Image of Dr Aine Mac Dermott

Dr Aine Mac Dermott

School of Computer Science and Mathematics

Faculty of Engineering and Technology

Dr Áine MacDermott is a Senior Lecturer in Cyber Security and Digital Forensics at Liverpool John Moores University. Áine teaches on both the Computer Forensics and Computer Security programmes in the School of Computer Science and Mathematics. She obtained her PhD in Network Security from Liverpool John Moores University in 2017, and a first class BSc (Hons) in Computer Forensics in 2011.

Degrees

Liverpool John Moores University, UK, PhD
Liverpool John Moores University, UK, BSc (Hons) Computer Forensics

Certifications

2018, Liverpool John Moores University, UK, Postgraduate Certificate in Learning and Teaching in Higher Education

Academic appointments

Adjunct Professor, Faculty of Business and IT, Ontario Tech University, 2020 - present
Senior Lecturer in Cyber Security and Digital Forensics, Computer Science, Liverpool John Moores University, 2017 - present

Postgraduate training

Fellow of Higher Education Academy, UK, Liverpool John Moores University, 2018 - present
Associate Fellow of Higher Education Academy, United Kingdom, Liverpool John Moores University, Liverpool, 2014 - 2018

Highlighted publications

Iqbal F, Kazim A, MacDermott Á, Ikuesan R, Hasan M, Marrington A. 2024. Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024: The 19th International Conference on Availability, Reliability and Security :1-9 DOI Publisher Url Public Url

Rafferty L, Macdermott A. 2024. Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots Proceedings of the 57th Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences (HICSS) :1722-1732 Publisher Url Public Url

Mac Dermott AM, Heath H, Akinbi A. 2022. Disappearing Messages: Privacy or Piracy? CONF-IRM 2022 Proceedings, the 15th Association for Information Systems (AIS) International Conference on Information Resources Management (Conf-IRM 2022) 10 Publisher Url Public Url

Mac Dermott AM, Motylinski M, Iqbal F, Stamp K, Hussain M, Marrington A. 2022. Using deep learning to detect social media ‘trolls’ Forensic Science International: Digital Investigation, DFRWS APAC 2022 43 DOI Publisher Url Public Url

Mac Dermott AM, Baker T, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) DOI Author Url Publisher Url Public Url

Conference publication

Iqbal F, Kazim A, MacDermott Á, Ikuesan R, Hasan M, Marrington A. 2024. Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024: The 19th International Conference on Availability, Reliability and Security :1-9 DOI Publisher Url Public Url

Rafferty L, Macdermott A. 2024. Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots Proceedings of the 57th Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences (HICSS) :1722-1732 Publisher Url Public Url

Mac Dermott AM, Heath H, Akinbi A. 2022. Disappearing Messages: Privacy or Piracy? CONF-IRM 2022 Proceedings, the 15th Association for Information Systems (AIS) International Conference on Information Resources Management (Conf-IRM 2022) 10 Publisher Url Public Url

Mac Dermott AM, Motylinski M, Iqbal F, Stamp K, Hussain M, Marrington A. 2022. Using deep learning to detect social media ‘trolls’ Forensic Science International: Digital Investigation, DFRWS APAC 2022 43 DOI Publisher Url Public Url

Khalid Z, Iqbal F, Al-Hussaeni K, MacDermott A, Hussain M. 2022. Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 442 LNICST :583-601 DOI Publisher Url

Oh EN, Baharon MR, Yassin SMWMSMM, Idris A, Macdermott A. 2022. Preserving Data Privacy in Mobile Cloud Computing using Enhanced Homomorphic Encryption Scheme Journal of Physics: Conference Series, 2319 DOI Publisher Url

Williams J, Mac Dermott AM, Stamp K, Iqbal F. 2021. Forensic Analysis of Fitbit Versa: Android vs iOS 2021 IEEE Security and Privacy Workshops (SPW), Systematic Approaches to Digital Forensic Engineering. IEEE Symposium on Security and Privacy 2021 DOI Author Url Publisher Url Public Url

Iqbal F, Motylinski M, Mac Dermott AM. 2021. Discord Server Forensics: Analysis and Extraction of Digital Evidence 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Cybercrime Investigation and Digital Forensics Workshop. 11th IFIP International Conference on New Technologies, Mobility and Security, Paris, France DOI Publisher Url Public Url

Mac Dermott AM, Carr J, Shi Q, Baharon MR, Lee GM. 2020. Privacy preserving issues in the dynamic internet of things 2020 International Symposium on Networks, Computers and Communications (ISNCC), IEEE International Symposium on Networks, Computers and Communications ( DOI Publisher Url Public Url

Motyliński M, Mac Dermott AM, Iqbal F, Hussain M, Aleem S. 2020. Digital Forensic Acquisition and Analysis of Discord Applications 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2020 International Conference on Communications, Computing, Cybersecurity and Informatics DOI Publisher Url Public Url

Hamdi DA, Iqbal F, Alam S, Kazim A, Mac Dermott A. 2020. Drone Forensics: A Case Study on DJI Phantom 4 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) DOI Publisher Url

Mac Dermott AM, Kendrick P, Idowu IO, Ashall M, Shi Q. 2019. Securing Things in the Healthcare Internet of Things 2019 Global IoT Summit (GIoTS), Global IoT Summit DOI Author Url Publisher Url Public Url

Mac Dermott AM, Lea S, Iqbal F, Idowu IO, Shah B. 2019. Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP watches 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 10 th IFIP International Conference on New Technologies, Mobility and Security DOI Author Url Publisher Url Public Url

Jayasinghe U, Lee GM, MacDermott Á. 2018. Trust-Based Data Controller for Personal Information Management 2018 International Conference on Innovations in Information Technology (IIT), IEEE 13th International Conference on Innovations in Information Technology DOI Author Url Publisher Url Public Url

Mac Dermott AM, Baker T, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) DOI Author Url Publisher Url Public Url

Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott AM, Shi Q. 2017. Deep Learning Combined with De - noising Data for Network Intrusion Detection 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), Intelligent and Evolutionary Systems (IES 2017) DOI Author Url Publisher Url Public Url

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Intelligent Computing Methodologies, International Conference on Intelligent Computing (ICIC 2017) 10363 :203-212 DOI Author Url Publisher Url Public Url

Alghamdi M, Al-Jumeily D, Hussain A, Mac Dermott A. 2016. A Proposed Tutoring System to Support the Learning of Computer Programming: Case Study PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), SAI Computing Conference (SAI) :875-880 DOI Author Url Publisher Url

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 Author Url

Al-Jumeily D, Hussain A, MacDermott A, Seeckts G, Lunn J. 2015. Methods and Techniques to Support the Development of Fraud Detection System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :224-227 DOI Author Url Publisher Url

Al-Jumeily D, Hussain A, MacDermott A, Murphy J. 2015. Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :282-286 DOI Author Url Publisher Url

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Murphy J. 2015. Improving Communication Between Healthcare Professionals and Their Patients Through a Prescription Tracking System Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :218-224 DOI Author Url Publisher Url

Buck P, Shi Q, MacDermott A. 2015. A Selective Regression Testing Approach for Composite Web Services Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :97-101 DOI Author Url Publisher Url

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Seeckts G, Lunn J. 2015. The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :7-13 DOI Author Url Publisher Url

Lever KE, MacDermott A, Kifayat K. 2015. Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :47-52 DOI Author Url Publisher Url

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 DOI Author Url Publisher Url

Jaitner M, MacDermott A. 2015. Cyber Education? Branches of Science Contributing to the Cyber Domain Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :120-128 Author Url

Hamid T, MacDermott A. 2015. A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :53-59 DOI Author Url Publisher Url

MacDermott A, Hurst W, Shi Q, Merabti M. 2014. Simulating Critical Infrastructure Cascading Failure AlDabass D, Orsoni A, Cant R, Yunus J, Ibrahim Z, Saad I. 2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 16th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim) :324-329 DOI Author Url Publisher Url

MacDermott A, Shi Q, Merabti M, Kifiyat K. 2013. Considering an Elastic Scaling Model for Cloud Security 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 8th International Conference for Internet Technology and Secured Transactions (ICITST) :150-155 DOI Author Url Publisher Url

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

Journal article

Raymer E, MacDermott Á, Akinbi A. 2023. Virtual reality forensics: Forensic analysis of Meta Quest 2 Forensic Science International: Digital Investigation, 47 :301658-301658 DOI Publisher Url Public Url

Iqbal F, Samsom F, Kamoun F, MacDermott Á. 2023. When ChatGPT goes rogue: exploring the potential cybersecurity threats of AI-powered conversational chatbots Frontiers in Communications and Networks, 4 DOI Publisher Url Public Url

Iqbal F, Jaffri A, Khalid Z, MacDermott A, Ali QE, Hung PCK. 2023. Forensic investigation of small-scale digital devices: a futuristic view Frontiers in Communications and Networks, 4 DOI Publisher Url Public Url

Heath H, MacDermott Á, Akinbi A. 2023. Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data? Forensic Science International: Digital Investigation, 46 :301585 DOI Publisher Url Public Url

Akinbi A, MacDermott Á, Ismael AM. 2022. A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models Forensic Science International: Digital Investigation, 42 :1-11 DOI Publisher Url Public Url

Motylinski M, Mac Dermott A, Iqbal F, Shah B. 2022. A GPU-based Machine Learning Approach for Detection of Botnet Attacks Computers and Security, 123 DOI Publisher Url Public Url

Al-Room K, Iqbal F, Baker T, Shah B, Yankson B, Mac Dermott A, Hung P. 2021. Drones Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models International Journal of Digital Crime and Forensics (IJDCF), 13 DOI Publisher Url Public Url

Mohi-Ud-din G, Marnerides A, Shi Q, Dobbins C, MacDermott AM. 2020. Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems IEEE Transactions on Emerging Topics in Computational Intelligence, 5 :860-870 DOI Author Url Publisher Url Public Url

Mac Dermott AM, Shamsa TB, Buck P, Iqbal F, Shi Q. 2019. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF), 12 DOI Publisher Url Public Url

Jayasinghe U, Lee GM, MacDermott Á, Rhee WS. 2019. TrustChain: A Privacy Preserving Blockchain with Edge Computing Wireless Communications and Mobile Computing, DOI Author Url Publisher Url Public Url

Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott Á, Wang X. 2019. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url

Baker T, Asim M, Mac Dermott AM, Iqbal F, Kamoun F, Shah B, Alfandi O, Hammoudeh M. 2019. A Secure Fog-based Platform for SCADA-based IoT Critical Infrastructure Software: Practice and Experience, DOI Author Url Publisher Url Public Url

Chalmers C, Mackay M, MacDermott A. 2016. Securing the smart grid: threats and remediation International Journal of Smart Grid and Green Communications, 1 :166-166 DOI Publisher Url

Jaitner ML, MacDermott Á. 2016. Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: International Journal of Cyber Warfare and Terrorism, 6 :24-40 DOI Publisher Url

Hurst W, Mac Dermott A. 2015. Evaluating the Effects of Cascading Failures in a Network of Critical Infrastructures International Journal of System of Systems Engineering, 6 :221-236 DOI Publisher Url Public Url

Mac Dermott AM, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 DOI Public Url

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 DOI Publisher Url Public Url

Mac Dermott AM, Shi Q, Kifayat K. 2014. An elastic scaling method for cloud security The Journal of Internet Technology and Secured Transactions (JITST), 3 :254-262 DOI Publisher Url Public Url

Chapters

Mac Dermott AM, Hung P. 2022. Machine Learning and the Trusted Internet of Things (IoT) Phung D, Webb GI, Sammut C. Encyclopedia of Machine Learning and Data Science Springer DOI Publisher Url Public Url

Jaitner ML, MacDermott Á. 2018. Arts and branches of science significantly contributing to cyber and cyber security: The West European and the Russian views Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications :977-994 DOI Publisher Url

Al-Askar H, Radi N, MacDermott Á. 2015. Recurrent Neural Networks in Medical Data Analysis and Classifications Applied Computing in Medicine and Health :147-165 DOI Publisher Url

Thesis/Dissertation

Mac Dermott AM. Collaborative Intrusion Detection in Federated Cloud Environments using Dempster-Shafer Theory of Evidence Shi Q, Kifayat K. Public Url

Highlighted activities

Media Coverage:

LJMU Bicentenary Profile - Dr Áine MacDermott 2023. 2023

Award:

LJMU Individual Teaching Excellence Award, LJMU Teaching and Learning Excellence Awards (TLAs), https://www.ljmu.ac.uk/teaching-and-learning-academy/teaching-and-learning-awards/tla-2023-winners. 2023

Other invited event:

LJMU Tech Talks: Cyber Security in the News and at LJMU, Liverpool John Moores University, The School of Computer Science and Mathematics hosted a series of Tech Talks. Dr MacDermott gave a Tech Talk on Cyber Security. Title: Want to take part in an actual Squid Game? Abstract: If it sounds too good to be true then it probably is! Players in the Squid Game cryptocurrency market have been eliminated — at least their investment has — by what cryptocurrency watchers have called a classic “rug-pull” scam. In our session we will be looking at the rise in global cyber-crime and how it is not limited to one specific domain. Threat mapping and some useful online tools will be explored, and specifically we'll see how the rising trend in Squid game made many fans lose their money! When quid tokens were first released last week, they were valued at $0.01 but promised entry into a game with the same premise as the Squid Game series from Netflix. We'll also explore the rapid rise in ransomware and how cyber security can minimise risk, improve resilience, and recover from an attack. YouTube link: https://youtu.be/QE31K5I9TUE. 2021

Professional activities

Media Coverage:

LJMU Bicentenary Profile - Dr Áine MacDermott 2023

An article on Dr MacDermott's research and role within the Department of Computer Science was published in an Eolas magazine issue entitled 'Demystifying applied IoT and security considerations' in their cyber security report section.

Bring It On Ni profiled Áine as a role model and inspiring woman in tech as part of their International Women’s Day promotion:

SYNC NI wrote an article based on a talk Dr MacDermott gave at Belfast Metropolitan College (18th February 2019). The article highlights the topics covered and Áine’s expertise in the area.

An article Áine wrote was published in Agenda NIs recent issue (March 2019). "Demystifying applied IoT and security considerations highlights issues discussed at Digital Government conference 2018:

Research Grants Awarded:

LJMU Teaching and Learning Academy, Digital Forensics & Cyber Crime Taxonomy, Grant value (£): 5100, Duration of research project: 7 months. 2023

Public engagement:

Participatory research, The workshop was aimed digital forensics and cybersecurity practitioners interested in learning about deepfake forensics., Workshop, I initiated, planned, and coordinated a 'Deepfake Forensics' workshop at LJMU, Liverpool John Moores University, Deepfake Forensics Workshop: Identifying and Combatting Manipulated Digital Media, Thirty professionals, researchers and academics specializing in cybersecurity and digital forensics attended from various locations in the UK. Representatives from national police forces also attended: North Wales Police and Merseyside Police. The outcomes from the workshop, along with my research findings, have been used to support submission further research and inform my teaching., https://www.eventbrite.co.uk/e/deepfake-forensics-identifying-and-combatting-manipulated-digital-media-tickets-635354481357?aff=oddtdtcreator. 2023

Award:

LJMU Individual Teaching Excellence Award, LJMU Teaching and Learning Excellence Awards (TLAs), https://www.ljmu.ac.uk/teaching-and-learning-academy/teaching-and-learning-awards/tla-2023-winners. 2023

LJMU Faculty of Engineering and Technology Individual Teaching Excellence Award 2023, LJMU Faculty of Engineering and Technology. 2023

Conference organisation:

Engaging and Active Security Education 2022 (EASE 2022) Workshop, I organized and co-chaired the EASE workshop in collaboration with Dr Joseph Maguire (University of Glasgow) . Abstract: Security is an increasingly important topic within higher education, but it is often challenging to identify effective learning and teaching practices that actively involve all students. The Engaging and Active Security Education (EASE) workshop at the UK ACM SIGCSE Computing Education Practice conference aims to support cyber security educators in exchanging practice as well as devising new practices. The objectives of the EASE workshop are: to expand the community of cyber security educators to provide an avenue for cyber security educators to exchange learning and teaching practice to afford opportunities for cyber security educators to collaborate and form novel learning and teaching practices.. 2022

Other invited event:

LJMU Tech Talks: Cyber Security in the News and at LJMU, Liverpool John Moores University, The School of Computer Science and Mathematics hosted a series of Tech Talks. Dr MacDermott gave a Tech Talk on Cyber Security. Title: Want to take part in an actual Squid Game? Abstract: If it sounds too good to be true then it probably is! Players in the Squid Game cryptocurrency market have been eliminated — at least their investment has — by what cryptocurrency watchers have called a classic “rug-pull” scam. In our session we will be looking at the rise in global cyber-crime and how it is not limited to one specific domain. Threat mapping and some useful online tools will be explored, and specifically we'll see how the rising trend in Squid game made many fans lose their money! When quid tokens were first released last week, they were valued at $0.01 but promised entry into a game with the same premise as the Squid Game series from Netflix. We'll also explore the rapid rise in ransomware and how cyber security can minimise risk, improve resilience, and recover from an attack. YouTube link: https://youtu.be/QE31K5I9TUE. 2021

Internet of Things in Healthcare: Applications, opportunities and challenges, Liverpool, UK, Organised by the IET, this half day seminar looked at the challenges, applications and opportunities for the Internet of Things in the world of healthcare. Delegates heard from a number of speakers on some fascinating topics. Discussing the security implications of using IoT in this highly sensitive sector was Dr Aine Mac Dermott from Liverpool John Moores University.. 2019

IoT security and autonomous vehicles, Belfast Met - Springvale Campus, e3 Building - 398 Springfield Road - BT12 7DU Belfast - United Kingdom, Dr. MacDermott presents benefits and values of IoT applications for commercial operations. Title and abstract from the talk can be seen below: The Internet of Everything The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) are growing in prominence and adoption. However, while is it known there are associated privacy and security challenges, the benefits and value for commercial operations often outweigh these. Clearly, the IIoT has more demonstrable value. Consumer IoT is a younger market to IIoT, but as it matures there is a ‘secure by design’ standard being encouraged, and development of organisational policies and procedures. Cybersecurity, data security and privacy are key, but resilience and accountability is a more realistic action going forward. GDPR compliance and associated costs make protecting IoT devices and improving resilience and exchange logging imperative. This talk takes a security and digital forensic look at the IoT and IIoT; offering insight and analysis on this emerging paradigm and explores ‘are they more than just interconnected ‘things’?’. 2019

Westminster eForum Keynote, London, Dr MacDermott delivered a keynote address to the Westminster eForum Keynote Seminar: Internet of Things - commercial opportunities, service development and connected homes, on 22nd May 2018.. 2018

State of the Art: Internet of Things, Liverpool, Dr MacDermott presented her research and offered a detailed primer on IoT utilisation by SMEs at "State of the Art: Internet of Things", organised by LCRActivate, LJMU, & FACT Liverpool on 3rd May 2018. Link available: http://networkhub.sci-techdaresbury.com/event/lcr-activate-event-state-of-the-art-internet-of-things/. 2018

Digital Government 2018, Belfast, Dr. Áine MacDermott was invited to speak about emerging trends in IoT and addressing security issues at the Digital Government meeting. Link available: http://www.digitalgovernment.agendani.com/speaker/dr-aine-macdermott/. 2018

Top