[Skip to content]
To view this video please enable JavaScript, and consider upgrading to a web browser that supports HTML5 video
Cyber Crime.

Research

Cybercrime, Digital Forensics and Security 

Contact us

Our research aims to improve cybercrime investigations, advance computer security and forensics mechanisms and support best practice. Our diverse academic team includes experts in computer security, digital forensics, artificial intelligence and analytics and criminology.

For example, Leeds Beckett University is working in close collaboration with West Yorkshire Police to conduct innovative research projects. Academics and police cybercrime investigators have recently received £640,000 in funding to improve and incorporate an evidence-based approach to digital forensics and cybercrime investigations.

Themes

  • Cybercrime investigation.
  • Digital forensics.
  • Computer security.
  • Human factors of forensics and security.
Cybercrime, Digital Foresnics and Security Team

Publications

Plus Icon Journal Papers
  • Z. C. Schreuders, C. Payne, and T. McGill "The Functionality-based Application Confinement Model," International Journal of Information Security, Springer-Verlag, 2013. DOI: 10.1007/s10207-013-0199-4
  • Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers & Security, Volume 32, Elsevier B.V., 2013. View Author's Version PDF, DOI: 10.1016/j.cose.2012.09.007
  • Z. C. Schreuders, T. McGill, and C. Payne, "Towards Usable Application-oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM," International Journal of Information Security and Privacy, Volume 6 Issue 1, 2012. DOI: 10.4018/jisp.2012010104
  • Z. C. Schreuders, T. McGill, and C. Payne, "Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor and FBAC-LSM," ACM Transactions on Information and System Security (TISSEC), Volume 14 Issue 2, ACM New York, NY, USA 2011.
Plus Icon Book Chapters
  • E. Butterfield "High-tech investigations of cyber crime" in Akhgar, B., Staniforth, A., Bosco, F. (2014) Cyber Crime and Cyber Terrorism Investigator's Handbook. Syngress Media.
  • Elliott, J.R. (2014) Modelling Human Visual Detection of Anti-Social Behaviour. In: Gamito, P.S.P. and Rosa, P.J. eds. I See Me, You See Me: Inferring Cognitive and Emotional Processes from Gazing Behaviour. Cambridge Scholars Publishing.
Plus Icon Peer-reviewed Conference Papers
  • Z. C. Schreuders, E. Butterfield, and P. Staniforth, "An open cloud-based virtual lab environment for computer security education: A pilot study evaluation of oVirt," in The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015) Liverpool, UK, 2015. View PDF
  • Z. C. Schreuders, and L. Ardern, "Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment," in The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015) Liverpool, UK, 2015. View PDF
  • E. Butterfield, and Z. C. Schreuders, "Student Led Data Recovery Services: Providing digital forensics students with relevant work experience," in The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015) Liverpool, UK, 2015. View PDF
  • Gray D., Blackburn M., Butterfield E., Harrison P. , Kelsey S. and Window L, “Virtual EQ – the talent differentiator in 2020?” in International Conference on HRD Research and Practice across Europe: The future of HRD – 2020 and beyond: challenges and opportunities. CLEGI. View PDF
  • Z. C. Schreuders and A. M. Bhat, "Not All ISPs Equally Secure Home Users: An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs," in International Conference on Security and Cryptography (SECRYPT 2013) Reykjavik, Iceland, 2013. View PDF
  • Z. C. Schreuders, C. Payne and T. McGill, "Techniques for Automating Policy Specification for Application-oriented Access Controls," in Sixth International Conference on Availability, Reliability and Security (ARES 2011) Vienna, Austria: IEEE Computer Society, 2011. View PDF, DOI: 10.1109/ARES.2011.47
  • Z. C. Schreuders, C. Payne and T. McGill, "A Policy Language for Abstraction and Automation in Application-oriented Access Controls: The Functionality-based Application Confinement Policy Language," in IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011) Italy, Pisa: IEEE Computer Society, 2011. View PDF, DOI: 10.1109/POLICY.2011.11
  • Z. C. Schreuders and C. Payne, "Functionality-Based Application Confinement: Parameterised Hierarchical Application Restrictions," in International Conference on Security and Cryptography (SECRYPT 2008) Porto, Portugal: Springer, 2008. View PDF
  • Z. C. Schreuders and C. Payne, "Reusability of Functionality-Based Application Confinement Policy Abstractions," in 10th International Conference on Information and Communications Security (ICICS 2008) Birmingham, UK: Springer, 2008. View PDF, DOI: 10.1007/978-3-540-88625-9_14
Plus Icon Other Conference Presentations
  • E. Butterfield, “The Dark Web”, BCS ISSG, Leeds UK, 2014
  • Z. C. Schreuders, "Games and Gamification for Improving Out-of-class Engagement of Computer Security Education," Cyber Security Pedagogy, Teaching and Learning in Higher Education Warwick, UK, 2013.
  • Z. C. Schreuders, "Next Generation Hacking: Dangers of Digital," Information Security in Financial Services London, UK, 2015.
  • Z. C. Schreuders, "Banking Payment Insecurities," Payments Fraud & Security London, UK, 2015.
  • Z. C. Schreuders, "Games and Gamification for Improving Out-of-class Engagement of Computer Security Education," Cyber Security Pedagogy, Teaching and Learning in Higher Education Warwick, UK, 2013.
  • Z. C. Schreuders, "Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM," Linux Security Summit 2010 - LinuxCon Boston, MA USA: 2010. View Abstract, View Slides, View Write Up #1, View Write Up #2, #3
  • Z. C. Schreuders, "A New Paradigm for Restricting Applications and Protecting Yourself from Your Processes," linux.conf.au - LCA2010 Wellington, New Zealand: 2010. Watch Video, View Abstract
  • Z. C. Schreuders, "The Functionality-Based Application Confinement Model and its Linux Prototype FBAC-LSM," linux.conf.au - LCA2009 Tasmania, Australia: 2009. View Abstract

PhD Students

  • Lewis Ardern – Mobile Security (Director of Studies: Z. Cliffe Schreuders).
  • Emlyn Butterfield – Digital Forensics (Director of Studies: Colin Pattinson).

Case Study: Working with West Yorkshire Police to improve the investigation of cybercrime

Leeds Beckett University is leading a research collaboration between academics and police to improve and incorporate an evidence-based approach to digital forensics and cybercrime investigations.

This research has received £640,000 in funding. Cybercrime police officers will receive research training and will work with Leeds Beckett academics on research projects to identify and address weaknesses in police processes.

The planned collaboration, reported on the Leeds Beckett website will involve the entire Digital Forensics Unit and Cybercrime Unit from West Yorkshire Police (19 officers in total). It will provide them with training and personal development and will enable them to take an active research role, under the supervision of Leeds Beckett academics. In addition, two postdoctoral researchers will be deployed on-site at West Yorkshire Police to facilitate the work.

Following an initial needs analysis, force staff will work with academics to identify research project priorities. For 12 months, members of both police units will have dedicated time (two days per week) for research and collaboration. This will involve, working on a portfolio of research and training development projects, which will be based on existing literature and the needs analysis. This will feed into the design and development of training and will improve the techniques and tools used in the fight against cybercrime.

As part of the collaboration, research culture and capacity will be developed within West Yorkshire Police. Through collaborative knowledge exchange and development, we will produce research results that will provide tools and training materials that will enable police forces to more efficiently and effectively process digital evidence and cybercrime cases.

In conclusion, cybercrime is not exclusively a technical problem. Our research analyses the investigation lifecycle, including the experience of the public when reporting cybercrime, the call taker, the attending officer, investigators, and the Crown Prosecution Service, with the aim of identifying key knowledge gaps and needs in the policing of cybercrime.

If you are interested in Any of our services or have a Question, please contact us

Contact Us Right Arrow
Back to Top Button
Back to Top Button