Oliver Buckley is Senior Lecturer in the School of Computing Sciences at UEA. He explores how to make open, accessible and transparent. He is researching how technology systems that shape people’s lives – often against a backdrop of individual ignorance on how computers are capturing insights and steering choices and decisions. Examples include use of technology in choice of schools, public funding for social security, organ donation, and refugee resettlement. Projects include improving the ‘honesty’ of chatbots so that they provide more open and honest disclosures (especially in the context of health and medical situations) and identifying information about identities through keystrokes and computer habits (in the context of security threats).
Oliver has worked as a software engineer across a variety of organisations including: Diamond Light Source, eMediaTrack, and The National Trust - developing a range of software such as web applications, cloud computing tools and virtualisation software. After his time in industry he took a role as a postdoctoral researcher at the University of Oxford as part of the Cyber Security Centre. He was a part of the Corporate Insider Threat Detection project. Oliver has had formal media experience through his selection as a British Science Association Media Fellow (when he was based in the Sky News operation for 4 weeks).
Areas of Expertise (9)
University of Wales, Bangor: Ph.D., Computer Science 2009
University of Liverpool: B.Sc., Computer Science 2004
Media Appearances (1)
Would you trust a robot with personal information? UEA scientists trying to make chatbots ‘trustworthy’
Eastern Daily Press online
Lead researcher Dr Oliver Buckley, from UEA's school of computing sciences, said businesses and governments were increasingly turning to chatbots to feed user demand for fast, reliable and accurate information. "Chatbots are all around us, particularly in customer support roles. They're speaking to us on the phone, emailing us, and responding to text messages - with answers to queries and even providing advice and guidance," he said.
Understanding Insider Threat Attacks using Natural Language Processing: Automatically mapping organic narrative reports to existing insider threat frameworksInternational Conference on Human-Computer Interaction
2020 Traditionally cyber security has focused on defending against external threats, over the last decade we have seen an increasing awareness of the threat posed by internal actors. Current approaches to reducing this risk have been based upon technical controls, psychologically understanding the insider’s decision-making processes or sociological approaches ensuring constructive workplace behaviour.
The language of biometrics: Analysing public perceptionsJournal of Information Security and Applications
2019 There is an increasing shift in technology towards biometric solutions, but one of the biggest barriers to widespread use is the acceptance by the users. In this paper we investigate the understanding, awareness and acceptance of biometrics by the general public. The primary research method was a survey, which had 282 respondents, designed to gauge public opinion around biometrics.
Deconstructing who you play: Character choice in online gamingEntertainment Computing
2018 The major growth in gaming over the last five to ten years has been through the expansion in online gaming, with the most frequent gamers now playing more games online than with others in person. The increase in cooperative multiplayer online gaming, where players who do not know each other come together in teams to achieve a common goal, leads to interesting social situations.
Reconstructing what you said: Text inference using smartphone motionIEEE Transactions on Mobile Computing
2018 Smartphones and tablets are becoming ubiquitous within our connected lives and as a result these devices are increasingly being used for more and more sensitive applications, such as banking. The security of the information within these sensitive applications is managed through a variety of different processes, all of which minimise the exposure of this sensitive information to other potentially malicious applications.
Keystroke inference using smartphone kinematicsInternational Conference on Human Aspects of Information Security, Privacy, and Trust
2017 The use of smartphones is becoming ubiquitous in modern society, these very personal devices store large amounts of personal information and we use these devices to access everything from our bank to our social networks, we communicate using these devices in both open one-to-many communications and in more closed, private one-to-one communications.