skip to content

Department of Computer Science and Technology

Read more at: Harnessing the Power, Managing the Risk: The Future of AI, Data, and Cybersecurity

Harnessing the Power, Managing the Risk: The Future of AI, Data, and Cybersecurity

Tuesday, 13 May, 2025 - 14:00 to 15:00

AI has the potential to transform learning, creativity, and productivity. It represents a profound platform shift in technology - like the internet, or the shift to mobile. As with any transformational shift, AI will be (and already is) used for good and for evil. This talk will cover some of the practical examples of...


Read more at: Title to be confirmed

Title to be confirmed

Tuesday, 17 June, 2025 - 14:00 to 15:00

Abstract not available


Read more at: Title to be confirmed

Title to be confirmed

Tuesday, 27 May, 2025 - 14:00 to 15:00

Abstract not available


Read more at: Title to be confirmed

Title to be confirmed

Thursday, 1 May, 2025 - 14:00 to 15:00

Abstract not available


Read more at: Kintsugi: A Decentralized E2EE Key Recovery Protocol

Kintsugi: A Decentralized E2EE Key Recovery Protocol

Tuesday, 6 May, 2025 - 14:00 to 15:00

Key recovery is the process of regaining access to end-to-end encrypted data after the user has lost their device, but still has their password. Existing E2EE key recovery methods, such as those deployed by Signal and WhatsApp, centralize trust by relying on servers administered by a single provider. In this talk, we share...


Read more at: Title to be confirmed

Title to be confirmed

Tuesday, 20 May, 2025 - 14:00 to 15:00

Abstract not available


Read more at: ‘To Report or Not to Report: is that the Question?’ Exploring Young People's Reporting Practices of Illicit Drug Ads on Social Media

‘To Report or Not to Report: is that the Question?’ Exploring Young People's Reporting Practices of Illicit Drug Ads on Social Media

Friday, 14 March, 2025 - 14:00 to 15:00

Better algorithms mean less illegal content on social media. To improve these algorithms, users need to report such content, yet they often do not. This talk will explore young people’s attitudes and practices around reporting a specific online harm: illicit drug advertisements. A survey of UK students (13–18) examined...


Read more at: Challenges and tensions around online safety, security and privacy

Challenges and tensions around online safety, security and privacy

Friday, 28 February, 2025 - 14:00 to 15:00

Dan Sexton is Chief Technology Officer at the Internet Watch Foundation, a not-for-profit whose vision is to create an internet free from child sexual abuse and is a safe place for children and adults to use around the world. Zoom link: https://cam-ac-uk.zoom.us/j/83115049986?pwd=6W5bzFb49HcCbWqz6HR3tRhpVxubTb.1


Read more at: Challenges and tensions around online safety, security and privacy

Challenges and tensions around online safety, security and privacy

Friday, 28 February, 2025 - 14:00 to 15:00

Dan Sexton is Chief Technology Officer at the Internet Watch Foundation, a not-for-profit whose vision is to create an internet free from child sexual abuse and is a safe place for children and adults to use around the world.


Read more at: Downvoted to Oblivion: Censorship in Online, LGBTQ+ Communities

Downvoted to Oblivion: Censorship in Online, LGBTQ+ Communities

Tuesday, 25 February, 2025 - 14:00 to 15:00

Online communities enable surveillance among LGBTQ+ users despite being used as safe spaces where users can explore their identity free from most online harms. Coercion, doxxing, and public outing are all examples of privacy violations faced. These are experienced when users fail to conform to fellow community members’...