ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks
Lead Research Organisation:
University of Kent
Department Name: Sch of Computing
Abstract
Researchers and practitioners have acknowledged human-related risks among the most important factors in cybersecurity, e.g. an IBM report (2014) shows that over 95% of security incidents involved "human errors". Responses to human-related cyber risks remain undermined by a conceptual problem: the mindset associated with the term 'cyber'-crime which has persuaded us that that crimes with a cyber-dimension occur purely within a (non-physical) 'cyber' space, and that these constitute wholly new forms of offending, divorced from the human/social components of traditional (physical) crime landscapes. In this context, the unprecedented linking of individuals and technologies into global social-physical networks - hyperconnection - has generated exponential complexity and unpredictability of vulnerabilities.
In addition to hyperconnectivity, the dynamic evolving nature of cyber systems is equally important. Cyber systems change far faster than biological/material cultures, and criminal behaviour and techniques evolve in relation to the changing nature of opportunities centring on target assets, tools and weapons, routine activities, business models, etc. Studying networks and relationships between individuals, businesses and organisations in a hyperconnected environment requires understanding of communities and the broader ecosystems. This complex, non-linear process can lead to co-evolution in the medium-longer term.
The focus on cybersecurity as a dynamic interaction between humans and socio-technic elements within a risk ecosystem raises implementation issues, e.g. how to mobilise diverse players to support security. Conventionally they are considered under 'raising awareness', and many initiatives have been rolled out. However, activities targeting society as a whole have limitations, e.g. the lack of personalisation, which makes them less effective in influencing human behaviours.
While there is isolated research across these areas, there is no holistic framework combining all these theoretical concepts (co-evolution, opportunity management, behavioural and business models, ad hoc technological research on cyber risks and cybercrime) to allow a more comprehensive understanding of human-related risks within cybersecurity ecosystems and to design more effective approaches for engaging individuals and organisations to reduce such risks.
The project's overall aim is therefore to develop a framework through which we can analyse the behavioural co-evolution of cybersecurity/cybercrime ecosystems and effectively influence behaviours of a range of actors in the ecosystems in order to reduce human-related risks. To achieve the project's overall aim, this research will:
(1) Be theory-informed: Incorporate theoretical concepts from social, evolutionary and behavioural sciences which provide insights into the co-evolutionary aspect of cybersecurity/cybercrime ecosystems. (2) Be evidence-based: Draw on extensive real-world data from different sources on behaviours of individuals and organisations within cybersecurity/cybercrime ecosystems. (3) Be user-centric: Develop a framework that can provide practical guidance to system designers on how to engage individual end users and organisations for reducing human-related cyber risks. (4) Be real world-facing: Conduct user studies in real-world use cases to validate the framework's effectiveness.
The new framework and solutions it identifies will contribute towards enhanced safety online for many different kinds of users, whether these are from government, industry, the research community or the general public.
This project will involve a group of researchers working in 5 academic disciplines (Computer Science, Crime Science, Business, Engineering, Behavioural Science) at 4 UK research institutes, and be supported by an Advisory Board with 12 international/UK researchers and a Stakeholder Group formed by 12 non-academic partners (including LEAs, NGOs and industry).
In addition to hyperconnectivity, the dynamic evolving nature of cyber systems is equally important. Cyber systems change far faster than biological/material cultures, and criminal behaviour and techniques evolve in relation to the changing nature of opportunities centring on target assets, tools and weapons, routine activities, business models, etc. Studying networks and relationships between individuals, businesses and organisations in a hyperconnected environment requires understanding of communities and the broader ecosystems. This complex, non-linear process can lead to co-evolution in the medium-longer term.
The focus on cybersecurity as a dynamic interaction between humans and socio-technic elements within a risk ecosystem raises implementation issues, e.g. how to mobilise diverse players to support security. Conventionally they are considered under 'raising awareness', and many initiatives have been rolled out. However, activities targeting society as a whole have limitations, e.g. the lack of personalisation, which makes them less effective in influencing human behaviours.
While there is isolated research across these areas, there is no holistic framework combining all these theoretical concepts (co-evolution, opportunity management, behavioural and business models, ad hoc technological research on cyber risks and cybercrime) to allow a more comprehensive understanding of human-related risks within cybersecurity ecosystems and to design more effective approaches for engaging individuals and organisations to reduce such risks.
The project's overall aim is therefore to develop a framework through which we can analyse the behavioural co-evolution of cybersecurity/cybercrime ecosystems and effectively influence behaviours of a range of actors in the ecosystems in order to reduce human-related risks. To achieve the project's overall aim, this research will:
(1) Be theory-informed: Incorporate theoretical concepts from social, evolutionary and behavioural sciences which provide insights into the co-evolutionary aspect of cybersecurity/cybercrime ecosystems. (2) Be evidence-based: Draw on extensive real-world data from different sources on behaviours of individuals and organisations within cybersecurity/cybercrime ecosystems. (3) Be user-centric: Develop a framework that can provide practical guidance to system designers on how to engage individual end users and organisations for reducing human-related cyber risks. (4) Be real world-facing: Conduct user studies in real-world use cases to validate the framework's effectiveness.
The new framework and solutions it identifies will contribute towards enhanced safety online for many different kinds of users, whether these are from government, industry, the research community or the general public.
This project will involve a group of researchers working in 5 academic disciplines (Computer Science, Crime Science, Business, Engineering, Behavioural Science) at 4 UK research institutes, and be supported by an Advisory Board with 12 international/UK researchers and a Stakeholder Group formed by 12 non-academic partners (including LEAs, NGOs and industry).
Planned Impact
The Je-S form's "Academic Beneficiaries" field explains the expected academic impact in detail, so here we focus on economic and societal impact.
The project will benefit citizens and communities they belong to by providing 1) better protection against human-related cyber risks leading to victimisation or harm; 2) better feeling of being safe and secure in cyber(-physical) space due to improved engagement; 3) better education about cyber risks due to more personalised, contextualised and thus easier-to-understand guidelines and recommendations; 4) better value of their personal data via controlled data sharing with trusted stakeholders. As a whole, the project can help foster a better culture of more active collaboration between individuals, communities and other stakeholders to reduce the whole society's risk level to cyber threats.
Product/system/service/social innovation designers will benefit from the project, which will provide clearly-defined and practical design principles and knowledge/understanding based on research and theory, hence improved capacity to generate plausible crime preventive innovations, and integrate security with other requirements.
The project can benefit businesses who are end users of cybersecurity products and services, which include financial institutes, online (not limited to payment) service providers, transportation service (e.g. transportation service, railway and road network) operators and vehicle vendors. Those businesses are key stakeholders of the two use cases in the project, and our work will help them better protect their customers and infrastructures via reduced cyber risks from their customers and employees and increased capacity of engaging users to behave more securely.
NGOs managing cybersecurity and cybercrime awareness activities such as Neighbourhood and Home Watch Network (our research partner) will benefit from the project as the developed framework will provide a more effective way to engage human users and organisations working with government to raise awareness of individual citizens and businesses.
LEAs and governments will benefit from the project in a number of ways: 1) improved policing capacity and efficiency due to more contextualised information received from individual citizens and other organisations via more active engagement of stakeholders; 2) improved relationship with citizens, communities, businesses and NGOs by collaborating with them more closely; 3) better information collection and knowledge presentation tools which can help operation, decision making and internal staff training on cybersecurity and cybercrime.
Policy and law makers will also benefit from the project because the socio-technical framework when applied (widely) to real world will help produce better insights about what is going on in the cybersecurity and cybercrime ecosystems, thus making them more informed to design policies and adapt regulations which will fit more into its purpose and encourage compliance.
Another group of stakeholders who will benefit from the project is cybersecurity product vendors and service providers such as IBM and NCC Group on our Stakeholder Group. They can benefit due to two main reasons: 1) new opportunities to improve/adapt existing products and services; 2) opportunities to create completely new products and services e.g. new data management and user engagement systems which can be used by all the above beneficiaries listed.
Economically speaking, the project can help 1) prevent or reduce costs from user side by reduced victimisation and more informed decisions of end users; 2) enhance trust between consumers and cybersecurity products and services due to improved user experience (which can encourage consumption of such products and services); 3) reduce costs of investigating and pursuing criminals by LEAs with improved policing tools and procedures; 4) create new business opportunities that contribute to the economy directly.
The project will benefit citizens and communities they belong to by providing 1) better protection against human-related cyber risks leading to victimisation or harm; 2) better feeling of being safe and secure in cyber(-physical) space due to improved engagement; 3) better education about cyber risks due to more personalised, contextualised and thus easier-to-understand guidelines and recommendations; 4) better value of their personal data via controlled data sharing with trusted stakeholders. As a whole, the project can help foster a better culture of more active collaboration between individuals, communities and other stakeholders to reduce the whole society's risk level to cyber threats.
Product/system/service/social innovation designers will benefit from the project, which will provide clearly-defined and practical design principles and knowledge/understanding based on research and theory, hence improved capacity to generate plausible crime preventive innovations, and integrate security with other requirements.
The project can benefit businesses who are end users of cybersecurity products and services, which include financial institutes, online (not limited to payment) service providers, transportation service (e.g. transportation service, railway and road network) operators and vehicle vendors. Those businesses are key stakeholders of the two use cases in the project, and our work will help them better protect their customers and infrastructures via reduced cyber risks from their customers and employees and increased capacity of engaging users to behave more securely.
NGOs managing cybersecurity and cybercrime awareness activities such as Neighbourhood and Home Watch Network (our research partner) will benefit from the project as the developed framework will provide a more effective way to engage human users and organisations working with government to raise awareness of individual citizens and businesses.
LEAs and governments will benefit from the project in a number of ways: 1) improved policing capacity and efficiency due to more contextualised information received from individual citizens and other organisations via more active engagement of stakeholders; 2) improved relationship with citizens, communities, businesses and NGOs by collaborating with them more closely; 3) better information collection and knowledge presentation tools which can help operation, decision making and internal staff training on cybersecurity and cybercrime.
Policy and law makers will also benefit from the project because the socio-technical framework when applied (widely) to real world will help produce better insights about what is going on in the cybersecurity and cybercrime ecosystems, thus making them more informed to design policies and adapt regulations which will fit more into its purpose and encourage compliance.
Another group of stakeholders who will benefit from the project is cybersecurity product vendors and service providers such as IBM and NCC Group on our Stakeholder Group. They can benefit due to two main reasons: 1) new opportunities to improve/adapt existing products and services; 2) opportunities to create completely new products and services e.g. new data management and user engagement systems which can be used by all the above beneficiaries listed.
Economically speaking, the project can help 1) prevent or reduce costs from user side by reduced victimisation and more informed decisions of end users; 2) enhance trust between consumers and cybersecurity products and services due to improved user experience (which can encourage consumption of such products and services); 3) reduce costs of investigating and pursuing criminals by LEAs with improved policing tools and procedures; 4) create new business opportunities that contribute to the economy directly.
Publications
Belen Saglam R
(2020)
A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR
Borrion H
(2020)
The Problem with Crime Problem-Solving: Towards a Second Generation Pop?
in The British Journal of Criminology
Borrion H
(2020)
Measuring the resilience of criminogenic ecosystems to global disruption: A case-study of COVID-19 in China.
in PloS one
Dehghanniri H
(2019)
Crime scripting: A systematic review
in European Journal of Criminology
Del Vecchio M
(2020)
Improving productivity in Hollywood with data science: Using emotional arcs of movies to drive product and service innovation in entertainment industries
in Journal of the Operational Research Society
Hallman R
(2018)
2nd International Workshop on Multimedia Privacy and Security
Hernández-Castro C
(2020)
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks
in Computers & Security
Description | Our study on the transport privacy use case led to important findings about user segments in terms of their privacy attitudes towards privacy in the transport context. Four clusters were discovered that can better describe different attitudes of users, which extend the body of knowledge (three clusters are more common according to past research). We also identified a compact set of questions that can be used to predict the segment a user belongs to. The results will find applications in developing user-centric privacy solutions, and we are exploring this possibility in a new EPSRC-funded project on cyber security and privacy risks of mobility-as-a-service ecosystems (EP/V039164/1). The social science part of the project also led to a more systematic cyber crime taxonomy which can help guide future research and practices on cyber crime. The project helped all partners and researchers involved to develop a better understanding of important research questions to plan their future work, which led to a number of new funded research projects. The project helped train early career researchers and three PDRAs moved on to become lecturers after finishing their term in the project. One researcher moved on to take a job at a governmental body. The project also helped establish new collaborations between partners and with other researchers, particularly with the University of Greenwich. Although the money mule use case was not investigated due to the difficulties with getting reliable data, the plan inspired the PI to offer projects to UG and MSc students at the University of Kent, and also led to collaboration with law enforcement and industry. |
Exploitation Route | The data and results in our papers can help inform other researchers' work. The privacy transport use case led to public data (two sets of questionnaire designs) that can support other researchers and practitioners. |
Sectors | Aerospace Defence and Marine Communities and Social Services/Policy Digital/Communication/Information Technologies (including Software) Education Financial Services and Management Consultancy Healthcare Leisure Activities including Sports Recreation and Tourism Government Democracy and Justice Manufacturing including Industrial Biotechology Security and Diplomacy Transport |
URL | https://accept.cyber.kent.ac.uk/ |
Description | Our research involved human participants and one partner (TRL) is a company, so some non-academic impacts were generated naturally as part of our research activities. Our wide engagement activities also helped communicate our research to a wide range of audience. The project led to a Best Paper Award at HICSS 2021, and the content of the paper has been used as part of a taught MSc module at the University of Kent since 2021-22 year. The results also informed some follow-up research of two other ongoing EPSRC project PriVELT (EP/R033749/1) and MACRO (EP/V039164/1), in which new surveys were designed by borrowing elements from the HICSS 2021 paper's design. The project also helped grow an industrial partner HAT to become a more mature company DataSwift (https://www.dataswift.io/). The project led to the creation and publication of a number of new cybercrime frameworks, as free resources for the wider community. The frameworks can be found at crimeframeworks.com. The project has supported and inspired members of the project to pursue more research on cybercrime and the connections between data science and cyber security/privacy, leading to a number of major projects in the UK and Australia. The project also helped train some early career researchers and several have now become independent academics in their own rights in the UK and elsewhere. |
First Year Of Impact | 2021 |
Sector | Aerospace, Defence and Marine,Communities and Social Services/Policy,Digital/Communication/Information Technologies (including Software),Education,Electronics,Financial Services, and Management Consultancy,Leisure Activities, including Sports, Recreation and Tourism,Government, Democracy and Justice,Retail,Security and Diplomacy,Transport |
Impact Types | Cultural Societal Economic Policy & public services |
Description | Beyond Control: The Need for Broader Data Ownership Rights: Briefing Note to Government |
Geographic Reach | National |
Policy Influence Type | Membership of a guideline committee |
URL | https://medium.com/@irene.cl.ng/beyond-control-the-need-for-broader-data-ownership-rights-d3eba688e9... |
Description | Giving Economic Power of Personal Data Back to Citizens: A briefing note to government |
Geographic Reach | National |
Policy Influence Type | Membership of a guideline committee |
Description | PhD student training - involvement in research on GDPR and blockchain |
Geographic Reach | Europe |
Policy Influence Type | Influenced training of practitioners or researchers |
Impact | A PhD student funded by a non-UK source (Turkey) has been involved in the research work of the EPSRC funded project PriVELT (EP/R033749/1) since October 2019. The research is about the tension between GDPR and blockchain, as part of Task 1.4 of PriVLET. A systematic literature review is being conducted on related work. Being involved in the research has helped train the PhD student to be familiar with research methods and collaboration with a larger research team including an expert from Law. The research is also related to the PhD student's own research topic, so can help shape his research in future. |
Description | Student projects on GDPR vs blockchain |
Geographic Reach | Multiple continents/international |
Policy Influence Type | Influenced training of practitioners or researchers |
Impact | A number of Turkish students have been involved in two MSc dissertation projects that were inspired by research in the EPSRC funded project PriVELT (EP/R033749/1). The projects are still ongoing but the training impact has been produced as the students learned how to conduct research on an interdisciplinary topic and with overseas researchers from the UK. |
Description | Defending Machine Learning Operations (MLOps) across the Human-Machine Interface |
Amount | $542,482 (AUD) |
Funding ID | NI210100139 |
Organisation | Australian Research Council |
Sector | Public |
Country | Australia |
Start | 12/2021 |
End | 12/2023 |
Description | Dynamic, Real time, On-demand Personalisation for Scaling (DROPS) |
Amount | £682,696 (GBP) |
Funding ID | EP/R033838/1 |
Organisation | Engineering and Physical Sciences Research Council (EPSRC) |
Sector | Public |
Country | United Kingdom |
Start | 08/2018 |
End | 08/2021 |
Description | Human-machine teaming for supporting human decision making to enhance security of cyber-physical systems |
Amount | £87,000 (GBP) |
Organisation | Defence Science & Technology Laboratory (DSTL) |
Sector | Public |
Country | United Kingdom |
Start | 01/2019 |
End | 12/2021 |
Description | Improving the Privacy and Security in Federated Learning |
Amount | £153,347 (GBP) |
Organisation | Honda Research Institute Europe GmbH |
Sector | Private |
Country | Germany |
Start | 01/2023 |
End | 06/2026 |
Description | Mobility as a service: MAnaging Cybersecurity Risks across Consumers, Organisations and Sectors (MACRO) |
Amount | £175,123 (GBP) |
Organisation | Engineering and Physical Sciences Research Council (EPSRC) |
Sector | Public |
Country | United Kingdom |
Start | 05/2021 |
End | 11/2022 |
Description | Modelling Active Cyber Defence |
Amount | £13,857 (GBP) |
Organisation | Government Communications Headquarters (GCHQ) |
Sector | Public |
Country | United Kingdom |
Start | 01/2018 |
End | 03/2018 |
Description | PRIvacy-aware personal data management and Value Enhancement for Leisure Travellers (PriVELT) |
Amount | £429,069 (GBP) |
Funding ID | EP/R033749/1 |
Organisation | Engineering and Physical Sciences Research Council (EPSRC) |
Sector | Public |
Country | United Kingdom |
Start | 09/2018 |
End | 09/2023 |
Title | Cyber Domain Specific Risk Attitudes Scale |
Description | Cyber Domain Specific Risk Attitude Scale (CyberDoSpeRT scale) allows to measure individual risk taking and risk perception over risky activities in cyber space. The methodology is described in our working paper: Kharlamov, A., Jaiswal, A., Parry, G., & Pogrebna, G. (2018). "A CYBER DOMAIN-SPECIFIC RISK ATTITUDES SCALE TO ADDRESS SECURITY ISSUES IN THE DIGITAL SPACE", accessible at https://bit.ly/2OTiy2E |
Type Of Material | Model of mechanisms or symptoms - human |
Year Produced | 2018 |
Provided To Others? | Yes |
Impact | The tool is taken up by private sector organisations who apply the tool to measure cybersecurity perceptions of their staff and clients. |
URL | https://bit.ly/2OTiy2E |
Title | Questionnaire for measuring attitudes towards within cyber-physical and transport domains |
Description | Development of a cyber-physical attitudes to risk questionnaire, including attitudes towards new forms of transport o Meta-survey of multiple cyber (IUIPC, EARP)and physical (DOPSERT) surveys to develop a single survey measuring attitudes within both the cyber and physical domain o Includes questions about future transport systems and technologies (MaaS; Connected Cities; Autonomous transport) Final survey developed: 17 question survey, providing four distinct clusters with different attitudes to privacy/risk with the cyber-physical and transport domains. |
Type Of Material | Model of mechanisms or symptoms - human |
Year Produced | 2019 |
Provided To Others? | No |
Impact | No impact yet |
Title | Cyber Securtiy Taxonomy |
Description | As part of a research paper (https://doi.org/10.1145/3339252.3339282), we produced a data-driven general taxonomy to cover many different aspects of cyber security information online. The whole taxonomy has been released as open data and a website is set up to allow interactive visualisation of the taxonomy. |
Type Of Material | Computer model/algorithm |
Year Produced | 2020 |
Provided To Others? | Yes |
Impact | The taxonomy was just released a few weeks ago now, so its impact is still to be seen. We will disseminate it more widely and plan to add support to allow other researchers to co-evolve the taxonomy. The taxonomy is hosted on the website of Kent Interdisciplinary Research Centre in Cyber Security (KirCCS), EPSRC funded Kent ACE-CSR (EP/S018964/1), and will be maintained as part of core open data from KirCCS. |
URL | https://cyber.kent.ac.uk/research/cyber_taxonomy/ |
Title | Data for: The effect of government integrity on corporate governance: A leadership perspective |
Description | Data on macro variables |
Type Of Material | Database/Collection of data |
Year Produced | 2019 |
Provided To Others? | Yes |
URL | https://data.mendeley.com/datasets/yjffjsggzd/1 |
Title | Data for: The effect of government integrity on corporate governance: A leadership perspective |
Description | Data on macro variables |
Type Of Material | Database/Collection of data |
Year Produced | 2019 |
Provided To Others? | Yes |
URL | https://data.mendeley.com/datasets/yjffjsggzd |
Description | Collaboration with University of Greenwich - Human as a Security Sensor |
Organisation | University of Greenwich |
Country | United Kingdom |
Sector | Academic/University |
PI Contribution | Project PIs and RAs met and agreed on collaboration |
Collaborator Contribution | Project PIs and RAs met and agreed on collaboration |
Impact | No outcome yet |
Start Year | 2018 |
Title | Co-Eco-Devo-Evo cybercrime framework |
Description | A range of free resources were made public on the website crimeframeworks.com on 06/03/2023. The site contains an anthology of all the frameworks, definitions, ontologies etc that are intended to sharpen and extend the thinking, communication and action of researchers and practitioners in crime prevention, security and community safety. Two major components are: Glossaries, ontologies, and discourses for intervention - CRIME FRAMEWORKS https://crimeframeworks.com/glossaries-ontologies/#coedeont Evolution, crime and security - CRIME FRAMEWORKS https://crimeframeworks.com/evolutionary-approaches/#carptooth |
Type Of Technology | New/Improved Technique/Technology |
Year Produced | 2023 |
Impact | The free resources were just recently released, but part of them were reported in a research paper which has been cited 18 times by other researchers as of 16/03/2023. |
URL | https://crimeframeworks.com/ |
Title | PriVELT Android app and data extraction libraries |
Description | As part of the EPSRC funded projects PriVELT (EP/R033749/1) and ACCEPT (EP/P011896/2), work on WP3 aims at producing an Android app that will allow leisure travellers to monitor how their personal data are shared with different entities before, during and after travels and provide personalised recommendations on how to better balance their privacy and travel experience. At the time of this submission (03/2020), a number of Android libraries for automatically logging into different online services and extracting data have been produced, and a first prototype of the Android app has been produced. The app has not been released under an open source license or made publicly available, but the project plans to do so at a later time of the project or after the project's end. A number of student developers have contributed to the development of the software. The development work started in 2019 but the first prototypes were released internally in 2020. |
Type Of Technology | Software |
Year Produced | 2020 |
Impact | Since the software has not been publicly released, it has not produced impact out of the project team yet. It however helped train a number of MSc students to learn how to conduct applied research. |
Description | 'Cyber-attacks bought as easily as online shopping |
Form Of Engagement Activity | A press release, press conference or response to a media enquiry/interview |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | News story covering research |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.ft.com/content/b5273822-548a-11e8-84f4-43d65af59d43 |
Description | 'Global Cybercrime worth $1.5tn a year, study reveals |
Form Of Engagement Activity | A press release, press conference or response to a media enquiry/interview |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | News story covering research |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.computerweekly.com/news/252439584/Global-cyber-crime-worth-15tn-a-year-study-reveals |
Description | A presentation on Future Crime opportunities arising from Artificial Intelligence (AI): Eco-Devo-Evo framework |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Prof Paul Ekblom presented the basic Eco-Devo-Evo framework to a sandpit run by the Dawes Centre for Future Crime.The main outcome was a ranked set of AI-crime scenarios which would then be taken forward to generate research proposals in various ways e.g. PhD, scoping project, main project, funded partly/wholly by the Dawes Centre |
Year(s) Of Engagement Activity | 2019 |
URL | https://www.ucl.ac.uk/jill-dando-institute/research-projects/2019/jan/future-crime-opportunities-ari... |
Description | ACE CSR Winter School Keynote Address |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Postgraduate students |
Results and Impact | Ganna Pogrebna gave a keynote address at the 2020 Early Career Researcher Winter School, organised by the UK Academic Centres of Excellence in Cyber Security will be held 14th- 16th December. The winter school brings up a line-up of world-leading keynote speakers, ACE-CSR representatives for talks and roundtable discussions, exploring emerging cyber security challenges and future trends. In 2020, there was a capture the flag (CTF) competition on the last day of the conference accessible to all attendees. There were also prizes for the most valuable school engagement and CTF winners. The event allowed Ganna to showcase her work and project outputs to the early career cybersecurity researchers as well as network with like-minded researchers and professionals. |
Year(s) Of Engagement Activity | 2020 |
URL | https://vetss.org.uk/event/ace-csr-early-career-researcher-winter-school/ |
Description | AI & future crime sandpit |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Other audiences |
Results and Impact | Academia, Government, Commerce & Creative came together to identify, discuss and assess future crimes enabled through AI. We developed and influenced understanding and future focus in Academia, Government, Commerce & Creative. |
Year(s) Of Engagement Activity | 2018 |
Description | Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks: Healthcare as a use case |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This is an invited talk at the Global Cyber Security in Healthcare & Pharma Summit 2018, organized by Global Engage in London, UK. |
Year(s) Of Engagement Activity | 2018 |
Description | An invited keynot speech at IWCFTA 2020 |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | Invited keynote talk "Data Privacy in the Cyber-Physical World: Looking through the Lens of Complex Networks", IWCFTA 2020 (13th International Workshop on Complex-systems for Future Technologies and Applications), held virtually online |
Year(s) Of Engagement Activity | 2020 |
URL | http://chaos-fractal.cn/2020/2020/invitedspeakers.html |
Description | Article in WIRED in 2019 issue: Decentralised AI has the potential to upend the online economy |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Industry/Business |
Results and Impact | An article in WIRED magazine's annual issue that looks at how analysing big data on the edge will outclass offerings by more cumbersome centralised systems |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.wired.co.uk/article/decentralised-artificial-intelligence |
Description | BBC News article: Meet the data guardians taking on the tech giants |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | An article in the BBC about whether people care enough to bother about your personal data, featuring project PI Irene Ng speaking on the HAT and how data ownership rights. |
Year(s) Of Engagement Activity | 2019 |
URL | https://www.bbc.co.uk/news/business-47027072 |
Description | Bitcoin is leading to a huge upswing in money laundering, new research says |
Form Of Engagement Activity | A press release, press conference or response to a media enquiry/interview |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | News interview with Fox News covering research |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.foxnews.com/tech/bitcoin-is-leading-to-a-huge-upswing-in-money-laundering-new-research-s... |
Description | Competitive Advantage in the Digital Economy (CADE) 2018 (Venice, Italy) |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Postgraduate students |
Results and Impact | The 5th Competitive Advantage in the Digital Economy (CADE) Forum was an exclusive three-day event, bringing together academics and practitioners to discuss the challenges of the digital economy and present the latest cutting edge research. This year saw the CADE Forum enter its fifth year, and specifically, it focused on personal data, smart service systems and digital transformation. CADE's core objective is to facilitate interdisciplinary collaborations and to continue building a platform for the development of a common language for digital economy research. The Forum has already built a reputation for creating new synergies between research groups both at Warwick and other institutions, and emphasis will continue to be placed on this as well as developing collaborative opportunities between participants at CADE. At CADE, emphasis was placed on discussion and collaboration, with plenty of time allocated to both your presentation, the subsequent discussion and additional time between parallel sessions and workshops for further in depth discussions with other participants. For the first time in 2018, the CADE Forum ran four workshops related to the personal data economy: Product Design in the Personal Data Economy; Student Experience and Teaching; Data-Driven Business Models; and Behavioural Visibility in Data (BeVID)- Experiencing New Research Methods with Reality Mining. |
Year(s) Of Engagement Activity | 2018 |
URL | https://warwick.ac.uk/fac/sci/wmg/research/business_transformation/ssg/ssgabout/sswmgactivities/cade... |
Description | Crypto money-laundering: Will crypto help the money-launderers of the future? |
Form Of Engagement Activity | A press release, press conference or response to a media enquiry/interview |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | Economist article covering research |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.economist.com/finance-and-economics/2018/04/26/crypto-money-laundering |
Description | Cyber Defence Alliance 3rd Annual Conference |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Profesor Ganna Pogrebna have contributed to the roundtable on "Understanding the Criminal Mind". |
Year(s) Of Engagement Activity | 2018 |
Description | Cyber Security Live 2020 Keynote Address |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Ganna Pogrebna gave a keynote address at this conference to the FinTech/Business community, showcasing her work within the frame of ACCEPT. |
Year(s) Of Engagement Activity | 2020 |
URL | https://www.fstech.co.uk/cybersecuritylive/agenda.php |
Description | Cyber cecurity activity sheet for school pupils |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Schools |
Results and Impact | Shujun Li and Jason Nurse, "How to Beat the Cybercriminals and Stay Safe Online," Futurum Careers, Issue 4, pages 32-33, March 2020, DOI:10.33424/FUTURUM43. This article is published both in press and online, and the EPSRC funded Kent ACE-CSR (EP/S018964/1) is planning to run a number of workshops to engage with local school pupils. The article covers research done in EPSRC funded projects ACCEPT (EP/P011896/2) and PriVELT (EP/R033749/1), and other wider research at the Kent ACE-CSR. |
Year(s) Of Engagement Activity | 2020 |
URL | https://doi.org/10.33424/FUTURUM43 |
Description | CyberBitsEtc Blog - Over 100 blogs were written by Ganna Pogrebna in 2020 |
Form Of Engagement Activity | Engagement focused website, blog or social media channel |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | In 2020, Ganna Pogrebna started the CyberBitsEtc.org blog on behavioural and human aspects of cyberseecurity. During 2020, she wrote over 100 blog posts containing information about various research results from ACCEPT project. |
Year(s) Of Engagement Activity | 2020 |
URL | https://www.cyberbitsetc.org |
Description | Cybersecurity Research Seminar |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | Local |
Primary Audience | Professional Practitioners |
Results and Impact | Tasmina Islam presented an overview of the project framework to cybersecurity researchers which involved questions, comments and discussion throughout and afterwards. |
Year(s) Of Engagement Activity | 2019 |
URL | https://twitter.com/UniKentCyberSec/status/1185173453432905729 |
Description | Data ownership, rights and controls: Reaching a common understanding - Discussions at a British Academy, Royal Society and techUK seminar on 3 October 2018 |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Policymakers/politicians |
Results and Impact | Participation at discussions at a British Academy, Royal Society and techUK seminar on 3 October 2018 which provided an opportunity to explore and understand the concept, value and limitations of the idea of 'data ownership'. It considered the sound bases from which to consider and probe the concept of data ownership and discussed issues relating to the ability to exert rights and control over data use. The dialogue was a follow-up to a British Academy and Royal Society seminar on 16 October 2017 that focused on data governance, resulting in a report Data management and use: Governance in the 21st Century. This year's seminar led to the production of a report entitled Data ownership, rights and controls: Reaching a common understanding. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.thebritishacademy.ac.uk/data-ownership-rights-and-controls-reaching-common-understanding |
Description | FT podcast: Irene Ng on redistributing the economic power of data |
Form Of Engagement Activity | A broadcast e.g. TV/radio/film/podcast (other than news/press) |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | An interview on the FT with project PI Irene Ng on redistributing the economic power of data |
Year(s) Of Engagement Activity | 2018 |
Description | Forbes article - Relaxed, Anxious, Ignorant: Our Attitudes Towards CyberSecurity Are Making The Problem Worse |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Industry/Business |
Results and Impact | Article in Forbes magazine discussing an August 2018 study conducted by project Co-Is Ganna Pogrebna and Glenn Parry on individuals' perception of cybercrime and behaviour online, and how it can be categorized into four key 'risk attitudes' that vary depending on demographic and environment: opportunistic (worth the risk), anxious (not worth the risk), ignorant (don't know, don't engage) and relaxed (I'm not at risk). |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.forbes.com/sites/charlestowersclark/2018/11/09/relaxed-anxious-ignorant-our-attitudes-to... |
Description | Forbes coverage of CyberDoSPERT scale research |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Media (as a channel to the public) |
Results and Impact | Media coverage of CyberDoSPERT scale research in Forbes - 'Relaxed, Anxious, Ignorant: Our Attitudes Towards CyberSecurity Are Making The Problem Worse' on 9th Nov 2018 |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.forbes.com/sites/charlestowersclark/2018/11/09/relaxed-anxious-ignorant-our-attitudes-to... |
Description | Human Factors in Cyber Security: User authentication as a use case |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Postgraduate students |
Results and Impact | This is an invited keynote speech given to participants of ISWRACS (International Symposium and Workshop on Research Advances in Cyber Security) 2018, organized by the Hindustan Institute of Technology & Science (Hindustan University), India. A significant portion of participants were students from the hosting institution. The speech was delivered remotely via video. |
Year(s) Of Engagement Activity | 2018 |
Description | Human-in-the-Loop (HITL) AI and its Applications in Cyber Security |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | This is an internal event with an industrial partner, SecureData, on discussing potential collaboration. Work done in the project ACCEPT was covered as part of the talk. |
Year(s) Of Engagement Activity | 2018 |
Description | Hybrid Human-Machine Computing: a new paradigm of computing? |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This was a talk given as an invited OpenTech talk at a cyber security company Clearswift Ltd, which is the cyber arm of the Swiss Defence and Security company RUG. |
Year(s) Of Engagement Activity | 2018 |
Description | Industrial Roundtable on Cybersecurity Information Sharing (2018) |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Professor Ganna Pogrebna have contributed to the follow-up document on Behavioural Analytics for Cybersecurity which was circulated to the participating businesses and beyond. |
Year(s) Of Engagement Activity | 2018 |
Description | Interview with Anna Maria Tremonti on Canadian national radio's "The Current" |
Form Of Engagement Activity | A broadcast e.g. TV/radio/film/podcast (other than news/press) |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | Project PI Irene Ng was interviewed by Anna Maria Tremonti of CBC Radio "The Current" on 13 April 2018 about the activities and implications of the breaches in trust that landed Facebook's Mark Zuckerberg in front of Congress. The interviewe also looked at what the Hub of All Things was, and how it would change the data landscape. |
Year(s) Of Engagement Activity | 2018 |
URL | https://medium.com/hub-of-all-things/irene-on-how-very-little-of-our-zetabytes-of-data-is-controlled... |
Description | Invited talk at FIC 2020 |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Industry/Business |
Results and Impact | An invited panel discussion at the national cyber security forum FIC 2020, which was also attended by participants from other countries including some from the UK. A YouTube video was produced by FIC 2020 on the discussion. |
Year(s) Of Engagement Activity | 2020 |
URL | https://www.youtube.com/watch?v=dge187PVVO0 |
Description | Invited talk at Middlesex University on HHMC in 02/2021 |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Professional Practitioners |
Results and Impact | This was a departmental seminar organised by the Department of Computer Science of the Middlesex University. Work in a number of research projects was included as part of the slides. |
Year(s) Of Engagement Activity | 2021 |
URL | https://www.cs.mdx.ac.uk/colloquium-when-humans-and-computers-come-together-a-new-or-resurged-old-re... |
Description | Kent Cyber Security Forum (KCSF) 2019 |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Industry/Business |
Results and Impact | KCSF 2019 is the 2nd annual public engagement event of the Kent ACE-CSR, and this event had a special focus on serving local businesses and university students. It was attended by a good range of people from universities, industry and government. A number of research projects and external organisations supported this event and some public media sent journalists to the event. A marketing video was made for the event which has been used to help advertise the work of Kent ACE-CSR provides to the general public. A more detailed explanation of the event can be found at the event's web page. |
Year(s) Of Engagement Activity | 2019 |
URL | https://cyber.kent.ac.uk/events.html#KCSF2019 |
Description | Keynote Address at The Institution of Engineering and Technology Conference on Behavioural Science in Transport |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | Ganna Pogrebna gave a keynote talk at the Behavioural Science in Transport Event organised on November 5, 2018 by the Institution of Engineering and Technology in London (UK). The talk title was "Behavioural Aspects of the Cybersecurity of Transport". The event was attended by policy makers, practitioners, academics, students, and the general public. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.theiet.org/events/documents/bst-presentations.cfm |
Description | Keynote Talk at the Data Debate: "Cyber Attacks: Is Artificial Intelligence the New Defence?" |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Public/other audiences |
Results and Impact | From drones and ransomware to disinformation, new technologies are enabling new kinds of conflict. Is a cyber attack an act of war? With artificial intelligence poised to revolutionise the speed and impact of attacks, how can we prevent cyberspace turning into a battleground? Prof. Pogrebna was a part of an expert panel on September 14, 2018 at the British Library which discussed these and other issues. The Debate was chaired by writer and broadcaster Timandra Harkness. Timandra presents BBC Radio 4 series, FutureProofing, and has presented the documentaries, Data, Data Everywhere, Personality Politics & The Singularity. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.youtube.com/watch?v=KIrrA1-O6LE |
Description | MietSpiegel article: Facebook and Google: The Data Guards Fight Back |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Public/other audiences |
Results and Impact | An article in MietSpiegel on how the data guards are fighting back - German version of the BBC article entitled HAT as data guardian |
Year(s) Of Engagement Activity | 2019 |
Description | Ministry of Defence AI Fest |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Policymakers/politicians |
Results and Impact | Ganna Pogrebna spoke on behavioural aspects of cybersecurity at the MOD AI Fest on October 16, 2020. The event brought together military, senior civil servants, scientists & engineers from across UK Government, industry, academia and international partners and aimed to help attendees understand how they can apply AI to their problems. |
Year(s) Of Engagement Activity | 2020 |
URL | https://defencedigital.blog.gov.uk/2020/12/04/dstl-ai-fest-lessons-from-running-a-virtual-conference... |
Description | Nowhere to hide? Privacy challenges and solutions in smart cities: From ANPR to social IoT |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This is an invited talk at the UK-India Workshop on Managing Privacy in the age of IoT, organized by the City, University of London, UK. |
Year(s) Of Engagement Activity | 2018 |
Description | Poster presentation at a Machine Learning workshop |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Industry/Business |
Results and Impact | This is a workshop organised jointly by the Kent Innovation and Enterprise with School of Computing, where posters about EPSRC funded project ACCEPT, PriVELT and the Kent ACE-CSR were displayed. The main audience of the event was businesses from local regions. |
Year(s) Of Engagement Activity | 2019 |
Description | Poster presentation of ACCEPT at Annual ACE-CSR Conference 2018 |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | This is a poster presented for the project at the NCSC organised Annual ACE-CSR Conference in June 2018. The event was participated by researchers from all ACE-CSRs and UK cyber security Research Institutes, including PhD students, people from government, industry and other organisations. |
Year(s) Of Engagement Activity | 2018 |
Description | Poster presentation of ACCEPT in Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) Public Engagement Event 2018 |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Public/other audiences |
Results and Impact | Two posters were presented by Tasmina Islam. Overall aim of the project and technical framework were explained to the audience through poster presentation and Q&A. |
Year(s) Of Engagement Activity | 2018 |
URL | https://cyber.kent.ac.uk/events.html |
Description | Presentation to Australian Institute of Criminology, Canberra, on Eco-Devo-Evo approach |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This was an invited presentation to the Australian Institute of Criminology https://aic.gov.au/about, which is Australia's national research and knowledge centre on crime and justice, compiling trend data and disseminating research and policy advice. The aim of the visit was for me to brief the research team (about 25 social researchers) on the 'Eco-Devo-Evo' approach developed for Project ACCEPT. The presentation https://twitter.com/AICriminology/status/1199485188478103553 was enthusiastically received and attendees joined in a wide-ranging discussion afterwards. I don't expect immediate impact, rather, a change in awareness of timescale issues in the crime/security arms race. "Tackling new and emerging crime problems: The Eco, Devo, Evo Framework There is growing appreciation that we are in a perpetual arms race with offenders who are adaptive and ready to exploit political, economic, social, technological, legal and environmental changes to their advantage. This is particularly so with organised crime groups and networks, and terrorists who are persistent, highly-motivated and may be well-resourced. The cyber dimension, especially, has relaxed many constraints of time, space and effort in offending and has sped everything up and spread the reach of criminals. To keep up, the security side must adopt a radically new approach - out-anticipating offenders, out-innovating them and putting brakes on their evolution. This in turn requires a capacity to think differently about how crime is caused, and how we intervene, over diverse time frames. The Eco, Devo, Evo framework Paul has been developing, with colleagues, to serve this purpose draws on thinking in biology and cultural evolution and mainstream crime science. It focuses on the interaction between agents (individuals, groups or networks acting as offenders, crime preventers and crime promoters) and their physical, social and cyber environment, operating over successively longer time frames: Ecology - the here-and-now interactions of agents within their environment, using their existing repertoire of behaviour and resources to respond to criminal opportunities or indeed create them in line with goals and plans. Development - changes undergone by agents within a lifetime, (criminal) career or a generation - individual learning, cultural acquisition of values, attitudes, goals and techniques; organisational development and growth Evolution - changes or variations that occur over successive generations - whether of perpetrator techniques/crime scripts, tools and weapons, goals and plans, and operating system or application versions. The focus is on how those changes are generated through innovation, selected through success/failure and replicated through various forms of transmission such as teaching in person or online tutorials, or provision of crime as a service or exploit kits e.g. with computer viruses; how offenders and preventers co-evolve in protracted arms races against the changing social and technological background; how more recent evolutionary concepts such as 'evolution of evolvability' and 'niche construction' help us understand the way offenders not only adapt to their environments of opportunity and security but actually make their environment more conducive to crime, as in corruption. In his talk Paul will elaborate on these ideas, which are still developing, and draw provisional lessons for security strategy, operations and tactics in cybercrime prevention and more generally. He hopes for feedback from participants, which will help him select the elements to evolve further." |
Year(s) Of Engagement Activity | 2019 |
URL | https://accept.cyber.kent.ac.uk/pub/docs/Ekblom-20191127.pptx |
Description | Presentation to the Department for Transport on factors influencing location sharing decisions in connected transport |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Policymakers/politicians |
Results and Impact | Presented findings from our research on perceptions of privacy in relation to location sharing in transport to improve awareness of the differences across the population in motivations for location sharing behaviour and the need for more research in this area as more data reliant transport modes are introduced. This led to discussions around potential future work in relation to data sharing behaviour as well as prompted discussions with the national cyber security centre (NCSC) for potential collaborations. |
Year(s) Of Engagement Activity | 2020 |
Description | Prof Shujun Li gave a keynote talk at one of the ysec (Why Security) Online Webinar Series, organized by the Information Security Technical Committee of the Shanghai Computer Society and Shanghai Jiao Tong University |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | Professor Shujun Li gave a keynote talk on "When Humans and Computers Come Together: Cyber Security, HCI, AI and Beyond", part of the ysec (Why Security) Online Webinar Series, organized by the Information Security Technical Committee of the Shanghai Computer Society and Shanghai Jiao Tong University, held virtually online |
Year(s) Of Engagement Activity | 2023 |
Description | Prof Shujun Li gave an invited talk at 2021 International Cryptography and Coding Frontier Symposium |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Invited talk on "Observer-Resistant Password Systems: How hard to make them both usable and secure?", 2021 International Cryptography and Coding Frontier Symposium, held virtually online |
Year(s) Of Engagement Activity | 2021 |
Description | Prof Shujun Li gave an invited talk at 2022 3rd UK Cyber Security PhD Winter School |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Postgraduate students |
Results and Impact | Invited talk "Funding opportunities for ECRs (Early Career Researchers)", 2022 3rd UK Cyber Security PhD Winter School, organized by the University of Surrey, University of Bristol, University of Kent, University of Lancaster, RHUL(Royal Holloway, University of London), Northumbria University, and NCSC (National Cyber Security Centre), UK, held virtually online |
Year(s) Of Engagement Activity | 2022 |
URL | https://www.surrey.ac.uk/uk-cyber-security-phd-winter-school/winter-school-programme |
Description | Prof Shujun Li gave an invited talk at AI Summit London 2021, London, UK |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | Invited talk on "From AI for Security to Secure, Privacy-Friendly And 'Good' AI", AI Summit London 2021, London, UK |
Year(s) Of Engagement Activity | 2021 |
URL | https://theaisummit.com/ |
Description | Prof Shujun Li gave an invited talk at EIS 2023 (6th Global Emerging Innovation Summit) |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Professor Shujun Li gave an invited talk on "From AI for (Cyber) Security to Trustworthy and Responsible AI", part of the EIS 2023 (6th Global Emerging Innovation Summit). |
Year(s) Of Engagement Activity | 2023 |
URL | https://eis23.org/ |
Description | Prof Shujun Li gave an invited talk at Webinaire Cybersécurité et véhicules connectés, organized by GIS CybCOM |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Invited talk on "Privacy through the Lens of Data Flows", Webinaire Cybersécurité et véhicules connectés, organized by GIS CybCOM, held virtually |
Year(s) Of Engagement Activity | 2021 |
URL | https://cybcom.univ-gustave-eiffel.fr/evenements/dernier-evenement/ |
Description | Prof Shujun Li gave an invited talk at the 2024 GOETEC Annual Conference |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Professor Shujun Li gave an invited talk on "Developing the Regional Cyber Security Ecosystem in Kent and Medway", part of the 2024 GOETEC Annual Conference, held at the University of Kent, Canterbury, UK |
Year(s) Of Engagement Activity | 2023 |
URL | https://goetec.ac.uk/ |
Description | Prof Shujun Li gave an invited talk to the School of Cyber Science and Engineering, Southeastern University, China |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Postgraduate students |
Results and Impact | Professor Shujun Li gave an invited talk on "Privacy through the Lens of Data Flows", organized by the School of Cyber Science and Engineering, Southeastern University, China. |
Year(s) Of Engagement Activity | 2023 |
URL | https://cyber.seu.edu.cn/2023/1009/c20213a467792/page.psp |
Description | Resilience to Cybercrime - presentation at workshop |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | This presentation was by invitation to a joint EPSRC cSALSA project / National CyberSecurity Centre (NCSC) workshop on the topic of "Citizen-Centred Cyber Resilience: Building Resilient Communities from the Ground up", 5 March 2020. My title was 'Resilience to (Cyber)Crime - a View from Design and Crime Science'. I covered: Defining resilience; which aspects of resilience to focus on; the challenges facing cyber resilience efforts (adaptive offenders, arms races and co-evolution); and the human side of resilient security and resilient crime (the roles people and organisations play in crime and civil life, professional know-how in security, and involving 3rd parties in security - mobilisation and behaviour change). The presentation provoked some discussion and various participants have sought to make contacts. |
Year(s) Of Engagement Activity | 2020 |
URL | https://accept.cyber.kent.ac.uk/pub/docs/Ekblom-20200304.pptx |
Description | Security Champions Online |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | The main goal of this activity was to present the project results to a large group of international practitioners in cyber security. |
Year(s) Of Engagement Activity | 2021 |
URL | https://f.hubspotusercontent00.net/hubfs/2631050/0657%20SCO%20Pakistan/Security%20Champions%20Pakist... |
Description | Socio-technical Aspects of Privacy Protection |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This is an invited keynote speech at PriCom 2018 (4th International Symposium on Privacy Computing), in Boppard, Germany. The event was mainly for researchers but had PhD students attending as well. |
Year(s) Of Engagement Activity | 2018 |
URL | http://www.pricom2018.de/programme/ |
Description | Socio-technical Aspects of Privacy Protection |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This is an invited keynote speech at PST 2018 (16th Annual Conference on Privacy, Security and Trust), in Belfast, Northern Ireland, UK. |
Year(s) Of Engagement Activity | 2018 |
URL | https://pstnet.ca/pst2018/2018/invited-speakers/#li |
Description | The 3rd CyAN-Sky Thinking Session on Humans as the "Weakest Link" |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Ganna Pogrebna was a part off the expert panel organised by the Cybersecurity Advisers Network (https://cyan.network/). The overwhelming majority of modern cyber threats have one common denominator - people as over 2/3 of all cyber threats involve at least some element of social engineering (i.e., tricking people into doing something they ARE NOT supposed to do; or making them fail to do something they ARE supposed to do). However, many cybersecurity problems are addressed using technology (i.e., patching with tech approach) and employing "zero-trust" systems, which may often be productivity-inhibiting. As a result, cyber security systems become less and less understandable to humans, but do not become more effective. Billions are spent annually on new cyber security software, software updates, and cyber security insurance. Security awareness training charge individuals thousands. Yet, cybercrime does not disappear - in fact, the number of cases and damage increases. Key to these issues is the wrong mindset portraying humans as the "weakest link" in the cyber security chains. The purpose of this panel was to facilitate a broad discussion on how to change this mindset and achieve effective "patching with people" business strategies. The panelists were: Ganna Pogrebna, Professor of Business Analytics & Data Science, Alan Turing Institute and editor of CyberBitsEtc!, Bronwyn Boyle, Head of Security & Assurance, Open Banking, and Karen Renaud, Chair of Cybersecurity at Abertay University |
Year(s) Of Engagement Activity | 2020 |
URL | https://cyan.network/blog/2020/11/24/cyan-sky-thinking-session-3-humans-as-the-weakest-link-will-the... |
Description | The GDPR, market disrupters and innovators: friends or foes? Article in Privacy Laws & Business UK Report, Issue 96 (March 2018) |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | The HAT was featured in this article about the GDPR in a report by Privacy Laws & Business, which provides an independent privacy laws information service to many of the world's largest companies, specialist lawyers and has over 2000 clients in 53 countries. Its clients include 70% of the Global and UK top ten companies in the Financial Times lists. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.privacylaws.com/Publications/uk/ |
Description | The GDPR, market disrupters and innovators: friends or foes? Article in Slaughter & May newsletter |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | This article in law firm Slaughter & May's newsletter is a reprint of the article The GDPR, market disrupters and innovators: friends or foes? which appeared in Privacy Laws & Business UK Report, Issue 96 (March 2018) The HAT was featured in this article. Slaughter & May has clients throughout the world. They range from governments to entrepreneurs, from funds to leading banks, from retailers to entertainment companies and from diversified industrial conglomerates to Premier League football clubs. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.slaughterandmay.com/media/2536727/the-gdpr-market-disrupters-and-innovators-friends-or-f... |
Description | Turing-Dstl Joint Event on Behavioural Aspects of Cybersecurity |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Policymakers/politicians |
Results and Impact | Ganna Pogrebna gave a keynote address on "Behavioural Cyber Security" at the event jointly organised by the Alan Turing Institute, Dstl, and GCHQ at the Alan Turing Institute on July 30, 2020. The event was closed and mostly targeted at cyber security practitioners and policy makers. Several academics also attended the meeting. The purpose of the talk was to showcase the current research outputs to policy makers. |
Year(s) Of Engagement Activity | 2020 |
Description | Virtual cash helps cyber-thieves launder money, research suggests |
Form Of Engagement Activity | A press release, press conference or response to a media enquiry/interview |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Public/other audiences |
Results and Impact | News story covering research |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.bbc.co.uk/news/technology-43428264 |
Description | WHY THE GDPR SIGNALS A GREATER BATTLE OVER DATA - Article in LS:N Global |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Industry/Business |
Results and Impact | An article written by project PI Irene Ng on how regulations such as the GDPR are just the beginning of a new power play between consumers and service providers. This was published on LS:N Global, a subscription-based insights platform that documents new consumer behaviour and key industry trends to give business professionals the confidence to make informed decisions about the future. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.lsnglobal.com/opinion/article/22233/why-the-gdpr-signals-a-greater-battle-over-data |
Description | Why I Believe We Should Own Our Own Data - The Day |
Form Of Engagement Activity | A magazine, newsletter or online publication |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Schools |
Results and Impact | An excerpt from a 2017 Financial Times article on personal data featuring the HAT appeared in The Day, a daily online newspaper for teenagers focusing on the big issues transforming the world. |
Year(s) Of Engagement Activity | 2018 |
URL | https://theday.co.uk/opinions/why-i-believe-we-should-own-our-own-data |
Description | Wolfson-HAT Annual Symposium on the Digital Person 2018 |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | The Digital Person symposium is an annual event organised by the HAT Community Foundation and Wolfson College Cambridge that discusses personal data from three perspectives: (1) digital personhood, law, freedom and democracy (2) value, economics and markets and (3) data analytics, data science and technology. Symposium participants are drawn from industry captains, policy makers, government representatives, combined with thought leaders from the sciences, humanities and social sciences with discussions relating to law, computer science, history, sociology, entrepreneurship, business, economics and the global society. ConTriVE P-I Irene Ng and Co-I Jon Crowcroft were co-chairs of this This unique cross-disciplinary symposium along with Professor John Naughton. Aside from creating a unique environment for a robust discussion that is relevant and important, the symposium also produced a white paper on the state of the digital person in a connected and digital society. The paper highlighted the issues, opportunities and tensions of the digital person in 2018 and summarised the challenge that can be put into the larger context of the Internet and its implications for society, technology and the economy. |
Year(s) Of Engagement Activity | 2018 |
URL | https://www.hat-lab.org/programs/2018/9/8/output-wolfsonhat-2019 |
Description | Workshop on Refining Evidence-Based Methods in Cyber Security Research |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Other audiences |
Results and Impact | Researchers, practicioners and funding bodies spent two days taking stock in the present state of evidence-based methods in cyber security research, discuss 'what good research looks like' and explore a way ahead to provide a resource for the community and incentivise its uptake. |
Year(s) Of Engagement Activity | 2018 |
URL | https://osf.io/t3c6m/wiki/home/ |