香蕉视频

Ben Brewster

Ben Brewster

香蕉视频er


Summary

I'm currently working as a researcher with CENTRIC (Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime 香蕉视频) inside CCRC. Primarily, my research interests fall somewhere between the information systems side of computing, knowledge management, and criminology. Of particular interest is the intersection and application of these disciplines within the security domain. In this regard, I am currently studying towards a PhD triangulating these interests in relation to their application in intelligence-led initiatives to combat Human Trafficking by the police, with the ultimate objective of developing a target operating model of effective practice for knowledge and intelligence management.

About

I'm currently working as a researcher with CENTRIC (Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime 香蕉视频) inside CCRC. Primarily, my research interests fall somewhere between the information systems side of computing, knowledge management, and criminology. Of particular interest is the intersection and application of these disciplines within the security domain. In this regard, I am currently studying towards a PhD triangulating these interests in relation to their application in intelligence-led initiatives to combat Human Trafficking by the police, with the ultimate objective of developing a target operating model of effective practice for knowledge and intelligence management.

Further to this, I have experience in working on a range of collaborative interdisciplinary security focused research projects alongside individuals and organizations from across Europe, integrating the skills of law enforcement, industry practitioners and policy makers, enterprise technology and solutions providers, and commercial and academic research partners. I currently work on a number of projects, including the FP7 funded ePOOLICE project focusing the on the use of text analytics and information retrieval tools to support open-source environmental scanning to enable the early detection, pursuit and prevention of organised crime, the EU funded COURAGE project seeking to define a future research agenda for cybercrime and cyberterrorism through prolonged engagement with domain stakeholders, and the DG-Home Affairs funded UINFC2 project centred around enhancing stakeholder engagement in response to the illegal use of the internet for the purposes of child exploitation through the use of data-mining.

Knowledge Management; Information Systems; Intelligence-led Policing; Security; Human Trafficking

Teaching

College of Business, Technology and Engineering

  • ePOOLICE
  • COURAGE
  • UINFC2

香蕉视频

  • Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime 香蕉视频
  • Culture and Creativity 香蕉视频 Institute

Publications

Key Publications

Brewster, B., Gibson, H., & Gunning, M. (2018). . In Levantakis, G., & Haberfeld, M. (Eds.) Societal implications of community鈥恛riented policing techology. (pp. 91-102). Switzerland: Springer:

Andrews, S., Brewster, B., & Day, T. (2016). . In Haemmerl茅, O., Stapleton, G., & Faron-Zucker, C. (Eds.) Graph-based representation and reasoning, (pp. 137-150). Heidelberg: Springer:

Akhgar, B., & Brewster, B. (Eds.). (2016). . Springer.

Journal articles

Brewster, B. (2019). . Journal of modern slavery, 4 (2), 200-224.

Nitsch, H., Brewster, B., & Akhgar, B. (2018). . European Law Enforcement 香蕉视频 Bulletin, SCE 4.

Marzell, L., & Brewster, B. (2017). . Crisis Response Journal, 13 (1), 80-82.

Brewster, B., Akhgar, B., Staniforth, A., Waddington, D., Andrews, S., & Johnson, K. (2014). . International journal of electronic security and digital forensics, 6 (1), 1-17.

Conference papers

Brewster, B., Andrews, S., Polovina, S., Hirsch, L., & Akhgar, B. (2014). . In Hernandez, N., J盲schke, R., & Croitoru, M. (Eds.) Graph-Based Representation and Reasoning, (pp. 275-280). Springer International Publishing:

Brewster, B., Polovina, S., Rankin, G., & Andrews, S. (2014). . In Hernandez, N., J盲schke, R., & Croitoru, M. (Eds.) Graph-Based Representation and Reasoning, (pp. 104-117). Springer International Publishing:

Book chapters

Charalambous, E., Kavallieros, D., Brewster, B., Leventakis, G., Koutras, N., & Papalexandratos, G. (2017). . In Akhgar, B., Bayerl, P.S., & Sampson, F. (Eds.) Open source intelligence investigation: from strategy to implementation. (pp. 233-249). Cham: Springer International Publishing:

Akhgar, B., Chora艣, M., Brewster, B., Bosco, F., Vermeersch, E., Luda, V., ... Wells, D. (2016). . In Akhgar, B., & Brewster, B. (Eds.) Combatting cybercrime and cyberterrorism : challenges, trends and priorities. (pp. 295-321). Cham: Springer International Publishing:

Wells, D., Brewster, B., & Akhgar, B. (2016). . In Akhgar, B., & Brewster, B. (Eds.) Combatting cybercrime and cyberterrorism : challenges, trends and priorities. (pp. 39-51). Cham: Springer International Publishing:

Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime. In Application of Big Data for National Security. (pp. 108-127). Elsevier:

Brewster, B., Kemp, B., Galahbakhtiari, S., & Akhgar, B. (2015). . In Akhgar, B., Saathoff, G.B., Arabnia, H.R., Hill, R., Staniforth, A., & Bayerl, P.S. (Eds.) Application of big data for national security: a practitioners guide to emerging technologies. (pp. 108-129). Oxford: Butterworth Heinemann (Elsevier):

Brewster, B., Ingle, T., & Rankin, G. (2014). . In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. (pp. 714-719). The Institute of Electrical and Electronics Engineers:

Bayerl, P.S., Akhgar, B., Brewster, B., Domdouzis, K., & Gibson, H. (2014). . In Akhgar, B., Staniforth, A., & Bosco, F. (Eds.) Cyber Crime and Cyber Terrorism Investigators Handbook. (pp. 197-220). Elsevier:

Bayerl, P.S., Staniforth, A., Akhgar, B., Brewster, B., & Johnson, K. (2014). . In Akhgar, B., & Arabnia, H. (Eds.) Emerging Trends in ICT Security. (pp. 539-547). Elsevier:

Hassanzadeh, M., Jahangiri, N., & Brewster, B. (2014). . In Akhgar, B., & Arabnia, H. (Eds.) Emerging Trends in ICT Security. (pp. 99-110). Elsevier:

Books

Akhgar, B., & Brewster, B. (Eds.). (2016). Combatting Cybercrime and Cyberterrorism. Springer International Publishing.

BEN, (1992). Preface. Elsevier.

BEN, (1992). Preface. Elsevier.

Theses / Dissertations

Marshall, N.R. (2019). . (Doctoral thesis). Supervised by Demack, S.

Cancel event

Are you sure you want to cancel your place on Saturday 12 November?

}