Research & Development
Usable persuasive security
Risk, trust and opportunity
Context awareness
Rule learning
Security in mobile work environments
Legal considerations
Impact
Reduction in user-motivated security incidents and their associated cost.
Mitigating the arguments against the adoption of BYOD and Corporate-Owned, Personally Enabled programs.
Increased understanding of legal issues with reference to the control of users’ behavior in corporate networks.
Testimonials

We derive requirements and guidelines for app developers on how to contribute to the protection of their users’ data

We blend our private and professional lives due to the flexibility to work at any time from different locations

Computational Intelligence techniques are used in order to endow the system with a self-adaptation ability

The Bring-YourOwn-Device trend is a fact and it is the reason we survey in this paper how computational trust and risk metrics may help mitigating those new risks in a more dynamic way than in the past.
