Senior Lecturer in Cyber Security
Norwich, UNITED KINGDOM
He is researching technology systems that shape people’s lives, often on how computers are capturing insights & steering choices & decisions
Ph.D., Computer Science
B.Sc., Computer Science
Eastern Daily Press online
Lead researcher Dr Oliver Buckley, from UEA's school of computing sciences, said businesses and governments were increasingly turning to chatbots to feed user demand for fast, reliable and accurate information. "Chatbots are all around us, particularly in customer support roles. They're speaking to us on the phone, emailing us, and responding to text messages - with answers to queries and even providing advice and guidance," he said.view more
Traditionally cyber security has focused on defending against external threats, over the last decade we have seen an increasing awareness of the threat posed by internal actors. Current approaches to reducing this risk have been based upon technical controls, psychologically understanding the insider’s decision-making processes or sociological approaches ensuring constructive workplace behaviour.
There is an increasing shift in technology towards biometric solutions, but one of the biggest barriers to widespread use is the acceptance by the users. In this paper we investigate the understanding, awareness and acceptance of biometrics by the general public. The primary research method was a survey, which had 282 respondents, designed to gauge public opinion around biometrics.
The major growth in gaming over the last five to ten years has been through the expansion in online gaming, with the most frequent gamers now playing more games online than with others in person. The increase in cooperative multiplayer online gaming, where players who do not know each other come together in teams to achieve a common goal, leads to interesting social situations.
Smartphones and tablets are becoming ubiquitous within our connected lives and as a result these devices are increasingly being used for more and more sensitive applications, such as banking. The security of the information within these sensitive applications is managed through a variety of different processes, all of which minimise the exposure of this sensitive information to other potentially malicious applications.
The use of smartphones is becoming ubiquitous in modern society, these very personal devices store large amounts of personal information and we use these devices to access everything from our bank to our social networks, we communicate using these devices in both open one-to-many communications and in more closed, private one-to-one communications.