- Privacy, Security, and Data Protection
- Information and Cyber Security
- Innovative Human-Technology Interaction
- Cybercrime and Law Enforcement Studies
- Social Media and Politics
- Cybersecurity and Cyber Warfare Studies
- Information Systems Theories and Implementation
- Persona Design and Applications
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Sexuality, Behavior, and Technology
- Innovative Approaches in Technology and Social Development
- Digital and Cyber Forensics
- ICT in Developing Communities
- Technology Use by Older Adults
- Software Engineering Techniques and Practices
- Smart Cities and Technologies
- Network Security and Intrusion Detection
- Traumatic Brain Injury and Neurovascular Disturbances
- Access Control and Trust
- Global Security and Public Health
- Data Visualization and Analytics
- Electronic Health Records Systems
- Mobile Crowdsensing and Crowdsourcing
- Child Development and Digital Technology
Royal Holloway University of London
2014-2025
Universidad de Londres
2024
Edith Cowan University
2012-2014
Newcastle University
2014
University of Luxembourg
2012
University of London
2010
King's College London
2007
Assumptions are made by government and technology providers about the power relationships that shape use of technological security controls norms under which usage occurs. We present a case study carried out in North East England examined how community might work together using digital information sharing platform to respond pressures welfare policy change. describe an inductive consideration this highly local before reviewing it light broader theory. By taking approach we problematise...
It has been argued that human-centred security design needs to accommodate the considerations of three dimensions: (1) security, (2) usability and (3) accessibility. The latter not yet received much attention. Now governments health services are increasingly requiring their citizens/patients use online services, need for accessible privacy become far more pressing. reality is that, many, measures often exasperatingly inaccessible. Regardless outcome debate about social acceptability...
In this paper, we report on a three-year endeavour that fostered 18 collaborations between academic and non-academic organizations to co-create responses social (in)justice issues in digital societies. The projects range of individuals organisations connected programme offer snapshot the state justice thinking within UK economy research sector. Our analysis shows how programme’s constellations actions enacted different modes resistance attempting reshape people’s relationship power dynamics,...
Framed within the theoretical lens of positive and negative security, this paper presents a study newcomers to Sweden roles mobile phones in establishment new life. Using creative engagement methods through series workshops, two researchers engaged 70 adult participants enrolled into further education colleges Sweden. Group narratives about phone use were captured outputs, researcher observations notes analysed using thematic analysis. Key findings show that offers security for individuals...
This paper presents a study of mobile phone use by people settling in new land to access state provided digital services. It shows that literacy and technology are not the only resources capabilities needed successfully services do guarantee straightforward resettlement process. Using creative engagement methods, research involved 132 "newcomers" seeking settle Sweden. Ribot Peluso's theory (2003) was employed examine complex web experienced our participants. We uncover when communities...
The joint study of computer security, privacy and human-computer interaction (HCI) over the last two decades has shaped a research agenda focused upon usable & security. However, in HCI more generally there long been an awareness need to understand design for user experience, recognition complex multi-faceted role that technology now plays our lives. In this paper we add growing discussion by introducing notion experience-centered We argue order engage users around issues related experiences...
Observer variability in local radiological reading is a major concern large-scale multi-center traumatic brain injury (TBI) studies. A central review process has been advocated to minimize this variability. The aim of study compare with TBI imaging datasets and investigate the added value review. total 2050 admission computed tomography (CT) scans from subjects enrolled Collaborative European NeuroTrauma Effectiveness Research Traumatic Brain Injury (CENTER-TBI) were analyzed for seven main...
Across Europe, refugees are required to engage with the "civic turn" -- a process of integrating into social and cultural aspects new land. Over two-year period, we engaged 89 settling in Sweden, explore how accelerated digitalised resettlement processes shape civic turn. Framed within wider literature on transitioning everyday insecurities, show this "digital exacerbates existing barriers experienced by refugees. By critically analysing these barriers, reveal turn rests upon series...
In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus much corporate state-funded research. Data visualization regarded as important tool in detection prediction risk vulnerability cybersecurity, but discussion tends to remain at level usability tools how reduce cognitive load on consumers visualizations. This rooted a desire simplify complexity cybersecurity. article argues that while simplification are goals for designers visualizations, there wider...
Over half of Syrian refugee households in Lebanon are food insecure with some reliant on an electronic voucher (e-voucher) system for aid. The interplay between the digitisation aid, within socio-technical context refugees, and community collaborative practices is yet to be investigated. Through design engagements interviews refugees shop owners we explore experiences a using e-voucher system. We provide insights into environment which dispensing information power asymmetries experienced,...
Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing omnipresent threat of next “cyber-attack” or emergence a new vulnerability in highly interconnected supply chains. However, such discursive positioning its resolution typically reinforced, perpetuated, dominant power structures forms violence well...
This paper presents comic strips as an approach to align personas and narrative scenarios; the resulting visual artifact was tested with information security practitioners, who often struggle wider engagement. It offers ways in which different professional roles can work together share understanding of complex topics such security. also user-centered design practitioners a way reflect on, participate with, user research data.
With the move to deliver services on-line, there is a reduction in opportunities for service user discuss and agree terms of management their personal data.As focus turned on-line technologies, design question becomes one privacy protection not negotiation conflict resolution.However, findings from large survey outputs several follow-up groups reflect need systems also support different types consent dialogues.These dialogues are used resolution dilemmas through selection effective...
Consent is a multifaceted concept that has not received much attention in information systems literature. In this paper we categorise current electronic consent decision making into first generation, ex-post and principled Electronic Management. We argue for the adoption of ECM as way forward to management systems, outline research framework ECM, proposing three key components: theory, norms, norms' manifestation. A real world context then selected illustrate framework's intention.
The aim of many forms digitalized welfare is to offer a personalized, holistic service that affordable, sustainable, efficient, encouraging and leaves room for voluntary action. We argue these goals be achieved, consideration has given both the design system delivered by provider ecosystem further shapes experience system. In such an not only should state-provided considered but so too community support, as well alternative methods accounting societal contribution. this paper, we use...
Purpose As part of the growing necessity for inter-organisational and multi-disciplinary interaction to facilitate complex innovation in digital security, there needs be greater engagement with regulation process. This is particularly true case security technologies that are embedded within wider systems largely invisible most users system. paper aims describe stakeholders’ perspectives on process evaluates implications these anticipatory security. Design/methodology/approach Using a...