Matthew Rice (Open Rights Group): Do we need the Third Sector in the debate about technology and ethics? (School Seminar)

Abstract:

Matthew Rice, Scotland Director for the Open Rights Group, the digital rights campaigning organisation, will lead a seminar discussing the role of civil society organisations in the discourse of technology, rights, regulation, and norms. Computer Scientists sit at an important point in this debate, as individuals affected by changes in norms, but more importantly as builders of the applications and the infrastructure that reflect these norms.

The seminar will discuss the impact civil society has on changing norms and laws around the world, and why these actors matter in the space between governments, companies, and wider society. It will introduce students to the Open Rights Group, the UK’s only technology and human rights grassroots campaigning organisation on t, and its current work in the area of technology and human rights.

Digital technology has transformed the way we live and opened up limitless new ways to communicate, connect, share and learn across the world. But for all the benefits, technological developments have created new threats to our human rights. The Open Rights Group raise awareness of these threats and challenge them through public campaigns, legal actions, policy interventions and tech projects.

Event details

  • When: 1st May 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Arnau Erola (Oxford): Corporate Insider Threat Detection (School Seminar)

Abstract:

It is widely recognised that the threat to enterprises from insider activities is increasing, and that significant costs are being incurred. Since insider threat and compromising actions can take a multitude of forms, there is a diverse experience and understanding of what insider threats are, and how to detect or prevent them. We investigate the potential for detection of insider threat activities within a large enterprise environment using monitoring tools centred around the information infrastructure. In this seminar we will review our experiences and lessons learnt from the implementation and trial of the Corporate Insider Threat Detection (CITD) tool in real organizations, not only from a technical perspective, but also from the legal and ethical aspects.

Speaker Bio:

Dr Arnau Erola is a cyber security expert with strong background in data analytics, machine learning, data mining and information privacy. He is currently a Research Fellow at the Cyber Analytics group of Oxford University, working on enterprise security, defence systems and better understanding the cyber-threat landscape. Dr Erola holds a Ph. D., M. Sc. and B.Sc. in Computer Science from the Rovira i Virgili University of Tarragona (URV). He is author of several international journal articles on online privacy, anonymity protocols and intrusion detection mechanisms.

Event details

  • When: 24th April 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Elliott Brooks (The HUT Group): Technology at The HUT Group (School Seminar)

Abstract:

The HUT Group have a variety of engineering, UX and data science teams solving real-world customer and logistics problems. This presentation looks at a variety of solutions applied across the business, from continuous release processes to warehouse layout approaches.

Speaker Bio:

Elliott graduated from CS at St Andrews in 2016, and now works within the research and development team at THG.

Event details

  • When: 3rd April 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Alice Miller (Glasgow): Probabilistic model checking for UAV strategy generation (School Seminar)

Abstract:

I will describe how the PRISM model checker was used to generate strategies for an Unmanned Aerial Vehicle (UAV), specifically to determine search strategies for a UAV trying to find objects within a grid, for a range of scenarios. Parameters and probabilities for our models were informed by simulation models developed in the School of Engineering’s Micro Air Systems Technologies (MAST) Laboratory. Our generated controllers can now be used within the simulation models (and ultimately in UAV controller software).

This is joint work with colleagues from the Schools of Computing Science (Gethin Norman, Ruth Hoffmann and Ruben Giaquinta) and the School of Engineering (Murray Ireland).

Speaker Bio:

Alice Miller is a Senior Lecturer in Computing Science at the University of Glasgow. She works in Formal Methods and Graph Theory, with a particular interest in Symmetry. Before working at Glasgow she worked at the Universities of Western Australia, East Anglia and Stirling.

Event details

  • When: 10th April 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Judith Rauhofer (Edinburgh): The Internet of Bodies – What could possibly go wrong? (School Seminar)

Abstract:

The “Internet of Bodies” is turning into a popular catchphrase to
describe the next generation of the Internet of Things – the move from
a collection of everyday objects connected to the Internet and each
other to a scenario, where those devices are attached to, or
incorporated into, the human body with a view to collect and provide a
constant stream of information about an individuals’ health or bodily
functions. Those devices could be part of a medical treatment process
(like pace makers, cochlear implants, digital pills, etc.), medical
research or physical enhancement. The choices, as they say, are
endless, as are the potential reasons why individuals may decide to
use or subject their bodies to those devices.

This means that the Internet of Bodies raises much (and many of) of
the same privacy issues and concerns that we have already observed in
connection to the Internet of Things, multiplied by the power of n
because the majority of the data collected and processed will firmly
fall into the category of “sensitive personal data” that has long
received particular protection under EU data protection law. What
measures do we need to put in place to ensure that the established
principles of data minimization, purpose limitation and limited
retention are met? On what legal basis can we justify the collection
of this data in the first place? Where the data collection is based on
the individual’s consent, how can this consent be voluntary in
situations where the choice might be between a life-saving
intervention and a refusal to use IoB devices? What other pressures
– well known from the use of other IoT enabled devices (convenience,
cost-saving, etc.) might motivate an individual to consent to their
use? What further use might the medical establishment, including the
research and the insurance sector envisage for this type of data?
How do we ensure not just device (IT) security but the security of
the information collected?

This talk will look at the prima facie privacy and data protection
issues of “everyday cyborgs” while trying to stay clear – for now –
from some of the more apocalyptic scenarios currently bandied about in
the media. But even on that basis, the question must be asked: The
Internet of Bodies – What could possibly go wrong?

Speaker Bio:

Judith Rauhofer is a Lecturer in IT Law at the University of Edinburgh
and an Associate Director of the Centre for Studies of Intellectual
Property and Technology Law (SCRIPT).

Her research interests include the commercial and fundamental rights
aspects of online privacy and electronic surveillance, data
protection, information security and all areas of e-commerce and
internet law and policy. Judith is particularly interested in
exploring the tensions between privacy as an individual right and as a
common good.

Judith is qualified as a Rechtsanwalt in Germany and as a solicitor in
England and Wales. She has worked in legal practice for several years,
advising clients from the media and new media industries on aspects of
e-commerce, data protection and IT law.

Judith is the founding editor of the European Data Protection Law
Review and a member of the Executive Committee of the British and
Irish Law, Education and Technology Association (BILETA). She also
works closely with digital rights organisations as a member of the
Advisory Councils to the Open Rights Group (ORG) and the foundation
for information policy research (fipr).

Event details

  • When: 20th November 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Karen Petrie (Dundee): A case study of Facebook use: outlining a multi-layer strategy for higher education (School Seminar)

Abstract:

Many students are looking to appropriate social networking sites, amongst them, Facebook, to enhance their learning experience. A growing body of literature reports on the motivation of students and staff to engage with Facebook as a learning platform as well as mapping such activities to pedagogy and curricula. This talk will look through some of the pitfalls of Facebook in HE. I will then present student opinions of the use of a Facebook strategy within higher education through the use of focus groups.

Speaker Bio:

Karen completed her BSc hons degree at St Andrews University in 2000. In the past 17 years she has had a varied carrier that has seen her at: The University of Leeds, The University of Huddersfield, NASA Ames in California, University College Cork, St Andrews University and Oxford University. She is now the Associate Dean for Learning and Teaching at the University of Dundee. In this role she focuses on the student experience for the students who are studying: Anatomy, Biomedical Engineering, Civil Engineering, Computing, Electronic Engineering, Forensic Anthropology, Mathematics and Physics.

Event details

  • When: 20th February 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Kitty Meeks (Glasgow): Exploiting structure in multi-layer networks: a case study on motif counting (School Seminar)

Abstract:

Many real-world systems are most naturally modelled by “multi-layer” networks, which allow for different types of connections between entities; it is therefore important to develop efficient algorithms to extract information from such networks. However, most existing results concerning the structural properties of graphs/networks which allow us to solve NP-hard problems efficiently consider only the case of a “single-layer” graph (in which each pair of vertices is either adjacent or not). A natural question to ask is whether, if each individual layer has well-understood structure which allows the design of efficient algorithms, we can still exploit this structure to solve problems on the combined, multi-layer network. We address this question for the specific problem of counting small substructures in the network: in most cases the problem becomes intractable on the combined network, but we identify one case in which structural restrictions on the individual layers can be exploited effectively.

This is joint work with Jessica Enright (University of Stirling).

Speaker Bio:

Kitty Meeks obtained her PhD from the University of Oxford in 2013, and from 2012 to 2014 worked as a Postdoctoral Research Assistant at Queen Mary University of London. She joined the University of Glasgow in 2014, initially to the School of Mathematics and Statistics, before moving across the road to the School of Computing Science in 2016. She currently holds a Royal Society of Edinburgh Personal Research Fellowship for the project “Exploiting Realistic Graph Structure”.

Event details

  • When: 14th February 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar

Kami Vaniea (Edinburgh): Usable Security: From URLs to Updates (School Seminar)

Abstract:

Usable security is about exploring the relationship between the tools
which are supposed to keep people safe and the ways that people interact
with them. In this talk, I will be discussing two of my recent projects:
URL readability and reasons for avoiding software updates. URLs are a
nearly ubiquitous method of telling another person where to find
content. They are used extensively in emails, social networking and
other communications. The security community complains about people
clicking on fraudulent URLs, yet surprisingly little is known about how
people parse and interpret them. Similarly, software updates are
becoming a common feature of using a computing device, many of which
demand to be updated daily, if not hourly. Security experts agree that
installing updates is one of the best ways to stay safe, yet many people
avoid updating. I will discuss studies my lab has run on both of these
topics.

Speaker Bio:

Dr Kami Vaniea is a Lecturer at the University of Edinburgh studying
human factors of security and privacy. She heads the Technology
Usability Lab In Privacy and Security (TULIPS) which looks at many
different aspects of usability, prvaicy and security including
educational game design, internet of things, and software updating.
Previously Dr Vaniea was an Assistant Professor at Indiana University, a
post doc researcher at Michigan State University and completed her PhD
at Carnegie Mellon University.

Event details

  • When: 6th February 2018 14:00 - 15:00
  • Where: Cole 1.33a
  • Series: School Seminar Series
  • Format: Seminar