Madeline Carr
YOU?
Author Swipe
View article: The trust deficit. EU bargaining for access and control over cloud infrastructures
The trust deficit. EU bargaining for access and control over cloud infrastructures Open
View article: The geopolitics of technology standards: historical context for US, EU and Chinese approaches
The geopolitics of technology standards: historical context for US, EU and Chinese approaches Open
This article provides a review of the historical trends that are shaping global competition for standard setting in emerging technologies. Specifically, it explores how the traditional rule-makers of international standardization, namely t…
View article: Am I Hired as a Firefighter? Exploring the Role Ambiguity and Board's Engagements on Job Stress and Perceived Organizational Support of CISOs
Am I Hired as a Firefighter? Exploring the Role Ambiguity and Board's Engagements on Job Stress and Perceived Organizational Support of CISOs Open
The role of the Chief Information Security Officer (CISO) in an organization is critical as they play a huge part to ensure business continuity and defend against the evolving threat landscape. Their role cannot be downplayed, especially i…
View article: WAR AND PEACE OVER 18 YEARS
WAR AND PEACE OVER 18 YEARS Open
View article: The Trust Deficit. EU Bargaining for Access and Control over Cloud Infrastructures.
The Trust Deficit. EU Bargaining for Access and Control over Cloud Infrastructures. Open
View article: Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project
Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project Open
The architecture of cloud-based services is typically opaque and intricate. As a result, data subjects cannot exercise adequate control over their personal data, and overwhelmed data protection authorities must spend their limited resource…
View article: Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector Open
Higher education has recently been identified as a sector of concern by the UK National Cyber Security Centre (NCSC). In 2021, the NCSC reported that universities and higher education institutions (HEI) had been exponentially targeted by c…
View article: Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation
Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation Open
The UK Critical National Infrastructure is critically dependent on digital technologies that provide communications, monitoring, control, and decision-support functionalities. Digital technologies are progressively enhancing efficiency, re…
View article: Privacy & Cloud Services: Are We There Yet?
Privacy & Cloud Services: Are We There Yet? Open
The General Data Protection Regulation (GDPR) remains an important requirement for many electronic services which utilise user data. GDPR compliance verification for a cloud provider is aimed to confirm that personal data provided by a use…
View article: Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare
Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare Open
Emerging multi-tenant cloud computing ecosystems allow multiple applications to share virtualised pool of computing and networking resources. As a result such ecosystems are becoming increasingly prone to data privacy concerns (personal da…
View article: Cyber Crossroads: A Global Research Collaborative on Cyber Risk\n Governance
Cyber Crossroads: A Global Research Collaborative on Cyber Risk\n Governance Open
Spending on cybersecurity products and services is expected to top 123\nbillion U.S. dollars for 2020, more than double the 55 billion U.S. dollars\nspent in 2011.1 In that same period, cyber breaches quadrupled. Organizations\nglobally fa…
View article: Lessons from the GDPR in the COVID-19 era
Lessons from the GDPR in the COVID-19 era Open
The extraordinary speed with which the Covid-19 virus has been spreading throughout the world, penetrating the fabric of distant countries and traditions, revolutionising their daily habits and gestures, has pushed governments to find far-…
View article: The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief)
The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief) Open
In January 2019, the UK Government published its Maritime 2050 on Navigating the Future strategy. In the strategy, the government highlighted the importance of digitalization (with well-designed regulatory support) to achieve its goal of e…
View article: Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance Open
Spending on cybersecurity products and services is expected to top 123 billion U.S. dollars for 2020, more than double the 55 billion U.S. dollars spent in 2011.1 In that same period, cyber breaches quadrupled. Organizations globally face …
View article: A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints
A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints Open
Simulation can provide a useful means to understand issues linked to industrial network operations. For transparent, collaborative, cost-effective solutions development, and to attract the broadest interest base, simulation is critical and…
View article: Internet of Things, cybersecurity and governing wicked problems: learning from climate change governance
Internet of Things, cybersecurity and governing wicked problems: learning from climate change governance Open
The implementation of the Internet of Things (IoT) is central to what the World Economic Forum has coined the ‘Fourth Industrial Revolution’; a technological revolution built upon cyber-physical systems that will blur the lines between the…
View article: COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain
COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain Open
The COVID19 Pandemic has highlighted our dependence on online services (from government, e-commerce/retail, and entertainment), often hosted over external cloud computing infrastructure. The users of these services interact with a web inte…
View article: <scp>CSIRT</scp>s and Global Cybersecurity: How Technical Experts Support Science Diplomacy
<span>CSIRT</span>s and Global Cybersecurity: How Technical Experts Support Science Diplomacy Open
Ongoing efforts by state actors to collaborate on addressing the challenges of global cybersecurity have been slow to yield results. Technical expert communities such as Computer Security and Incident Response Teams ( CSIRT s) have played …
View article: Standardising a Moving Target: The Development and Evolution of IoT Security Standards
Standardising a Moving Target: The Development and Evolution of IoT Security Standards Open
View article: IoT and Its Implications for Informed Consent
IoT and Its Implications for Informed Consent Open
View article: Power Plays in Global Internet Governance
Power Plays in Global Internet Governance Open