ari.org.uk
Home
Questions
Organisations
Topics
Research fields
About the data
Viewing all questions
Search
Filter results
Filter results
Select a topic
All topics
aerospace engineering
artificial intelligence
computer security
conflict, war and peace
crime
crime, law and justice
cyber crime
cyber warfare
diplomacy
economics
economy, business and finance
espionage and intelligence
gang activity
government
government policy
information technology and computer science
international relations
law enforcement
mathematics
military equipment
military weaponry
national security
organised crime
police
politics
safety of citizens
science and technology
scientific exploration
scientific research
security measures (defence)
society
technology and engineering
Select an organisation
All Organisations
Cabinet Office
Home Office
Ministry of Defence
Select a research field
All fields of research
aerospace engineering
applied computing
applied economics
artificial intelligence
communications engineering
control engineering, mechatronics and robotics
criminology
cybersecurity and privacy
data management and data science
economics
electronics, sensors and digital hardware
engineering
human society
information and computing sciences
machine learning
policy and administration
political science
software engineering
Select a country
England
Wales
Northern Ireland
Scotland
UK-wide
Clear all filters
Sort
Relevance
Newest first
Oldest first
Question A-Z
Question Z-A
Include archived/expired questions
1-14 of 14 results
The rapidly evolving operating environment
Understanding implication of future technology - Our service personnel and systems will be threatened by the availability of a greater number of devices with diverse sensing modalities, weapon systems with longer range, enhanced lethality and an adversary who could deploy them in ways that exploit our vulnerabilities. Our ability to objectively assess threats from technological advances in areas such as cyber, unmanned systems and additive manufacturing, and quantify their consequences is key to our understanding of future risk.
Ministry of Defence, 2018
technology
cybersecurity
unmanned systems
additive manufacturing
See details
Protection of infrastructure, transport, crowded and open places
Detecting threat materials of all kinds without disrupting business, through automation and improved operator effectiveness. For example: combining novel technology with big data analytics; systems approaches; behavioural insights.
Home Office, 2019
security
technology
big data analytics
See details
Protection of infrastructure, transport, crowded and open places
Security in high throughput and heavily populated environments.
Home Office, 2019
security
population
high throughput
See details
The terrorist and serious and organised crime (SOC) landscape
Use of technology by organised criminals, and changes to the threat due to future technologies.
Home Office, 2019
crime
technology
future technologies
See details
Autonomous and unmanned systems (note implications for homeland security as well as public safety)
Risks and effectiveness of counter-UAV measures in civilian airspace.
Home Office, 2019
security
UAVs
airspace
See details
Autonomous and unmanned systems (note implications for homeland security as well as public safety)
Risk posed across sectors by different types of unmanned aerial vehicle (UAV) and other autonomous and unmanned systems, now and in the future.
Home Office, 2019
technology
UAV
autonomous systems
See details
Autonomous and unmanned systems (note implications for homeland security as well as public safety)
Preventing criminal, hostile or mischievous use of autonomous and unmanned systems, or attacks of the systems themselves, especially through “security by design”.
Home Office, 2019
security
autonomous systems
unmanned systems
See details
Adapting to a changing security environment
How to address interactions between safety and security?
Cabinet Office, 2019
security
safety
research
See details
Adapting to a changing security environment
How to model supply chains using real-time data to ensure effective supply chain security management?
Cabinet Office, 2019
supply chain
data
security
See details
Adapting to a changing security environment
Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?
Cabinet Office, 2019
cyber security
automation
technology
ethics
See details
Measuring and responding to security threats faced by the UK
How might we gain evidence-based assurances about the effectiveness of capabilities linked to low-frequency high-impact events through use of experimental methods?
Cabinet Office, 2019
security
experimental methods
low-frequency high-impact events
See details
Measuring and responding to security threats faced by the UK
How do we measure performance / capability development for a risk before it materialises?
Cabinet Office, 2019
security
risk management
performance measurement
See details
Measuring and responding to security threats faced by the UK
How can we define worst case scenarios in a changing world in which international standards are contestable?
Cabinet Office, 2019
security
international standards
worst case scenarios
See details
Measuring and responding to security threats faced by the UK
How might we most effectively measure readiness for high-impact low-probability risks in the assessment of UK resilience?
Cabinet Office, 2019
security
resilience
risk assessment
See details
1