Learn More
Classification Red – highly sensitive information, limited access for: Yellow – restricted limited access for: Green – restricted to consortium members White – Public Internal reviewer(s) Abstract Understanding the risks associated with using cloud computing is of paramount importance for operators of high-assurance ICT services, such as critical(More)
It is a common experience that attempts to mitigate a risk lead to new risks, and that risks formerly thought to be of one kind become another kind as technical knowledge evolves. This phenomenon of risk migration suggests that we should take processes over time, rather than specific risks or specific technologies, as a unit of analysis. Several of our(More)
Industrial health and safety is an important yet largely unexplored application area of ubiquitous computing. In this paper we investigate the relationship between technology and organization in the context of a concrete industrial health and safety system. The system is designed to reduce the number of incidents of " vibration white finger " (VWF) at(More)
This review describes how a mismatch between the knowledge produced by scientists and the evidence demanded by regulators has emerged, and how society has struggled to find definitive answers to questions of safety, for an important flame retardant chemical in current use - Deca-BDE. This has involved two key disciplines: analytical chemistry and(More)
Ubiquitous computing is a new kind of computing where devices enhance everyday artefacts and open up previously inaccessible situations for data capture. 'Technology paternalism' has been suggested by Spiekermann and Pallas (Poiesis & Praxis: Int J Technol Assess Ethics Sci 4(1):6–18, 2006) as a concept to gauge the social and ethical impact of these new(More)
We argue that considering only a few 'big' ethical decisions in any engineering design process--both in education and practice--only reinforces the mistaken idea of engineering design as a series of independent sub-problems. Using data collected in engineering design organisations over a seven year period, we show how an ethical component to engineering(More)
A study was conducted of the practices that engineering designers had learned from experience to apply during the search for, and implementation of, new solution concepts. Each of 36 practices was analysed in terms of the goal it was directed to, and how it distributed cognition beyond the mental world of the designer. The results suggest that designers(More)
Focusing on technical security can lead to shortfalls in the understanding of social and organisational security challenges. This paper proposes a method for analysing social, technical, and organisational security challenges, in regard to industrial control systems (ICS). This method is applied to a target organisation dependent on ICS, to validate the(More)
As cyber-physical systems (CPS) become prevalent in everyday life, it is critical to understand the factors that may impact the security of such systems. In this paper, we present insights from an initial study of historical security incidents to analyse such factors for a particular class of CPS: industrial control systems (ICS). Our study challenges the(More)