Despite being recognized as an ’eminent scholar’ and invited to have “any type of article” considered for publication in their forthcoming journal, I feel I must decline. Good scraping skills, however.
Despite being recognized as an ’eminent scholar’ and invited to have “any type of article” considered for publication in their forthcoming journal, I feel I must decline. Good scraping skills, however.
My paper, Cybersecurity in a Post Data environment has been published! You can access it here (open access for a few weeks, then reverting to closed). Abstract: Smart Devices ‘cross the streams’ of both the physical and virtual worlds and can benefit their users greatly as well as society in general. However, with the growth…
I will be speaking at BotConf 2020 in December. The event is online and can be accessed here: https://www.botconf.eu I will be presenting a paper entitled ‘A Proposed Civil Liability Framework for Disrupting Botnets, with a particular focus on Smart Devices’ and closer to the event, I will be making the presentation, slides and paper…
The answer is simple: the one that works best for you. This blog arose from speaking to some PhD students and ECRs who, when asked why they used they used X piece of software, answered that it was because it’s the one their supervisor or spouse used, or that it was the one which was…
I will be speaking at the SLS Conference in September. The event is online, and can be accessed here: https://www.slsconference.com. I am taking part in the CyberLaw stream and will be speaking on 4 September at 09.15, where I will be presenting my paper “Does Cybersecurity Legislation Make Us Safer Online? An Analysis of the…
The Law School in Queen’s have an excellent weekly podcast, where academics speak with their colleagues or with PhD students to discuss their current research, life in Queen’s and current events. I recently spoke with Dr. Rachel Killean, the LawPod director about the focus of my research, the decision to start a PhD after quite…
My new working paper is available [Link]. This paper outlines the threats which are posed by the hacking of Smart Devices, and provides a rudimentary methodology to apportion liability to either the manufacturer or the user, where appropriate, following a hack. This is done in a robust manner, from a technologically agnostic perspective, to ensure…