Back to top

Biography

Duncan is a Lecturer in Computer Science and Security in the Department of Computing & Informatics at Bournemouth University, and the Programme Leader for the MSc Cyber Security and Human Factors. Current and previous research has explored how techniques from Requirements Engineering can be used to align with the assessment of security, risk, and human factors, specifically in the context of Systems of Systems, whilst integrating the use of tool-support with CAIRIS, and which now explores inclusive and accessible security by design. Duncan’s work has appeared in leading security and system engineering venues such as Computers & Security and the IEEE SoSE, in addition to ESPRE 2017 and ESPRE 2018. Duncan has also served as a student volunteer at British HCI 2016, RE 2017, RE 2018, and RE 2019, and since 2019 has been part of the organising committee for the ESPRE (Evolving Security & Privacy Requirements Engineering) Workshop held at the annual RE conference.

Research

Previous and current research therefore incorporates a number of research areas of interest. These include but are not limited to: Security, Risk, Human Factors, Privacy, Trust, Cyberpsychology, Interoperability, Usability, Socio-Technical Systems, System of Systems Engineering (SoSE), and Requirements Engineering (RE). Research also considers how using existing state of art tool-support such as CAIRIS can assist with the elicitation and modelling of such systems, aiding security risk assessment of SoS.

Journal Articles

Conferences

  • Ghavanati, S., Ki-Aries, D., Lee, S.W., Salnitri, M., 2025. Welcome to the Twelfth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'25). Proceedings 2025 IEEE 33rd International Requirements Engineering Conference Workshops Rew 2025.
  • Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C., 2024. Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace. Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience Csr 2024, 726-731.
  • Katos, V., Ki-Aries, D., Faily, S., Genchev, A., Bozhilova, M., Stoianov, N., 2022. Cybersecurity User Requirements Analysis: The ECHO Approach. Lecture Notes in Networks and Systems, 344, 405-421.
  • Hibshi, H., Ki-Aries, D., Lee, S.W., Salnitri, M., Ali, R., Atzeni, A., Faily, S., Gandhi, R., Ghanavati, S., Henrikson-Bulmer, J., Kalloniatis, C., Li, T., Matulevicius, R., Mead, N., Ochoa, M., Paci, F., Park, J., Pasic, A., Schmidt, H., Singh, I., Slavin, R., Zannone, N., 2022. Welcome to the Ninth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'22). Proceedings of the IEEE International Conference on Requirements Engineering.
  • Ki-Aries, D., Lee, S.W., Salnitri, M., 2021. Welcome to the Eighth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'21). Proceedings of the IEEE International Conference on Requirements Engineering, 2021-September.
  • Beckers, K., Ki-Aries, D., Lee, S.W., Yu, Y., 2020. Welcome from the ESPRE 2020 Organisers. Proceedings Evolving Security and Privacy Requirements Engineering Workshop Espre 2020.
  • Faily, S., Scandariato, R., Shostack, A., Sion, L., Ki-Aries, D., 2020. Contextualisation of Data Flow Diagrams for Security Analysis. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 12419 LNCS, 186-197.
  • Faily, S., Iacob, C., Ali, R., Ki-Aries, D., 2020. Identifying Implicit Vulnerabilities Through Personas as Goal Models. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 12501 LNCS, 185-202.
  • Faily, S., Ki-Aries, D., 2019. Usable and secure requirements engineering with CAIRIS. Proceedings of the IEEE International Conference on Requirements Engineering, 2019-September, 502-503.
  • Beckers, K., Ki-Aries, D., Lee, S.W., Mead, N., 2019. Preface sixth international workshop on evolving security and privacy requirements engineering (ESPRE'19). Proceedings 2019 IEEE 27th International Requirements Engineering Conference Workshops Rew 2019, 133.
  • Coles, J., Faily, S., Ki-Aries, D., 2018. Tool-supporting Data Protection Impact Assessments with CAIRIS. Proceedings 2018 5th International Workshop on Evolving Security and Privacy Requirements Engineering Espre 2018, 21-27.
  • Ki-Aries, D., Faily, S., Dogan, H., Williams, C., 2018. Assessing system of systems security risk and requirements with oasosis. Proceedings 2018 5th International Workshop on Evolving Security and Privacy Requirements Engineering Espre 2018, 14-20.
  • Ki-Aries, D., 2018. Assessing security risk and requirements for systems of systems. Proceedings 2018 IEEE 26th International Requirements Engineering Conference Re 2018, 454-459.
  • Ki-Aries, D., Faily, S., Dogan, H., Williams, C., 2018. System of systems characterisation assisting security risk assessment. 2018 13th System of Systems Engineering Conference Sose 2018, 485-492.
  • Ki-Aries, D., Dogan, H., Faily, S., Whittington, P., Williams, C., 2017. From requirements to operation: Components for risk assessment in a pervasive system of systems. Proceedings 2017 IEEE 25th International Requirements Engineering Conference Workshops Rew 2017, 83-89.
  • Ki-Aries, D., Faily, S., Dogan, H., Williams, C., 2017. Re-framing 'the AMN': A case study eliciting and modelling a System of Systems using the Afghan Mission Network. Proceedings International Conference on Research Challenges in Information Science, 103-108.
  • Ki-Aries, D., Faily, S., Beckers, K., 2016. Persona-driven information security awareness. Proceedings of the 30th International Bcs Human Computer Interaction Conference Hci 2016, 2016-July.

Theses

PhD Students

  • Sedar Akar. Towards Productive Cyber Resilience and Safety Analysis in Model-Based System Engineering, (In progress)
  • Nigel Davis. Automated Risk-Informed Decision-Making in Electromagnetic Interference, (In progress)

Profile of Teaching PG

  • Cyberpsychology (Current)
  • Cyber Situational Awareness (and Human Factors) - Guest Lecturer
  • Security by Design (Current)
  • Persuasive Technology and Behaviour Change (Current)
  • Programme Leader: MSc Cyber Security and Human Factors (Current)
  • Programme Leader: MSc Cyber Security (Current)

Profile of Teaching UG

  • Cyber Situational Awareness (and Human Factors) - Guest Lecturer
  • Cyber Security Management
  • Data Management
  • Security by Design (Current)
  • Software Systems Modelling
  • Cyberpsychology
  • Human Computer Interaction (HCI) (Current)

Grants

  • Tool-support for embedding safety, security, and human factors analysis into Secure by Design requirements (Dstl, 01 Sep 2024). Completed

External Responsibilities

External Media and Press

The data on this page was last updated at 05:00 on February 17, 2026.