Research and analysis

Cyber trust and crime prevention

Foresight report looking at the future opportunities and challenges created by information and communication technologies.

Documents

Cyber trust and crime prevention: executive summary

Request an accessible format.
If you use assistive technology (such as a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Cyber trust and crime prevention: user guide

Request an accessible format.
If you use assistive technology (such as a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Cyber trust and crime prevention: gaining insight from 3 different futures

Request an accessible format.
If you use assistive technology (such as a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews

Request an accessible format.
If you use assistive technology (such as a screen reader) and need a version of this document in a more accessible format, please email contact@go-science.gov.uk. Please tell us what format you need. It will help us if you say what assistive technology you use.

Details

This report considers the possible applications and effects of next generation technologies in computing, communication and personal security. It also explores the basis for effective interaction and trust between people and machines. The report focuses on:

  • identity and authenticity
  • surveillance and security
  • system robustness
  • information assurance

Further details of the project are available from the cyber trust project page.

Published 10 June 2004