Research and analysis

Cyber trust and crime prevention

Foresight report looking at the future opportunities and challenges created by information and communication technologies.

Documents

Cyber trust and crime prevention: executive summary

Order a copy

This file may not be suitable for users of assistive technology. Request an accessible format.

If you use assistive technology (eg a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gsi.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Cyber trust and crime prevention: user guide

Order a copy

This file may not be suitable for users of assistive technology. Request an accessible format.

If you use assistive technology (eg a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gsi.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Cyber trust and crime prevention: gaining insight from 3 different futures

Order a copy

This file may not be suitable for users of assistive technology. Request an accessible format.

If you use assistive technology (eg a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gsi.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews

This file may not be suitable for users of assistive technology. Request an accessible format.

If you use assistive technology (eg a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gsi.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Detail

This report considers the possible applications and effects of next generation technologies in computing, communication and personal security. It also explores the basis for effective interaction and trust between people and machines. The report focuses on:

  • identity and authenticity
  • surveillance and security
  • system robustness
  • information assurance

Further details of the project are available from the cyber trust project page.