{"id":228,"date":"2016-04-02T08:00:48","date_gmt":"2016-04-02T07:00:48","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=228"},"modified":"2017-06-10T09:58:54","modified_gmt":"2017-06-10T08:58:54","slug":"bucsr-co-organises-espre-2016","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=228","title":{"rendered":"BUCSR co-organises ESPRE 2016"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/06\/title12th.png\" rel=\"attachment wp-att-229\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-229\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/06\/title12th-300x65.png\" alt=\"title12th\" width=\"420\" height=\"91\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/06\/title12th-300x65.png 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/06\/title12th-768x166.png 768w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/06\/title12th-1024x221.png 1024w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/06\/title12th.png 1200w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/a><\/p>\n<p>Researchers from BUCSR are co-organising the <a href=\"http:\/\/www.espre2016.org\">3rd International Workshop on Evolving Security &amp; Privacy Requirements Engineering (ESPRE 2016)<\/a>. ESPRE is co-located with the <a href=\"http:\/\/re16.org\">24th IEEE International Requirements Engineering Conference (RE 2016)<\/a>, which is taking place between 12-14 September 2016 in Beijing, China.<\/p>\n<p>Now on its third edition, ESPRE is a multi-disciplinary one-day workshop that brings together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between Requirements Engineering and Security &amp; Privacy, and takes early steps in evolving security and privacy requirements engineering to meet a range of needs of stakeholders ranging from business analysts and security engineers, to technology entrepreneurs and privacy advocates.<\/p>\n<p><a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/sfaily\">Shamal Faily<\/a> is a co-organiser of this workshop, together with <a href=\"https:\/\/www22.in.tum.de\/en\/beckers\/\">Kristian Beckers (Technical University Munich, Germany)<\/a>, <a href=\"http:\/\/www.machinediscovery.com\">Seok-Won Lee (Anjou University, South Korea)<\/a>, and <a href=\"https:\/\/www.cylab.cmu.edu\/education\/faculty\/mead.html\">Nancy Mead (Carnegie Mellon University, USA)<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from BUCSR are co-organising the 3rd International Workshop on Evolving Security &amp; Privacy Requirements Engineering (ESPRE 2016). ESPRE is co-located with the 24th IEEE International Requirements Engineering Conference (RE 2016), which is taking place between 12-14 September 2016 in Beijing, China. Now on its third edition, ESPRE is a multi-disciplinary one-day workshop that brings [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/228"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=228"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/228\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/228\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}