SLS Conference 2020

I will be speaking at the SLS Conference in September. The event is online, and can be accessed here:

I am taking part in the CyberLaw stream and will be speaking on 4 September at 09.15, where I will be presenting my paper “Does Cybersecurity Legislation Make Us Safer Online? An Analysis of the Impact of Consumer Related Cybersecurity Legislation on Device Security”.

I will be making the presentation and slides available here after the event and you can access the paper which the presentation is based on here.

Simple Cybersecurity Tips for PhD Students (or anyone, really)

Do you know what your online passwords are? If you do, you might need to reconsider how you manage your passwords!

Your username and password are what keeps other people from getting access to your online services. Whether its your email, insurance, newspaper or social media accounts, it is your username and password which tells the website to allow you in but keep all other people out. Passwords, however, are often seen by people as an inconvenience and a hassle. People find it hard to remember them and the majority of people who use the internet have bad habits when it comes to managing their passwords. This is exploited by cybercriminals who use many techniques to try and capture your password, either from you or from the website where it is stored.

Continue reading →

Law Pod

The Law School in Queen’s have an excellent weekly podcast, where academics speak with their colleagues or with PhD students to discuss their current research, life in Queen’s and current events.

I recently spoke with Dr. Rachel Killean, the LawPod director about the focus of my research, the decision to start a PhD after quite a few years away from academia and the challenges of research when you are working full time and in a different country!

You can listen to my conversation here, and see all of the LawPod episodes here.

Cybersecurity in a Post Data Environment

My new working paper is available [Link].

This paper outlines the threats which are posed by the hacking of Smart Devices, and provides a rudimentary methodology to apportion liability to either the manufacturer or the user, where appropriate, following a hack. This is done in a robust manner, from a technologically agnostic perspective, to ensure a persistent relevance in the face of unrelenting technological advancement.