{"id":324,"date":"2017-05-17T08:10:18","date_gmt":"2017-05-17T07:10:18","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=324"},"modified":"2017-06-10T09:54:35","modified_gmt":"2017-06-10T08:54:35","slug":"bucsr-co-organises-espre-2017","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=324","title":{"rendered":"BUCSR co-organises ESPRE 2017"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/05\/espreHeader.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-326 size-large\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/05\/espreHeader-1024x234.jpg\" alt=\"\" width=\"640\" height=\"146\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/05\/espreHeader-1024x234.jpg 1024w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/05\/espreHeader-300x69.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/05\/espreHeader-768x176.jpg 768w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/05\/espreHeader.jpg 1167w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Researchers from BUCSR are co-organising the <a href=\"http:\/\/espre2017.org\">4th\u00a0International Workshop on Evolving Security &amp; Privacy Requirements Engineering (ESPRE 2017)<\/a>. ESPRE is co-located with the<a href=\"http:\/\/re2017.org\"> 25th IEEE International Requirements Engineering Conference (RE 2017)<\/a>, which is taking place between 4-8\u00a0September 2017 in Lisbon, Portugal.<\/p>\n<p>Now on its fourth\u00a0edition, ESPRE is a multi-disciplinary one-day workshop that brings together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between Requirements Engineering and Security &amp; Privacy, and takes early steps in evolving security and privacy requirements engineering to meet a range of needs of stakeholders ranging from business analysts and security engineers, to technology entrepreneurs and privacy advocates.<\/p>\n<p><a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/sfaily\">Shamal Faily<\/a> is a co-organiser of this workshop, together with Kristian Beckers (<a href=\"http:\/\/social-engineering.academy\">Social Engineering Academy<\/a>), <a href=\"http:\/\/www.machinediscovery.com\/\">Seok-Won Lee (Anjou University, South Korea)<\/a>, and <a href=\"https:\/\/www.cylab.cmu.edu\/education\/faculty\/mead.html\">Nancy Mead (Carnegie Mellon University, USA)<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from BUCSR are co-organising the 4th\u00a0International Workshop on Evolving Security &amp; Privacy Requirements Engineering (ESPRE 2017). ESPRE is co-located with the 25th IEEE International Requirements Engineering Conference (RE 2017), which is taking place between 4-8\u00a0September 2017 in Lisbon, Portugal. Now on its fourth\u00a0edition, ESPRE is a multi-disciplinary one-day workshop that brings together practitioners and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/324"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=324"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/324\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/324\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}