Our Research

Our vision is to deliver excellence in applied research for policing and security. Our approach blends evidence-based research, policy and practice with the development of tangible solutions that have a real-world impact on the security domain.

Books


International Security Management: New Solutions to Complexity
Jacobs, G., Suojanen, I., Horton, K. E., & Bayerl, P. S. (Eds.)
Springer International Publishing
Policing in the Era of AI and Smart Societies
Jahankhani, H., Akhgar, B., Cochrane, P., & Dastbaz, M. (Eds.)
Springer International Publishing
Social media strategy in policing: From cultural intelligence to community policing
Akhgar, B., Bayerl, P.S, & Leventakis, G. (Eds.)
Springer
Serious Games for Enhancing Law Enforcement Agencies
Akhgar, B. (Eds.)
Springer International Publishing

Journal Articles


Conference Articles


  • Gibson, H., Andrews, S., Domdouzis, K., Hirsch, L., & Akhgar, B. (). Combining big social media data and FCA for crisis response. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. (pp. 690-695). IEEE.
  • Akhgar, B., & Gibson, H. (). Processing social media data for crisis management in Athena. In: International Conference on Global Security, Safety, and Sustainability. (pp. 3-14). Springer, Cham.
  • Bayerl, P. S., & Akhgar, B. (). Online surveillance awareness as impact on data validity for open-source intelligence?. In: International Conference on Global Security, Safety, and Sustainability. (pp. 15-20). Springer, Cham.
  • Pournouri, S., & Akhgar, B. (). Improving cyber situational awareness through data mining and predictive analytic techniques. In: International Conference on Global Security, Safety, and Sustainability. (pp. 21-34). Springer, Cham.
  • Brewster, B., Andrews, S., Polovina, S., Hirsch, L., & Akhgar, B. (). Environmental scanning and knowledge representation for the detection of organised crime threats. In: International Conference on Conceptual Structures. (pp. 275-280). Springer, Cham.
  • Akhgar, B., Fortune, D., Hayes, R. E., Guerra, B., & Manso, M. (). Social media in crisis events: Open networks and collaboration supporting disaster response and recovery. In: 2013 IEEE International conference on technologies for Homeland Security (HST). (pp. 760-765). IEEE.
  • Andrews, S., Akhgar, B., Yates, S., Stedmon, A., & Hirsch, L. (). Using formal concept analysis to detect and monitor organised crime. In: International Conference on Flexible Query Answering Systems. (pp. 124-133). Springer, Berlin, Heidelberg.

Book Chapters


  • Bayerl, P. S., Bates, L. and Akhgar, B. (). Securing the smart city: patterns of public acceptance for integrated technological solutions. In: 2023 IEEE International Smart Cities Conference (ISC2). IEEE.
  • Ezzeddine, Y., Bayerl, P. S. and Gibson, H. (). Citizen Perspectives on Necessary Safeguards to the Use of AI by Law Enforcement Agencies. In: Proceedings from CSCE 2022. Transactions on Computational Science & Computational Intelligence . Springer Nature.
  • Huber, F., Abdel-Samad, Y., Spathi, T., Hough, K. L., Caforio, A., Munteanu, C., Karimi, M., Eckhardt-Rodriguez. A., Kantor, E., Fiadzo, C., Wanner, L., Moudatsou, M. & Dimopoulou, E. (). Shaping ICT Policies for Integrative and Inclusive Digital Services. In: Information and Communications Technology in Support of Migration. (pp. 367-380). Springer, Cham.
  • Kuneva, L., Ilcheva, M., Hough, K. L., Bayerl, P. S., & Pannocchia, D. (). Migration Knowledge Production: Stakeholder Mapping and Engagement. In: Information and Communications Technology in Support of Migration. (pp. 71-92). Springer, Cham.
  • Raven, A. (). Case Study: Match Fixing on the Dark Web. In: Dark Web Investigation. (pp. 267-272). Springer, Cham.
  • Abdel Samad, Y. (). Case Study: Dark Web Markets. In: Dark Web Investigation. (pp. 237-247). Springer, Cham.
  • Raven, A., Akhgar, B., & Abdel Samad, Y. (). Case Studies: Child Sexual Exploitation. In: Dark Web Investigation. (pp. 249-266). Springer, Cham.
  • Sampson, F. (). Data Privacy and Security: Some Legal and Ethical Challenges. In: Information Security Technologies for Controlling Pandemics. (pp. 109-134). Springer, Cham.

White Papers and Reports