Home > Research > Browse

Results for cybersecurity

Publications & Outputs

  1. Incorporating Software Security: Using Developer Workshops to Engage Product Managers

    Weir, C., Becker, I. & Blair, L., 31/03/2023, In: Empirical Software Engineering. 28, 2, 33 p., 21.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Exploring the Shift in Security Responsibility

    Weir, C., Migues, S. & Williams, L., 30/11/2022, In: IEEE Security and Privacy Magazine. 20, 6, p. 8-17 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Talking Cybersecurity with Health IoT Developers

    Weir, C., Dyson, A. & Prince, D., 29/09/2022.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  4. Cybersecurity, Race, and the Politics of Truth

    Whyte, J., 1/08/2022, In: Security Dialogue. 53, 4, p. 342-362 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. A Visual Exploration of Cybersecurity Concepts

    Sturdee, M., Thornton, L., Wimasaliri, B. & Patil, S., 22/06/2021, C&C '21: Creativity and Cognition. New York: ACM, 10 p. 46

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. The Secure Development Handbook

    Weir, C. & Ford, N., 1/10/2018, 1.1 ed. London: Amazon Kindle. 47 p.

    Research output: Book/Report/ProceedingsBook

  8. The changing character of power projection and maritime security in a digital age

    Venables, A., 2017, (Unpublished) Lancaster University. 297 p.

    Research output: ThesisDoctoral Thesis

  9. Gagged and doxed: Hacktivism’s self-incrimination complex

    Fish, A. R. & Follis, L., 1/06/2016, In: International Journal of Communication. 10, p. 3281-3300 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  11. Small business cyber security workshop 2013: towards digitally secure business growth

    Prince, D. & King, N., 29/04/2013, Lancaster: Lancaster University. 22 p.

    Research output: Book/Report/ProceedingsOther report

More results »

Activities

  1. 2013 IEEE International Conference on Cybernetics, CYBCO-2013

    Plamen Angelov (Chair)

    2013

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience