SECReT 2009 PhD projects
- The transfer, persistence and secondary transfer of gunshot residue (GSR): Implications for crime reconstruction and forensic protocol studied using Bayesian modelling
- To what extent can forensic evidence aid in the investigation and prosecution of internal child sex trafficking (ICST)?
- Complex systems approaches to issues in crime and security
- Developing tools for anticipating and mitigating the negative societal impact, while preserving the positive impact, of security technologies for use by the developers of these technologies upstream in the design process.
- How new ways of spatial analysis can improve the geographical understanding of illegal drug markets and the distribution of drug-related crime
- Computational cryptography
- Developing analytical Blood Pattern Analysis (BPA) techniques for environmentally altered bloodstains; and examining the range and influence of visualization methods available for BPA presentation in the context of jury decision making.
- Optimisation of illicit material detection using X-ray diffraction: Drug identification using Low Angle X-ray Scatter - DILAX III
- Improving the understanding of and responses to internal child sex trafficking in the UK: An empirical multi-method analysis
- Securing threat detection: Synergy of technological and neuropsychological factors
Developing tools for anticipating and mitigating the negative societal impact, while preserving the positive impact, of security technologies for use by the developers of these technologies upstream in the design process.
7 March 2012
The aim of my research project is to develop tools for anticipating and mitigating the negative societal response, while preserving and promoting the positive societal response, of society to security technologies, for implementation upstream in the design process. This reflects my belief that those who design and create new security technologies are not simply bringing into being technologies within which the features, functions, and capabilities which will elicit a negative social response are pre-determined. Rather these can be influenced by the conscious design choices of these individuals.
By security technologies I am referring to the product of an engineering endeavour which seeks to deter, prevent or detect crimes, and/or enhance the security of individuals, their property, or the state (including its infrastructure). It is not restricted to technologies designed by individuals holding formal qualifications, such as engineers, scientists, or industrial designers. Finally it encompasses all forms of engineering pursuit so long as what is produced has either a physical or digital presence. The content and shape of these tools will be based on commonalities identified through analysis of both controversial and less-controversial security technologies respectively, as well as interviews with those currently developing these technologies.
Testing of these tools will entail volunteer-based experiments whereby postgraduate engineering students will be required to design security technologies based on hypothetical scenarios, with or without the benefit of our proposed tools. These results will then be assessed by wider focus groups to determine whether technologies designed using our tools possess greater social acceptability.