Cyber Security inside and out
The purpose of this research is to investigate news ways of mitigating insider threats, using technical, managerial and educational tools.
Detecting insider behaviour on corporate systems
The purpose of this research is to investigate the potential for near real-time detection of insider threat activities within a large enterprise environment using monitoring tools centred around the information infrastructure.
Technology & Operations Management group
We engage with diverse topics such as design leadership, healthcare management, operations strategy, supply chain management, reputation management, and major programme management.