12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Browse

Results for security

Researchers

  1. Dr Mark Lacy

Publications & Outputs

  1. Privacy, security, liberty: informing the design of emergency management information systems

    Buscher, M., Wood, L. & Perng, S-Y. 12/05/2013 10th International Conference on Information Systems for Crisis Response and Management. Comes, T., Fiedrich, F., Fortier, S., Geldermann, J. & Müller, T. (eds.). Karlsruhe: KIT

    Research output: Contribution in Book/Report/ProceedingsPaper

  2. Is Hindu nationalism a threat to religious minorities in Eastern India?

    Mukherjee, K. 2013 In : The Round Table : The Commonwealth Journal of International Affairs. 102, 5, p. 445-457 13 p.

    Research output: Contribution to journalJournal article

  3. A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A. 10/2011 In : Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to journalJournal article

  4. Securing by design

    Weber, C. & Lacy, M. 07/2011 In : Review of International Studies. 37, 3, p. 1021-1043 23 p.

    Research output: Contribution to journalJournal article

  5. High-Speed Narrowband PLC in Smart Grid Landscape – State-of-the-art

    Haidine, A., Adebisi, B., Treytl, A., Pille, H., Honary, B. & Portnoy, A. 04/2011 Power Line Communications and Its Applications (ISPLC), 2011 IEEE International Symposium on. IEEE, p. 468-473 6 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  6. Risky individuals and the politics of genetic research into aggressiveness and violence.

    Pieri, E. & Levitt, M. 11/2008 In : Bioethics. 22, 9, p. 509-518 10 p.

    Research output: Contribution to journalJournal article

  7. Designer Security: Control Society and MoMA's SAFE: Design Takes on Risk

    Lacy, M. 04/2008 In : Security Dialogue. 39, 2-3, p. 333-357 25 p.

    Research output: Contribution to journalJournal article

  8. Securing Aspect Composition

    Camilleri, A., Blair, L. & Coulson, G. 2008 Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM, p. 278-279 2 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  9. From war to war: 'Lord Of The Flies' as sociology of spite

    Diken, B. & Laustsen, C. B. 2006 In : Alternatives. 31, 4, p. 431-452 22 p.

    Research output: Contribution to journalJournal article

  10. Improvements for the IPv6 Access Network Protection Protocols in Wireless Environments

    Katsaros, I. & Honary, B. 11/2005 3G and Beyond, 2005 6th IEE International Conference on. London : IEEE, p. 97-100 4 p.

    Research output: Contribution in Book/Report/ProceedingsPaper

  11. Relative pay and job satisfaction: some new evidence

    Taylor, J., Bradley, S. & Nguyen, A. N. 2003 Lancaster University: The Department of Economics, (Economics Working Paper Series)

    Research output: Working paper

More results »

Projects