Account Options>

  1. Sign in
Conference attendances
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
£
%
123
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
|
 
Still loading...
ABCDEFGHIJKLMNOPQRSTU
1
TimestampName of conferenceThemeMonth and year attendedAttendee name(s)Brief review
2
21/12/2011 15:44:554th European Security Research Conference Secure systems and security systemsSeptember 2009Hester MilesConference focusing on European security concerns and ongoing research in a variety of security related fields.
3
21/12/2011 15:48:20Tackling Child Trafficking and Exploitation in the European Union - Public Policy Exchange SymposiumIntelligence, surveillance and data analysisDecember 2009Hester MilesSymposium exploring the phenomenon of child sex trafficking, the networks exploited by those involved to facilitate ongoing trafficking across Europe and possible avenues for exploration from a law-enforcement and preventative perspective. Attendees ranged from research students to individuals involved in trafficking-focused organisations.
4
21/12/2011 15:50:54Forensic Science Society - Student conference; Indelible Evidence?Forensic sciencesDecember 2009Hester MilesConference comprised largely of university level students in forensic science. Presentations were broad in focus ranging from forensic etymology to forensic chemistry and statistical approaches to understanding forensic drug traces. Very informative and engaging, although level was largely aimed at Undergraduate students so was limited in levels of discussion.
5
21/12/2011 15:56:31IABPA Annual International ConferenceForensic sciencesMay 2010Hester MilesConference aimed specifically at Blood Pattern Analysis (BPA) practitioners with a smaller group of research students also in attendance. Content was extremely useful as covered practical debates and case-studies which are not widely available in published literature or journal articles. Practical workshops were also offered on the application of discipline specific software for crime scene analysis. The conference also afforded me invaluable access to practitioners with whom ongoing collaborations have been formed.
6
21/12/2011 15:58:104th International Crime Science ConferencePhysical security managementJuly 2010Hester MilesInternational crime science conference covering topics of general security concern. Attendees included practitioners, academics, representatives of industry and research students.
7
21/12/2011 16:02:09Bloodstain Pattern Analysis Workshop Forensic sciencesMarch 2011Hester Miles40 hour practical BPA (Blood Pattern Analysis) workshop attended. The course was run by a prominent American BPA expert and invaluable practical training, discussions of current BPA research and real life cases were provided and the week culminated in an examination and achievement of the 1st part BPA expert qualification. This week was absolutely crucial to ongoing project work and contextualising current gaps in scientific research in the field.
8
21/12/2011 16:03:155th International Crime Science ConferenceSecure systems and security systemsJuly 2011Hester MilesInternational crime science conference attended. Attendees were comprised mainly of research students, security professionals and academics.
9
29/12/2011 17:14:00SPIE - Defence, Security and SensingRadiation physics, nanotechnology, material science, biochemical engineeringApril 2011Ireneos DrakosThe SPIE conference is the largest unclassified event for the defense, security, and environment industries, focusing in 58 different areas and over 50 courses in CBRNE (chemical, biological, radiological, nuclear and high-yield explosives), laser sensors and systems, image and data processing, target and pattern recognition, unmanned and robotic systems, and more. Great event for Networking! Brilliant people.

Particularly helpful for me was the course offered on Detection theory. The fundamental goal of Detection theory is to enable assessment and explanation of the performance of a given configuration of sensors, diagnostics or any other system in question, to determine the presence or absence of a “target”. More specifically how to relate sensitivity and specificity using a ROC curve and how to choose the optimised values
10
29/12/2011 17:24:54iTherm 2010Radiation physics, nanotechnology, material science, biochemical engineeringJune 2010Ireneos DrakosITherm 2010 is an international conference for scientific and engineering exploration of thermal, thermomechanical and emerging technology issues associated with electronic devices, packages and systems. This was held along with the 60th Electronic Components and Technology Conference and consisted of paper and poster presentations as well as vendor exhibits.

Attended since the SVXi (small vehicle X-Ray imaging system) was a new technology which we were trying to improve (during the MRes), focusing on the electronics of the system using emerging Technologies such as Thermal, Thermomechanical to solve underlying multidisciplinary issues.

Very interesting in terms of networking but alas, quite specific on the electronic side of the equipment produced and not the purpose. The conference is particularly interesting for electronic engineers but not related to security directly!
11
04/01/2012 12:54:50Mediterranean Conference on Information SystemsInformation security managementSeptember 2011Iacovos KirlapposThe conference was a general Information Systems conference. The attendees were from a variety of backgrounds, with the majority coming from the Information Systems Management field. This was extremely useful to gain exposure in the general management approaches applied to the IS field that can be applied in my research on Information Security management topics.

Speakers came from a variety of backgrounds: Academics from around the world (US, Europe, Middle East), Government Officials both from EU countries and the European Union and representatives of technology companies. This provided different perspectives on the current advances in IS research and how those could be applied to solve challenges posed by the use of IS in government and business environments.

I would recommend anyone interested in the management of Information Security Management to attend this conference as it really exposes the attendees to new research approaches.
12
04/01/2012 13:06:12Security and Human Behaviour Workshop Human perception and behaviourJune 2011Iacovos KirlapposThe workshop discussed the interdisciplinary issues concerning security, psychological, and behavioral research including a wide range of topics like: misperception of risk, security usability, deception, security and privacy decision making.

Attendees: computer scientists, security engineers, economists, psychologists, and other researchers interested in understanding security and human behavior (mostly US and UK based though). The majority the "big names" in the Usable Security research field were present which sparked interesting discussions. In addition the small number of attendees allowed easy access to anyone, so it was easy to talk in person (and for quite long!) to any person you were interested in exchanging ideas with.

I would definitely recommend this conference to anyone interested in the field of Security and Human Behaviour.
13
09/01/2012 11:21:056th preventing violent extremism conferenceInformation security managementOctober 2010Amy ThorntonThis was a small conference (more like a workshop) of practitioners and policy makers in the realm of the prevention of violent extremism. Governmental policy was presented and debated, local programmes from differing regions were discussed and evaluated, but the conference was limited in its usefulness due to the small attendance and the key speaker being unable to attend at the last minute (Baroness Warsi was being arrested at the time for expenses fraud).
14
09/01/2012 11:23:55International Association of Forensic SciencesInformation security managementSeptember 2011Amy ThorntonThis was a well organised, well attended conference with a wide range of specialities within the realm of forensic science represented. There was a great deal about the traditional aspects such as fingerprinting, ballistics analysis and DNA, but there was also some very interesting sub topics such as the use of forensic investigation to prove torture in asylum seekers. Attendees ranged from academics to highly regarded and respected practitioners from across the globe. The spectrum of research presented and the presentees themselves was remarkable. I would recommend this conference to anyone who has an interest in forensic science.
15
09/01/2012 11:29:31American Criminology SocietySociology, crime controlNovember 2011Amy ThorntonThis conference is one of the largest and well respected in the field of Criminology, drawing experts in academia and practise from across the world. It combined lively debate on more traditional theories with extensive new research which was moulding the field. While very much a criminology conference, the use of science within the field was well represented, as was the use of computer programming software. The fields of terrorism and radicalisation research were well represented and filled my attendance. Very useful for those who embrace criminological theory within their research.
16
09/01/2012 18:33:24European Security Research ConferenceInformation security managementSeptember 2010Chiaki Crews[NB doesn't fall under any particular 'Theme' listed above]

Was useful to learn about various areas of security, however I found that it lacked in hard science (though that may be because I was misled by the title of the conference). Instead it seemed to have a focus on security science policy etc, which was new to me and made me realise how important this is when it comes to real-world application of research.
17
09/01/2012 18:34:55UCL Security and Crime Research Network ConferenceInformation security managementDecember 2010Chiaki Crews[N.B. doesn't fall into any particular 'Theme' above]
18
09/01/2012 18:36:09International Crime Science ConferenceSecure systems and security systemsJuly 2011Chiaki Crews[N.B. falls under various 'Theme's listed above!]
19
10/01/2012 13:26:04The Fourth European Security Research Conference, Stockholm, 29-30th September 2009.Secure systems and security systemsOctober 2009James FrenchReally useful as an induction. Details on interesting security research projects were interesting but details of funding administration/procedures much less so
20
10/01/2012 13:32:29National Environmental Crime Conference 2009, British Library, 28th October 2009.Sociology, crime controlOctober 2009James FrenchInteresting presentations. Useful outlines of crime problems and solutions.
21
10/01/2012 13:35:28The Forensic Science Society Student Conference - 'Indelible Evidence', UWE, 12th December 2009.Forensic sciencesDecember 2009James FrenchSeveral interesting talks eg. on forensic entomolgy and trace illicit material detection. Quite a student-focused conference and some material wasn't pitched at a particularly high level. Worth attending, though for interests sake.
22
10/01/2012 13:37:13The Fingerprint Society Annual Educational Conference 2010, London, 9-11th April 2010. Delivered research presentation entitled "The reincorporation and redistribution of trace geoforensic particulates on clothing".Forensic sciencesApril 2010James FrenchSeveral interesting talks. Quite practitioner-orientated but some interesting research presentations. Good opportunity to meet forensic police practitioners especially in the fingerprinting examiner community
23
10/01/2012 13:39:182nd London and South East Student Forensic Conference, University of Westminster, 13th April 2011Forensic sciencesApril 2011James FrenchThe afternoon session was too computer-focused but there were a few interesting presentations in the morning. Wouldn't attend again although if an interesting topic was on the agenda then I would recommend going
24
10/01/2012 13:40:12International Crime Science Conference 2011, British Library, 13th July 2011. Poster presented entitled "The multiple transfer of trace particulates and gunshot residue (GSR): Evidence dynamics, investigative implications and interpretation using Bayesian networks".Temporal and geo-spatial pattern analysis; crime mappingJuly 2011James FrenchI found the Broeders talk (and indeed the entire session he spke in) very useful
25
10/01/2012 13:44:02BIT's 2nd Annual World Congress of Forensics 2011, Chongqing, China, 15-18th October 2011. Delivered research presentation entitled "Trace evidence dynamics and the secondary transfer of gunshot residue (GSR)".Forensic sciencesOctober 2011James FrenchGot a great deal out of this conference. Great opportunity to present to an international academic/practitioner forensic audience. Many useful and interested contacts made who have been in touch about my project. Learned a great deal from various sessions - a good range of talks. Those that were particularly good were the sessions on: Crime scenes, physical evidence and document examination. Although not as relevant to me, long sessions on computer forensics, pathology and fingerprinting were held
26
10/01/2012 17:20:375th European Security Research ConferencePhysical security managementSeptember 2010Liz StonesInteresting conference particularly in terms of the European context, interface between security mechanisms/research and the policy agenda.
27
10/01/2012 17:22:13European Association of Social Anthropologists Annual ConferenceSociology, crime controlAugust 2010Liz StonesFocus on current trends in European social anthropology with an emphasis on globalisation, conflict and transnational cultures
28
10/01/2012 17:24:03Security Sector Reform EC ProceduresPhysical security managementDecember 2010Liz StonesOne-day workshop exploring the EC strategy on SSR and DDR particularly in the African context, securing porus borders, drugs and human trafficking, illegal flows of arms etc.
29
10/01/2012 17:27:09PACSA/PRIO Biennial ConferenceSociology, crime controlSeptember 2011Liz StonesAs a committee member of PACSA, I co-organised the Peace and Conflict Studies in Social Anthropology conference and held a panel on Security and Anthropology. Speakers explored the role of anthropology in examining securitisation processes in Africa and the Middle East, working with security agencies and the military and cultural interpretations of security.
30
10/01/2012 17:28:58Combined Effect Resiliance WorkshopResilience and disaster managementApril 2010Liz StonesTable top workshop with representatives from police, fire services, counter-terrorism etc exploring scenarios related to disaster management, the Olympics, transport security and CBRN.
31
10/01/2012 17:30:37The Warning-Response-Gap in Prevening Violent Conflict ConferenceIntelligence, surveillance and data analysisSeptember 2011Liz StonesBringing togther practictioners and researchers from a range of disciplines, this conference presented findings of a KCL research project exploring early warning systems' effectiveness and the warning-response gap.
32
11/01/2012 15:04:44NATO ASI (Advanced Study Institute) "Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems", Salamanca, SPAIN Information communication technologySeptember 2011Saumil DesaiI was sponsored by NATO for this 12 – day workshop that included fees, lodging and boarding and transport. The objective of this ASI was to provide discussions on prediction, recognition and deterrent of maritime piracy through the use of collaborative human-centric information support systems. This can significantly improve the ability to predict and prevent an incident or rapidly recognize its nature, and extent for effective collective response.

There were number of speakers from different domains and experts in human - system integration, cognitive systems, engineering methodologies, collaborative environment technologies, knowledge exploitation and data mining, information fusion, and collaborative decision support capabilities.

There were number of projects that were undertaken in different field of applications; however its knowledge were easily transferrable to ASI’s objectives. Among those, the game theory based project on determining and providing alternatives to existing routing of ships to prevent piracy and the demonstration of Unmanned Aerial Vehicle (UAV) for emergency response drew my particular attention because of its application to practical problems faced by industry.
33
11/01/2012 15:06:17Securing Passengers and Cargo Worldwide: Transport Security (TRANSEC) Expo & Conference 2011, London, UNITED KINGDOM Secure systems and security systemsSeptember 2011 (2 days)Saumil DesaiI was sponsored by International Protect and Prepare Security Office (IPPSO) for 2 days TRANSEC conference which included the fees. The objective of this international event was to put forth the focus and clarity of a complex and multifaceted task of ensuring UK public transport system and commercial supply chain networks that needs to be well protected from acts of terrorism and incidence of organised criminal activity. The conference focused on four areas of Transport - Aviation, Freight, Maritime Security and Counter Piracy and Securing and Protecting Public Transport Systems. I was keenly interested in the latter two and had registered for the same.

This conference was a highly specialised and unique event which gathered world's leading experts from the areas of aviation, air cargo, maritime, and supply chain security, along with government officials, the military, security services, law enforcement, industry, and academic circles together to deliberate on the challenges faced and to drive the adoption of operational countermeasures.

There were number of presentations and workshops that focussed on multiple issues, challenges and solutions, be it; from government to industry to academic. At the same time, the exhibits showcased range of technologies and systems from industry leading suppliers providing valuable knowledge, methods and tools which are used as current standards.
34
11/01/2012 15:07:29NATO ASI (Advanced Study Institute) "Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems", Salamanca, SPAIN Information security managementSeptember 2011 Saumil DesaiI was sponsored by NATO for this 12 – day workshop that included fees, lodging and boarding and transport. The objective of this ASI was to provide discussions on prediction, recognition and deterrent of maritime piracy through the use of collaborative human-centric information support systems. This can significantly improve the ability to predict and prevent an incident or rapidly recognize its nature, and extent for effective collective response.

There were number of speakers from different domains and experts in human - system integration, cognitive systems, engineering methodologies, collaborative environment technologies, knowledge exploitation and data mining, information fusion, and collaborative decision support capabilities.

There were number of projects that were undertaken in different field of applications; however its knowledge were easily transferrable to ASI’s objectives. Among those, the game theory based project on determining and providing alternatives to existing routing of ships to prevent piracy and the demonstration of Unmanned Aerial Vehicle (UAV) for emergency response drew my particular attention because of its application to practical problems faced by industry.

Overall, the workshop was extremely useful in understanding experts from different domains discussing different challenges and issues with regards to ASI’s objectives. At the same time, group based discussions were thought provoking that looked at broader issues and solutions in tackling and deterring piracy.
35
11/01/2012 15:08:40International Crime Science Conference 2011, London, UNITED KINGDOMSociology, crime controlJuly 2011 (1 day)Saumil DesaiN / A
36
11/01/2012 15:09:33Computer Simulation Technology (CST) Workshop, Darmstadt, GERMANYDetecting, imaging, locating and tracking technologyJune 2011 (2 days)Saumil DesaiThis paid 2 day Computer Simulation Technology (CST) workshop at the company’s headquarters in Germany was extremely useful with its hands – on approach; developing different 3D models and generating results. The workshop was designed to have a small group (5 of us), with the presence of 2 tutors, it was really geared for one to one lessons; going through slow paces starting from basic tools and gradually moving towards complex and specialised tools.

This workshop provided deep insight which was needed to ensure that I use this software to the best of my abilities and complete my master’s project successfully. The tutors were excellent in teaching and the workshops were very informal. I met number of people from our group as well as within the company that were working on similar areas of project which was very useful in acquiring valuable tips and knowledge.
37
11/01/2012 15:11:035th Annual Global Security Challenge (GSC) Security Summit, London, UNITED KINGDOM Information security managementNovember 2011 (2 days)Saumil DesaiThis paid 2 days conference was immediately after the start of my SECReT programme. This annual event was attended by security professionals from start-ups, academia, government, venture capital and industry. There were number of presentation and keynote speeches and panel discussions on Digital Data Protection, Aviation Security and Robotics and Autonomous Systems.

Although, I had no expert knowledge in the field, I was particularly interested in Robotics and Autonomous Systems and the discussions on its application to border security. In hindsight, this laid the foundation for my research topic and subsequent conferences and workshops gave the direction to the field of application.

At the same time, since this was my second conference in attendance; this was particularly useful in networking with experts from various professional worlds gaining valuable knowledge.
38
11/01/2012 15:12:08Research, Development and Innovation for a more secure Europe: 5th European Security Research Conference, Ostende, BELGIUM. Secure systems and security systemsSeptember 2011 (3 days)Saumil DesaiThis 3 days conference was sponsored by the department as an induction week. The conference was very useful in setting the theme for the next 4 years. Coming from a completely different background with no security experience or knowledge, this conference was a stepping stone and in particular a fascinating insight into the world of security.

Apart from the conference being my first in attendance, being with the cohort throughout, not only got us close but also help us understand the fields each one of us specialise in; bringing social science, engineering and technology students together, the research areas we are passionate about and most importantly bring multi – discipline views together.
39
12/01/2012 11:17:40International Crime Science ConferenceSociology, crime controlJuly 2011Changwang ZhangThe 5th International Crime Science Conference once again brings together senior security and crime reduction practitioners, policy-makers, technologists, and leading academics, all developing the latest techniques, technologies and strategies for increasing security and reducing crime.
40
12/01/2012 11:21:53Meeting the Cyber Challenges of 2012Information security managementMarch 2011Changwang ZhangSpeakers:

Captain Ian McGhie Royal Navy
NCSP Programme Delivery in OCSIA - Cabinet Office
"The National Cyber Security Programme"

Dr Adele-Louise Carter TD, DBA, MBA, BSc(Hons),FBCS, CITP, CEng, CMgr, MCMI Kiteway
"Safety Critical Vs. Security Critical Software"

Prof. David Lacey ISSA-UK
Director of Research & Communications
"Preparing for the Unknown"

...
41
12/01/2012 11:24:17SECReT Revealed: UCL Security and Crime Science Research Network Conference 2010Information communication technologyDecember 2010Changwang ZhangAll the students of 2010 cohort of the SECReT DTC introduce their MRes projects.
42
12/01/2012 11:24:46Persuasive Technology conference Human perception and behaviourJune 2010Inka KarppinenPersuasive technology. The main purpose of this area is using technology to help aid behaviour change - see website: http://www.d2digital.co.uk/blog/persuasive-technology-conference-2010-copenhagen.aspx

This conference varies by its topic focus yearly - this year it was about health behaviours and technology.
43
12/01/2012 11:26:23Security and Human Behaviour (SHB)Human perception and behaviourJune 2011Inka KarppinenThe Security and Human Behavior Conference (SHB) workshop is a two-day gathering of distinguished computer security researchers, psychologists, behavioral economists, sociologists, philosophers, and others — all of whom are studying the human side of security (and privacy). The workshop's goal is to discuss, in an informal and interdisciplinary setting, issues at the intersection of security, psychology, and behavior.
44
12/01/2012 11:27:03High-tech Entrepreneurship - Starting a Moneymaking, High-tech Business with Minimal FundingInformation communication technologyMay 2011Changwang ZhangThis course is aimed at UCL Entrepreneurs and covers how to exploit your research to launch a high-tech Start-up with your own resources and minimal funding. The course will be run by Professor Philip Treleaven (Professor of Computing) and Dr Dave Chapman (Department of Mangement Science). The one-day course covers the three essentials you need to launch your High-tech Start-up:

Introduction to Entrepreneurship - the special entrepreneurial skills needed to launch a moneymaking high-tech Start-up, with the help of your friends and minimal funding.
Introduction to Business - the basic concepts you will need to set up and run any new business, doing everything yourself.
Help & Advice - where you can get free help and advice; for example, government and business organisations, books, and the Web.
45
12/01/2012 11:42:59Conference of the European Survey Research Association (ESRA)Human perception and behaviourJuly 2011Kat KrolPrior to the official beginning of the conference, I participated in a workshop on how to deal with non-response in surveys. It gave me an insight into the various techniques that can be used to diminish the bias due to non-response. The techniques range from incentivising respondents to complete a survey to employing statistical and mathematical means to ‘correct’ the non-response. During the conference, I attended sessions on various survey-related topics. Sessions on the usability of questionnaires, Web surveys and the use of eye-tracking data were of particular interest to me and will be helpful for my PhD. Moreover, I exchanged ideas and experience with academics whose research topics are equally sensitive as crime and security. I believe I certainly will use some of the strategies I learned about in my future work. There were many renowned speakers at the conference, among them Prof. Roger Tourangeau, known for his methodological research on the influence of different modes of data collection and on the cognitive processes underlying survey responses. Also famous European research institutions such as the German DIW or the Swiss FORS were presenting their work.
46
12/01/2012 11:53:25SECRYPT 2011Information security managementJuly 2011Theodosis MourouzisThe purpose of SECRYPT 2011, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication.
Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
47
12/01/2012 11:55:09ECRYPT II Summer SchoolInformation security managementMay 2011Theodosis MourouzisThe event aims at bringing together PhD students and security experts from industry interested in the following topics:
Block ciphers
Hash functions
Differential and linear cryptanalysis
Implementation attacks
Fault injection attacks
Countermeasures
Leakage-resilient cryptography
White-box cryptography
48
12/01/2012 11:58:07PKC 2011Information security managementMarch 2011Theodosis MourouzisThe most world-wide recognized conference regarding public key cryptography. PKC lies in the interesection of advanced number theory - algebraic geometry and theoretica computer science. During the conference new attacks on public key cryptosystems, new designs for key-scheduling as well as new designs of schemes were presented.
49
12/01/2012 12:24:075th International Crime Science Conference Secure systems and security systems13/07/2011Selina Kolokytha5th International Crime Science Conference Edit
University College London

British Library, London, UK

July 13, 2011
London, UK
50
12/01/2012 12:25:28National Security ConferenceSecure systems and security systems05/07/2011Selina KolokythaNational Security Conference Edit
GovNet

QEII Conference Centre, Central London, UK

July 5, 2011
London, UK
51
12/01/2012 12:26:24Defense, Security, and Sensing Conference Radiation physics, nanotechnology, material science, biochemical engineeringApril 2011Selina KolokythaDefense, Security, and Sensing Conference Edit
SPIE
World Center Marriott Resort & Convention Center Orlando, Florida, USA

SPIE '11: April 25 - 29
Orlando, Florida, USA
52
12/01/2012 13:51:29Explosives and Weapons Detection ShowcaseCBRNe warfare mitigationOctober, 2011Nadia Abdul-KarimThis syposium was very useful to those interested in the detection of CBRNe agaents. Presentations were based on a wide range of detection systems, each given by universities or industries (and in some cases collaborations between both) who had previously been awarded fundng by this grant committee to conduct their research.

There was also a call for research for future funding and help on how to go about applying for it. Those teams who had received funding but had not yet completed their research were required to provide progress details on their work, the issues they were facing wih their reserch and the help they needed. The day was very focused on collaboration efforts - at every opportunity networking and collaboration was encouraged. Because of this it was easy to approach industry partners and talk about my own work. All in all, a very good day.
53
12/01/2012 13:58:2319th International Association of Forensic Sciences Triennial MeetingForensic sciencesSeptember, 2011Nadia Abdul-KarimThis conference was ok. A lot of what was in the original brochure ended up being cancelled, this was very disappointing when it occured for the specialist talks which there were only a few of, as the main conference focus ended up being on Biological/Medical forensics, which wasn't really an interest of mine.

The daily poster presentations however did cover a much broader range of forensics so were much more intersting, it's a shame the talks were not as diverse.

54
12/01/2012 14:01:406th Preventing Violent Extremism Conference, London, UK, 2010Radicalisation and terrorismNovember, 2010Nadia Abdul-KarimThis was a really good conference which provided a lot of insight into the social science research (which can complement the hard science work being done) in the radicalisation and counter-terrorism field. The guest speaker did cancel at very short notice so that was a disappointment, but the other presentations and talks were good.
It's not a conference to attend if you have no or very little interest in the social science work being done in this area.
55
12/01/2012 14:06:115th European Security Research Conference, Ostend, BelgiumPhysical security managementSeptember, 2010Nadia Abdul-KarimAs an introduction to Security Science, this conference was a little interesting. I don't think I learned anything valuable though. There were too many talks which focused on admin and logistical issues. There was not enough material on hard science issues in Security management.
56
12/01/2012 15:03:42International Crime Intelligence Analysis ConferenceIntelligence, surveillance and data analysisNovember 2011Helen BrayleyTwo day crime intelligence conference, organised by Spencer Chainey at JDI. Gave two presentations, ‘Understanding ICST: A Crime Scripting Approach' and ‘Using SNA to Identify Patterns in Co-Victimisation and Co-Offending in ICST’. Presentations attended ranged from technology workshops (I2 Analysts Notebook) to understanding case analysis techniques and the role of profiling using the NPIA database. Interesting program and good networking opportunities.
57
12/01/2012 19:38:415th European Security Research ConferencePhysical security managementSeptember 2010Sami RichardsonThis was an industry conference, rather than academic, so most topics were concerned with policy rather than in-depth technical details. It was useful in that it showed the diverse range of security topics.
58
12/01/2012 19:41:20UCL Security and Crime Research Network ConferenceTemporal and geo-spatial pattern analysis; crime mappingDecember 2010Sami RichardsonN/A
59
13/01/2012 09:42:15Firth European Security ConferencePhysical security managementOctober 2010Emma NewtonFun to meet all my new course mates and some security practitioners. Very good for 'bonding' with the cohort.
60
13/01/2012 09:44:57JDI International Crime Science conference 2011Forensic sciencesJuly 2011Emma NewtonBumped into some old colleagues from the home office. Nice to catch up with them and to see the work of the first cohort by means of their posters.
61
13/01/2012 14:57:304rth European Security Research Conference Intelligence, surveillance and data analysis09/09/2012Toby DaviesGeneral security conference, covering almost all areas. Much of it policy-based, with little scientific content. Interesting from the point of view of an overview, but too early in the program to be of much further use.
62
13/01/2012 14:59:43First IEEE Workshop on Information Forensics and SecurityInformation security management09/12/2012Toby DaviesComplimentary attendance for this due to it being organised by UCL. Some very interesting papers presented in various areas of security-based computer science, and majority of attendees serious researchers in the subject. Also a couple of particularly engaging invited speakers, such as Mikko Hypponen and Bruce Schneier. Ended up working in a different area though.
63
13/01/2012 15:04:29New England Complex Systems Institute Winter SchoolTemporal and geo-spatial pattern analysis; crime mappingJanuary 2011Toby DaviesEasily the most important thing I have done since joining SECReT. This was an (extremely) intensive school in the mathematical theory of networks, which is a significant element of my PhD. I attended with other members of the ENFOLDing project. It was superb because: the lecturers were universally excellent (NECSI is a top place) and covered a huge amount of material, it was intense, the group projects were very enjoyable and I took a lot of confidence from them, and we were taught extremely valuable programming skills. This really is a specialist thing though, aimed at mathematicians.
64
13/01/2012 15:07:45Fifth Annual French Complex Systems Summer School 2011Information security managementJuly 2011Toby DaviesThis school was more relaxed than the NECSI one, but covered a lot of complementary material. Although some network stuff was covered, also learned a lot of theoretical and practical stuff about agent-based modelling, which will be important for me. The group projects were not quite as good this time, as people were encouraged to work on their existing research areas. However, still gained a lot of useful knowledge. Big-name European lecturers too. It is also an unbelievable bargain.
65
13/01/2012 15:14:27European Conference on Complex Systems 2011Information security managementSeptember 2011Toby DaviesThis is the key conference for complexity science in Europe. One satellite meeting on theme of crime/segregation (which was OK) but primarily a general thing. Several superstars as invited speakers (e.g. Barabasi, Gell-Mann) and basically attended by anyone who is anyone. Generally the breadth of work presented was very inspiring for anyone interested in the field (although, again, pretty mathematical). Very well-run in Vienna.
66
13/01/2012 15:17:14EPSRC & ASSYST Workshop on Mathematics in the Science of Complex SystemsInformation security managementJune 2011Toby DaviesThis was a meeting organised by an existing research project and I was invited by association with ENFOLDing. The day was mainly just a workshop where some work was presented and a discussion was had over future funding opportunities (with which I wasn't involved). I did end up giving a brief talk on my work though, which was unexpected. No particularly dramatic work presented, but still good to get a general feel.
67
15/01/2012 14:26:47European Security Research ConferenceInformation security managementSeptember 2009Timothy NissenExcellent intoduction to current EU funded security projects
68
15/01/2012 14:28:46National Environmental Crime ConferenceInformation security managementOctober 2009Timothy NissenFocussing on environmental crime. Useful to those interested in this area.
69
15/01/2012 14:30:27IEEE Workshop on Information Forensics and SecurityInformation security managementDecember 2009Timothy NissenNarrow focus on IT. Interesting presentation by Bruce Schneier.
70
15/01/2012 14:32:52Westminster Legal Policy Forum on data management, privacy and surveillanceLaws and political scienceFebruary 2010Timothy NissenInteresting discussion on the abject failures of the Information Commissioners Office.
71
15/01/2012 14:35:16ESCI Conference - Changing perceptions of citizens' security and acceptance of security-enhancing interventionsEthicsMarch 2010Timothy NissenFairly generic presentations with little relevance to the title. Rather unhelpful overall.
72
15/01/2012 14:37:46EU workshop on societal security in research and developmentLaws and political scienceJuly 2010Timothy NissenUseful workshop examining societal aspects of, and implications of, fp7 research within the EU. Interesting contributions from US Homeland Security and various end-users throughout the EU.
73
15/01/2012 14:40:37Google - The Big Tent - Online Privacy versus InnovationInformation security managementMay 2011Timothy NissenInteresting discussions from the persepectives of software engineers on how they perceive privacy. Useful without being ground-breaking.
74
15/01/2012 14:42:19UK National Security ConferenceResilience and disaster managementJuly 2011Timothy NissenRather disappointing conference. Little by way of new information; lacked details; largely restating the obvious.
75
17/01/2012 15:28:56NIDays 2010Detecting, imaging, locating and tracking technology9th November 2010Lucy BurtonNIDays is a conference for engineers and scientists. It aims to provide information about the latest software tools, hardware platforms and commercial technologies impacting system development.

NIDays attendees include:
1. Engineers in charge of recommending or developing test and measurement, instrumentation, and control systems
2. Design engineers
3. Scientists and researchers
4. Professors and educators
5. System integrators
6. Third-party developers

Despite being from an economics background, I found this conference interesting (although some sessions were very technical - so not good for non-engineers). I particularly enjoyed the key note speaker (Professor Brian Cox) and a debate regarding science and innovation policy in the UK.
76
17/01/2012 15:42:11Simulation Innovation: a Node (SIMIAN)Temporal and geo-spatial pattern analysis; crime mapping22nd February 2011Lucy BurtonThe SIMIAN project (held at the University of Surrey and directed by Nigel Gilbert) aims to develop expertise in simulation within UK social science. This 2 day course focused on agent-based modelling using NetLogo. It consisted of lectures (on simulation as a method and how to build an agent-based model) followed by practical workshops (where we learnt the NetLogo programming language and built our first working model).

This course was highly useful. It provided me with the skills required to use simulation in my MRes project and PhD. I met a number of other students (some of which were from other London Universities) who were doing similar projects and I have since had interactions with them. I would highly recommend this course for people who are new to computer programming, simulation or agent-based modelling.
77
25/01/2012 16:24:56Global Security Challenge - LondonSecure systems and security systemsNov 2010Amin AmiriA lot of innovative security startups and SMEs present their ideas and products for security applications. The conference is very informative and attracts professionals from all over the world.
78
26/01/2012 14:40:55EIGHTH INTERNATIONAL SPACE SYNTAX SYMPOSIUMTemporal and geo-spatial pattern analysis; crime mappingJanuary 2012LUSINE TARKHANYANThe conference was dedicated to spatial network analysis of cities and settlements; mainly the space syntax urban technique was used. It included vast variety of topics from spatial analysis and architectural theory to spatial cognition and software developments. The conferences gathered key members of academia and practitioners from America, Europe, Australia and China. The highlight of the conference was the innovative measure of street network presented by Bill Hiller, which allows mathematically comparing different size network systems and incorporates the idea of risk into the spatial model. The papers on cognition were particularly useful, since they showed with scientific precision how people navigate and use space inside the buildings and on the streets. This is mostly useful for understanding the criminal’s awareness spaces and the process of their route selection in the space. Methodological novelties included the integration of various spatial networks (i.e. tub, transport) into the one mathematical and geospatial model. This allows having realistic representation of physical space, which can be analysed in the context of economic, social and crime data. The conference is very specific and technical. It will be very useful for those who know the terminology of space syntax and network systems in general.
79
12/02/2012 23:52:19International Crime Science ConferenceSecure systems and security systemsJuly 2011Hugo SotoKey sessions included:
Securing critical infrastructures, Cybersecurity, Robotics, autonomous systems and UAVs, Hi-tech forensics, Detecting terrorism, Tackling the drug trade through technology, and Using technology to improve policing.
80
16/02/2012 15:33:14International Crime and Intelligence Analysis ConferenceSociology, crime controlOct 2011Ella CockbainPresented two sessions with Helen Brayley on Internal Child Sex Trafficking. The first focused on Social Network Analysis of offender and victim networks and the second on mapping the crime commission process via Crime Scripting. Received positive feedback and significant interest in our research. Found other sessions I attended interesting and informative.
81
16/02/2012 15:35:40Safe and Sound 4th National Conference on CSEHuman perception and behaviourSep 2010Ella CockbainPresented with Helen Brayley on how crime scripting can be used as an analytic tool to improve the understanding of and responses to Internal Child Sex Trafficking. This was a one day conference with various sessions and keynote presentations on child sex abuse related topics.Would recommend to those active in this research field.
82
16/02/2012 15:37:45Tackling Child Trafficking and Exploitation in the European UnionSociology, crime controlDec 2009Ella CockbainAttended. Good in terms of broad selection of areas related to trafficking and exploitation (eg child sex tourism,internal and international trafficking). Some useful networking opportunities. Easy to get to Brussels via Eurostar. Prob wouldn't go again though unless I was presenting.
83
16/02/2012 15:39:49Virtual Global Taskforce Conference 2010Sociology, crime controlDec 2010Ella CockbainExcellent. Really broad range of attendees - also many more police speakers than is typical at most sex-related conferences. Really good networking. Nice length. Good range of content - lots of good stuff on child pornography, sex tourism, child trafficking etc. Would def go again, even if not presenting.
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Loading...
 
 
 
Sheet1