cyber crime ()

Areas of Expertise

Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

Projects

Trading Standards
This course investigates open source methods of investigating e-Crime, including mining social media networks and network packets.
Symposium on Cyber Security
Aim and Scope of Symposium This symposium aims to bring together knowledge from many different domains in order to create knowledge exchange and collaborative infrastructures, which address the key cyber risks that Scotland and the UK faces.

Members

Charley Celice
Researcher
c.celice@napier.ac.uk
+44 131 455
Petra Leimich
Lecturer in Security and Networks
P.Leimich@napier.ac.uk
+44 131 455 2593
Bruce Ramsay
Senior Research Fellow
B.Ramsay@napier.ac.uk
+44 131 455 2746
Marian Dunbar
Administrator
M.Dunbar@napier.ac.uk
+44 131 455 2711
Naghmeh Moradpoor
Lecturer in Cybersecurity and Networks
N.Moradpoor@napier.ac.uk
+44 131 455 2596

Publications

Buchanan, W. (2015, ). Apple and Starbucks could have avoided being hacked if they'd taken this simple step. The Conversation, .

Buchanan, W. (2015, July, 21). Ashley Madison breach reveals the rise of the moralist hacker. theconversation.com, .

Buchanan, W. (2015, May 7). Edinburgh leading world in beating online crime. The Scotsman, .

Buchanan, W., Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France.

Buchanan, W. (2015, May). Vulnerability Analysis. Paper presented at Advanced Threat Protection, Glazier's Hall, London.

Penrose, P., Macfarlane, R., Buchanan, W. (2013). Approaches to the Classification Of High Entropy File Fragments. Digital Investigator, 10, (4), 372–384.