. From there we have co-designed with each community discovery tools for seeing, experiencing and exploring these spaces. These tools help us to better understand the community viewpoints on information and its control and to design/re-design services and technologies to better support this position. This talk gives examples of this approach in two of our projects that focus on cyber security decision making.

Psychology Research Seminar: Laughing in the face of adversity – the influence of affective state on situation awareness

Venue & date: Thursday 30th January at 4pm in K103 (Kimmeridge House)

Situation awareness can be loosely defined as, ‘knowing what’s going on around you and what to do about it.’   In everyday life we make complex decisions – some good, some bad – on the basis of our awareness of what is going on around us.  Sadly situation awareness can sometimes be sub-optimal leading to catastrophic errors such as road traffic accidents and air crashes.  Such errors often appear to result from a ‘tunnelling down’ with available and useful information being ignored. This attentional tunnelling is widely reported by (amongst others) firefighters, medical staff and military personnel.

Dr Graham Edgar from the Centre for Research in Applied Cognition, Knowledge, Learning and Emotion at the University of Gloucestershire will present his research examining information-use in building and maintaining situation awareness, and the influence that affective state has on that process.

All are welcome and there is no need to book – just come along!

Password? Not another one!

The increasing volume of academic activity on the internet coupled with a growing obsession about privacy and data protection means for many academics a rapidly expanding number of online accounts and associated passwords. This is, of course, over and above our regular dose of accounts and passwords as citizens of the virtual world. The average adult in the UK must have at least 25 internet accounts, for the bank/building society, supermarkets, phone companies, social media, airlines, trains, insurance companies, eBay, the website of the parents’ council of your children’s school, your electricity provider, the council tax, etc.

I feel as an academic, the burden is even worse. Every single time another scientific journal invites me to review a paper it opens an on-line account for me. Every time I apply for a grant from a funding body to which I have not previously applied, I am required to set up an account with a new password. When you apply for 20-odd grants every year and review manuscripts for a similar number of different journals the number of accounts and passwords add up rapidly. Then there are the other accounts and passwords related to work for sites such as this BU Research Blog, BRIAN, Survey Monkey, for the university for whom you act as external examiner, for Drop Box, the British Library, ORCIC, ACADEMIA.EDU, ResearchGate, Researchfish, Linkedin, and the list goes on.

These last few months I was reminded how non user friendly some systems are. First, I received new secure email account for my part on a REF sub-panel. The account name chosen for me is different from what I would have chosen and what I am used to at Bournemouth University. The importance of confidentiality for the REF work is clear so my password has to be different from anything I use elsewhere. Secondly, a few weeks later I attempted to put my name done for the tri-annual conference of the International Congress of Midwifery in Prague next year. It turns out you cannot join the conference without opening an on-line account first. The account name was automatically chosen for me and so was the password. Unfortunately, both are impossible to remember, neither the account name nor the password (which was case sensitive) were ones I would have selected personally.

There is some hope as some journals allow you to choose your own account name and password. Elsevier has brought most of its journals into one account, with your own email as the account name and all with the same password. Similarly a group of English-language journals in Nepal called Nepal Journals OnLine (NepJOL) use one account name for all participating journals. For the rest of my account names and passwords I can only follow the advice given by Stephen Fry on an episode of QI: “Write it down somewhere on a piece of paper”. The underlying idea is that the people who try to steal your internet account details sit in a bedsit in London or Hong Kong and won’t come to your office or living room to steal a piece of paper with computer addresses. The people who try to break into your house or office are looking for objects with a street value, such as your TV, phone or laptop, they are generally not interested in a piece of paper with some scribbles on it.

Prof. Edwin van Teijlingen

Centre for Midwifery, Maternal & Perinatal Health

Service Computing Seminar: Servicing Big Data

As part of the Service Computing Seminar (SCS) project, funded by Bournemouth University Fusion Investment Fund, we would like to invite you to the Service Computing Seminar

Title: Servicing Big Data

Time: 14:00-16:00 Wednesday, 18 Dec. 2013

Venue: PG143 (Thomas Hardy Suite, Talbot Campus)

Speaker: Prof. Athman Bouguettaya, Head of School of Computer Science and Information Technology at RMIT University, Melbourne, Australia

 

Abstract

Big data is here and in a big way.  Big data is coming from all sorts of sources and means, including sensors, deep space, social media, smartphones, genomic, etc.  The cloud has been instrumental supporting the storage and processing of the ever increasing amount of data.  “Domesticating” the data, i.e., making it useful, however, has been a major challenge.  Service computing is the next major evolution of computing that aims at transforming massive data into artefacts that are acted upon, i.e., services. Service computing is increasingly being recognized as part of a broader agenda in Service Science. In that respect, service computing may be viewed as the “engineering” side of service science. Service computing broadly focuses at providing a foundational framework to support a service-centric view of designing, developing, and exposing data (and applications), whether it is in the enterprise or on the Web. In that respect, the Web is and will undoubtedly be the preferred delivery platform of service-based solutions. More specifically, Web services are currently without contest the key enabler for deploying service-centric solutions. Fully delivering on the potential of next-generation Web services requires building a foundation that would provide a sound design for efficiently developing, deploying, publishing, discovering, composing, trusting, and optimizing access to Web services in an open, competitive, untrustworthy, and highly dynamic environment. The Web service foundation is the key catalyst for the development of a uniform framework called Web Service Management System (WSMS). In this novel framework, Web services are treated as first-class objects. In this talk, I will first motivate the need for a uniform service management to service big data. I will then overview the core components of a typical WSMS. I will conclude by describing our latest research servicing sensor data.

 

Short Bio

Athman Bouguettaya is Professor and Head of School of Computer Science and Information Technology at RMIT University, Melbourne, Australia. He received his PhD in Computer Science from the University of Colorado at Boulder (USA) in 1992.  He was previously Science Leader in Service Computing at CSIRO ICT Centre, Canberra. Australia. Before that, he was a tenured faculty member and Program director in the Computer Science department at Virginia Polytechnic Institute and State University (commonly known as Virginia Tech) (USA).  He is a founding member and past President of the Service Science Society, a non-profit organization that aims at forming a community of service scientists for the advancement of service science. He is on the editorial boards of several journals including, the IEEE Transactions on Services Computing, ACM Transactions on Internet Technology, the International Journal on Next Generation Computing, VLDB Journal, Distributed and Parallel Databases Journal, and the International Journal of Cooperative Information Systems. He is also on the editorial board of the Springer-Verlag book series on Services Science.  He served as a guest editor of a number of special issues including the special issue of the ACM Transactions on Internet Technology on Semantic Web services, a special issue the IEEE Transactions on Services Computing on Service Query Models, and a special issue of IEEE Internet Computing on Database Technology on the Web. He served as a Program Chair of the 2012 International Conference on Web and Information System Engineering, the 2009 and 2010 Australasian Database Conference, 2008 International Conference on Service Oriented Computing (ICSOC) and the IEEE RIDE Workshop on Web Services for E-Commerce and E-Government (RIDE-WS-ECEG’04). He has published more than 170 books, book chapters, and articles in journals and conferences in the area of databases and service computing (e.g., the IEEE Transactions on Knowledge and Data Engineering, the ACM Transactions on the Web, WWW Journal, VLDB Journal, SIGMOD, ICDE, VLDB, and EDBT). He was the recipient of several federally competitive grants in Australia (e.g., ARC) and the US (e.g., NSF, NIH). He is a Fellow of the IEEE and a Distinguished Scientist of the ACM.

Cyber Security Seminars: Suggestions for Speakers and Topics

If you have been following my previous posts then you will know that today is the final Cyber Security Seminar for this semester.  We hope you have found the seminar series interesting so far.

We are currently planning the seminars for next semester.  Please get in touch if you have suggestions for potential speakers, or topics you would like to hear more about. Although the budget we have available is modest, we will do our best to accommodate your suggestions.

Cyber Security Seminar: Approaching the Measurement of User Security Behaviour in Organisations

Our final Interdisciplinary Cyber Security Seminar this semester will take place on Tuesday, 10th December at 5pm. The seminar will take place in EB202 in the Executive Business Centre, and will be free and open to all. If you would like to attend, please register at https://www.eventbrite.co.uk/e/interdisciplinary-seminar-in-cyber-security-tickets-9688353125

Our speaker will be Dr. Simon Parkin from UCL. Simon is a Senior Research Associate in the Information Security group at University College London, contributing to the Productive Security project within the Research Institute in the Science of Cyber Security (RISCS). He was previously a member of the Innovation Team at Hewlett Packard Enterprise Security Services (HP ESS) until mid-2012. From 2007 to 2011, Simon was a Postdoctoral Research Associate in the School of Computing Science at Newcastle University, where he also obtained his PhD. His research interests include: IT-security policy management metrics, models and tools; holistic IT-security management principles, and; IT-security risk management approaches and knowledge formalisation.

Abstract: Individuals working within organisations must complete their tasks, and are often expected to do so using secured IT systems. There can be times when the expectations for productivity and security are in competition, and so how would an organisation measure the outcomes in practice? We will review a series of interdisciplinary research efforts that characterise the human factor in IT-security within large organisations, as part of a holistic view of security. There are furthermore a variety of modelling approaches and frameworks that have emerged and informed this view. We will consider the challenges that remain in affording measurement of the human factor in IT-security within organisations, and some of the changes that are required for such activities to be sustainable and effective.

Cyber Security Seminar: Shiny Expensive Things: The Global Problem of Mobile Phone Theft (David Rogers, Copper Horse)

Our next Interdisciplinary Cyber Security Seminar will take place on Tuesday, 3rd December at 5pm. Our seminars are approachable, and require nothing more than a general interest in security, and an enquiring mind.

Our speaker will be David Rogers, who is Founder and Director of Copper Horse Solutions Ltd: a software and security company based in Windsor, UK. Alongside this he teaches the Mobile Systems Security course at the University of Oxford and Chairs the Device Security Steering Group at the GSM Association. He has worked in the mobile industry for over 14 years in security and engineering roles. Prior to this he worked in the semiconductor industry. David’s articles and comments on mobile security topics have been regularly covered by the media worldwide including The Guardian, The Wall Street Journal and Sophos’ Naked Security blog. His book ‘Mobile Security: A Guide for Users’ was published in 2013. David holds an MSc in Software Engineering from the University of Oxford and a HND in Mechatronics from the University of Teesside.

Abstract: Technology in mobile devices is continuing to advance at an incredible rate, but some of the old security themes continue to persist, mobile phone theft being one of them. This talk looks at the topic of mobile phone theft and what industry’s role has been in helping to prevent it and whether that has been entirely successful. The talk looks at what could happen next and whether it is possible to standardise usable anti-theft mechanisms within devices. It will also look at technologies such as biometrics for access control and whether Police and Government actions have been adequate in dealing with the modus operandi of thieves and fencers of stolen phones.

The seminar will take place in EB202 in the Executive Business Centre, and will be free and open to all. If you would like to attend, please register at http://www.eventbrite.co.uk/e/interdisciplinary-seminar-in-cyber-security-tickets-9564165677

Can We Sell Security Like Soap? A New Approach to Behaviour Change

Our next Interdisciplinary Cyber Security Seminar will take place on Tuesday, 19th November at 5pm. Our seminars are approachable, and require nothing more than a general interest in security, and an enquiring mind.

Our speaker will be Debi Ashenden, who is a Reader in Cyber Security and Head of the Centre for Cyber Security and Information Assurance at Cranfield University, based at the Defence Academy of the UK, Shrivenham. Prior to taking up her post at Cranfield University she was Managing Consultant within QinetiQ’s Trusted Information Management Dept (formerly DERA). She has been working in cyber security since 1998 and specialises in the social and behavioural aspects of cyber security. Her research is built on a socio-technical vision of cyber security that sees people as solutions rather than as the problem. Debi is the co-author of, ‘Risk Management for Computer Security: Protecting Your Network and Information Assets’, Butterworth Heinneman (2004).

Talk Abstract: Many organisations run security awareness programmes with the aim of improving end user behaviours around information security. Yet behavioural research tells us that raising awareness will not necessarily lead to behaviour change. This talk examines the challenge of changing end user behaviour and puts forward social marketing as a new paradigm. Social marketing is a proven framework for achieving behavioural change and has traditionally been used in health care interventions, although there is an increasing recognition that it could be successfully applied to a broader range of behaviour change issues. It has yet to be applied however, to information security in an organisational context. This talk will explore the social marketing framework in relation to information security behavioural change and highlight the key challenges that this approach poses for information security managers. We conclude with suggestions for future research.

The seminar will take place in EB202 in the Executive Business Centre, and will be free and open to all. If you would like to attend, we encourage you to register at http://www.eventbrite.co.uk/e/interdisciplinary-seminar-in-cyber-security-tickets-9336229915