Home > Research > Browse

Results for cybersecurity

Publications & Outputs

  1. How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review

    Dutkowska-Zuk, A., Bourne, J., An, C., Gao, X., Cetinkaya, O., Novitzky, P., Ogunniye, G., Cooper, R., De Roure, D., McCann, J., Watson, J., Watson, T., Jones, E., Vasconcelos, J. D. (ed.), Barbosa, H. (ed.) & Cordeiro, C. (ed.), 31/01/2024, In: Information. 15, 2, 80.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  2. A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software

    Weir, C., Dyson, A. & Prince, D., 25/09/2023, (E-pub ahead of print) Proceedings of the 2023 IEEE Secure Development Conference (SecDev). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Incorporating Software Security: Using Developer Workshops to Engage Product Managers

    Weir, C., Becker, I. & Blair, L., 31/03/2023, In: Empirical Software Engineering. 28, 2, 33 p., 21.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Exploring the Shift in Security Responsibility

    Weir, C., Migues, S. & Williams, L., 30/11/2022, In: IEEE Security and Privacy Magazine. 20, 6, p. 8-17 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Talking Cybersecurity with Health IoT Developers

    Weir, C., Dyson, A. & Prince, D., 29/09/2022.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  6. Cybersecurity, Race, and the Politics of Truth

    Whyte, J., 1/08/2022, In: Security Dialogue. 53, 4, p. 342-362 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. A Visual Exploration of Cybersecurity Concepts

    Sturdee, M., Thornton, L., Wimasaliri, B. & Patil, S., 22/06/2021, C&C '21: Creativity and Cognition. New York: ACM, 10 p. 46

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. The Secure Development Handbook

    Weir, C. & Ford, N., 1/10/2018, 1.1 ed. London: Amazon Kindle. 47 p.

    Research output: Book/Report/ProceedingsBook

  10. The changing character of power projection and maritime security in a digital age

    Venables, A., 2017, (Unpublished) Lancaster University. 297 p.

    Research output: ThesisDoctoral Thesis

  11. Gagged and doxed: Hacktivism’s self-incrimination complex

    Fish, A. R. & Follis, L., 1/06/2016, In: International Journal of Communication. 10, p. 3281-3300 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

More results »

Activities

  1. 2013 IEEE International Conference on Cybernetics, CYBCO-2013

    Plamen Angelov (Chair)

    2013

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience