Skip to main content

Research Repository

Advanced Search

Outputs (90)

Crawling Open-Source Data for Indicators of Human Trafficking (2014)
Presentation / Conference Contribution
Brewster, B., Ingle, T., & Rankin, G. (2014). Crawling Open-Source Data for Indicators of Human Trafficking. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. https://doi.org/10.1109/ucc.2014.116

Information available from open-source mediums such as the web and social media are increasingly being used to aid the response to emergent crimes and reinforce existing Law Enforcement Agency intelligence capability. In this paper we discuss the rat... Read More about Crawling Open-Source Data for Indicators of Human Trafficking.

Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime (2014)
Presentation / Conference Contribution
Brewster, B., Polovina, S., Rankin, G., & Andrews, S. (2023). Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime. In Graph-Based Representation and Reasoning: 21st International Conference on Conceptual Structures, ICCS 2014, Iaşi, Romania, July 27-30, 2014, Proceedings (104-117). https://doi.org/10.1007/978-3-319-08389-6_10

Globalization, the ubiquity of mobile communications and the rise of the web have all expanded the environment in which organized criminal entities are conducting their illicit activities, and as a result the environment that law enforcement agencies... Read More about Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime.

Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats (2014)
Presentation / Conference Contribution
Brewster, B., Andrews, S., Polovina, S., Hirsch, L., & Akhgar, B. (2023). Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats. In N. Hernandez, R. Jäschke, & M. Croitoru (Eds.), Graph-Based Representation and Reasoning: 21st International Conference on Conceptual Structures, ICCS 2014, Iaşi, Romania, July 27-30, 2014, Proceedings (275-280). https://doi.org/10.1007/978-3-319-08389-6_22

ePOOLICE aims at developing an efficient and effective strategic early warning system that utilises environmental scanning for the early warning and detection of current, emergent and future organised crime threats. Central to this concept is the use... Read More about Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats.

Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism (2016)
Book Chapter
Akhgar, B., Choraś, M., Brewster, B., Bosco, F., Vermeersch, E., Luda, V., …Wells, D. (2016). Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. In B. Akhgar, & B. Brewster (Eds.), Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities (295-321). Springer International Publishing. https://doi.org/10.1007/978-3-319-38930-1_16

In this concluding chapter, we consolidate the broad spectrum of challenges discussed throughout this book towards the formulation of a number key priority topics to be addressed by future research related to cybercrime and cyberterrorism. During thi... Read More about Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism.

Challenges Priorities and Policies: Mapping the Research Requirements of Cybercrime and Cyberterrorism Stakeholders (2016)
Book Chapter
Akhgar, B., Wells, D., & Brewster, B. (2016). Challenges Priorities and Policies: Mapping the Research Requirements of Cybercrime and Cyberterrorism Stakeholders. In Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities (39-51). Springer International Publishing. https://doi.org/10.1007/978-3-319-38930-1_3

The following chapter provides an in depth look at a broad selection challenges related to Cybercrime and Cyberterrorism, as identified through prolonged engagement with a multitude of horizontal and vertical cyber-security stakeholders. Out of six c... Read More about Challenges Priorities and Policies: Mapping the Research Requirements of Cybercrime and Cyberterrorism Stakeholders.

Cybercrime: Attack Motivations and Implications for Big Data and National Security (2015)
Book Chapter
Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: Attack Motivations and Implications for Big Data and National Security. In Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies (108-127). Elsevier. https://doi.org/10.1016/B978-0-12-801967-2.00008-2

Organizations are increasingly turning to the immeasurable quantities of data available through open-source mediums such as the web and social media to enhance their analytical capability and ultimately improve the quality and quantity of the informa... Read More about Cybercrime: Attack Motivations and Implications for Big Data and National Security.

Social media and its role for LEAs: Review and applications (2014)
Book Chapter
Bayerl, P. S., Akhgar, B., Brewster, B., Domdouzis, K., & Gibson, H. (2014). Social media and its role for LEAs: Review and applications. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook (197-220). Elsevier. https://doi.org/10.1016/B978-0-12-800743-3.00016-5

Social media has become a major aspect of online activity, and thus an essential part of cybercrime and cyber terrorism-related operations. As LEA’s (law enforcement agencies) focus upon cybercrime and cyber terrorism threats increase, so does the re... Read More about Social media and its role for LEAs: Review and applications.

A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals (2013)
Book Chapter
Staniforth, A., Bayerl, P. S., Akhgar, B., Brewster, B., & Johnson, K. (2014). A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals. In Emerging Trends in ICT Security (539-547). Elsevier. https://doi.org/10.1016/B978-0-12-411474-6.00033-5

In this chapter we present an empirically-based theory-independent framework of online radicalization. The framework provides a systematic basis for (a) the representation of causal mechanisms of online radicalization and (b) the identification of ra... Read More about A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals.

A Conceptual Framework for Information Security Awareness, Assessment, and Training (2013)
Book Chapter
Hassanzadeh, M., Jahangiri, N., & Brewster, B. (2014). A Conceptual Framework for Information Security Awareness, Assessment, and Training. In H. R. Arabnia, & B. Akhgar (Eds.), Emerging Trends in ICT Security (99-110). Elsevier. https://doi.org/10.1016/B978-0-12-411474-6.00006-2

Information security has become a key issue. Human resources, including all people working with information technology, play a significant role in information security issues. The key factor for human resources in relation to information security is... Read More about A Conceptual Framework for Information Security Awareness, Assessment, and Training.

“Political … civil and domestic slavery”: Harriet Taylor Mill and Anna Doyle Wheeler on marriage, servitude, and socialism (2020)
Journal Article
McCabe, H. (2021). “Political … civil and domestic slavery”: Harriet Taylor Mill and Anna Doyle Wheeler on marriage, servitude, and socialism. British Journal for the History of Philosophy, 29(2), 226-243. https://doi.org/10.1080/09608788.2020.1750348

Harriet Taylor Mill and Anna Wheeler are two 19th century British feminists generally over-shadowed by the fame of the men with whom they co-authored (respectively John Stuart Mill and William Thompson). Yet both made important, and interesting, cont... Read More about “Political … civil and domestic slavery”: Harriet Taylor Mill and Anna Doyle Wheeler on marriage, servitude, and socialism.

Reparations for the transatlantic slave trade and historical enslavement: Linking past atrocities with contemporary victim populations (2018)
Journal Article
Moffett, L., & Schwarz, K. (2018). Reparations for the transatlantic slave trade and historical enslavement: Linking past atrocities with contemporary victim populations. Netherlands Quarterly of Human Rights, 36(4), 247-269. https://doi.org/10.1177/0924051918801612

The debate around reparations for the transatlantic slave trade has been discussed for centuries with no end in sight. This article does not intend to cover the historical or political aspects of this debate, but instead to shed more light on the leg... Read More about Reparations for the transatlantic slave trade and historical enslavement: Linking past atrocities with contemporary victim populations.

Reasserting Agency: Procedural Justice, Victim-Centricity, and the Right to Remedy for Survivors of Slavery and Related Exploitation (2018)
Journal Article
Schwarz, K., & Geng, J. (2018). Reasserting Agency: Procedural Justice, Victim-Centricity, and the Right to Remedy for Survivors of Slavery and Related Exploitation. Journal of Modern Slavery, 4(2), 93-120

One of the biggest failings of contemporary regimes governing human exploitation is their treatment of ‘victims’. This paper roots narratives of victimhood and agency in the legal frameworks through analysis of the right to effective remedy in human... Read More about Reasserting Agency: Procedural Justice, Victim-Centricity, and the Right to Remedy for Survivors of Slavery and Related Exploitation.

Ending slavery by decarbonisation? Exploring the nexus of modern slavery, deforestation, and climate change action via REDD+ (2020)
Journal Article
Jackson, B., & Decker Sparks, J. L. (2020). Ending slavery by decarbonisation? Exploring the nexus of modern slavery, deforestation, and climate change action via REDD+. Energy Research and Social Science, 69, Article 101610. https://doi.org/10.1016/j.erss.2020.101610

Activities involving the deforestation are high-risk for modern slavery, and is an issue which has global consequences for forest environments and communities. Despite this, little work is being done to eradicate modern slavery from these sectors. An... Read More about Ending slavery by decarbonisation? Exploring the nexus of modern slavery, deforestation, and climate change action via REDD+.

Diffusion of labor standards through supplier–subcontractor networks: An agent‐based model (2020)
Journal Article
Gold, S., Chesney, T., Gruchmann, T., & Trautrims, A. (2020). Diffusion of labor standards through supplier–subcontractor networks: An agent‐based model. Journal of Industrial Ecology, 24(6), 1274-1286. https://doi.org/10.1111/jiec.13041

Subcontracting represents a popular business model in supply chains across industries. In the case of hidden subcontracting, subcontractors are beyond the visible horizon of the (focal) buying firm. Hence, buyers cannot intervene in the management of... Read More about Diffusion of labor standards through supplier–subcontractor networks: An agent‐based model.

Collapsing the Boundaries between De Jure and De Facto Slavery: The Foundations of Slavery beyond the Transatlantic Frame (2020)
Journal Article
Schwarz, K., & Nicholson, A. (2020). Collapsing the Boundaries between De Jure and De Facto Slavery: The Foundations of Slavery beyond the Transatlantic Frame. Human Rights Review, 21, 391-414. https://doi.org/10.1007/s12142-020-00604-y

The identification of contemporary forms of slavery is often problematically demarcated by reference to transatlantic enslavement as the definitive archetype. Such an approach overlooks other historic slaveries and neglects the totality of the maanga... Read More about Collapsing the Boundaries between De Jure and De Facto Slavery: The Foundations of Slavery beyond the Transatlantic Frame.