Harjinder Singh Lallie

Harjinder Singh Lallie
  • Professor (Associate) at University of Warwick

About

40
Publications
36,801
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,377
Citations
Current institution
University of Warwick
Current position
  • Professor (Associate)
Additional affiliations
September 1997 - July 2011
University of Derby
Position
  • Professor (Associate)
August 2011 - present
University of Warwick
Position
  • Principal Teaching Fellow

Publications

Publications (40)
Article
Full-text available
This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile banking applications (m-banking apps) adoption. It also highlights the significant role of demographic f...
Article
Full-text available
Video deepfake detection has emerged as a critical field within the broader domain of digital technologies driven by the rapid proliferation of AI-generated media and the increasing threat of its misuse for deception and misinformation. The integration of Convolutional Neural Network (CNN) with Long Short-Term Memory (LSTM) has proven to be a promi...
Article
Full-text available
Blockchain technology has gained significant attention in recent years for its potential to revolutionize various sectors, including finance, supply chain management, and digital forensics. While blockchain’s decentralization enhances security, it complicates the identification and tracking of illegal activities, making it challenging to link block...
Article
Full-text available
As technology advances and cyber threats become increasingly sophisticated, the task of recognising and understanding malicious activities becomes more complex. This persistent issue is widely acknowledged and extensively documented within the cybersecurity community. Attack modelling techniques (AMTs), such as attack graphs, have emerged as valuab...
Preprint
Full-text available
Despite the rapid rise in social engineering attacks, not all employees are as compliant with information security policies (ISPs) to the extent that organisations expect them to be. ISP non-compliance is caused by a variety of psychological motivation. This study investigates the effect of psychological contract breach (PCB) of employees on ISP co...
Article
Full-text available
Despite the rapid rise in social engineering attacks, not all employees are as compliant with information security policies (ISPs) to the extent that organisations expect them to be. ISP non-compliance is caused by a variety of psychological motivation. This study investigates the effect of psychological contract breach (PCB) of employees on ISP co...
Article
Full-text available
Cyber security has become an issue of national concern in the UK, USA and many other countries worldwide. Universities have reacted to this by launching numerous cyber security degree programmes. In this paper we explore the structure of these degrees and in particular highlight the challenges faced by academics teaching on them. We explore the iss...
Preprint
Full-text available
Mobile banking applications have gained popularity and have significantly revolutionised the banking industry. Despite the convenience offered by M-Banking Apps, users are often distrustful of the security of the applications due to an increasing trend of cyber security compromises, cyber-attacks, and data breaches. Considering the upsurge in cyber...
Article
The convenience and accessibility of mobile banking applications has resulted in this becoming the preferred method of banking in the UK. Although popular amongst a younger generation, uptake is significantly lower among the older generation of those aged 55+, with some attributing this to cyber security and privacy concerns. This study proposes a...
Article
The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique c...
Preprint
Full-text available
The COVID-19 pandemic was a remarkable unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cy...
Article
Dashboard cameras (“dashcams”) are becoming an important in-car accessory used to record audio and visual footage of car journeys. The audio/video footage produced by dashcams have become important items of evidence. This paper explores the problems related to the management and processing of dashcam evidence, and in particular, highlights challeng...
Article
Perceiving and understanding cyber-attacks can be a difficult task, and more effective techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) - such as attack graphs, attack trees and fault trees, are a popular method of mathematically and visually representing the sequence of events that lead to a successful cyber...
Article
Full-text available
Attack graphs and attack trees are a popular method of mathematically and visually representing the sequence of events that lead to a successful cyber-attack. Despite their popularity, there is no standardised attack graph or attack tree visual syntax configuration,and more than seventy self-nominated attack graph and twenty attack tree configurati...
Article
Full-text available
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely recognised and well documented, and more effective techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) –such as attack graphs and fault trees, are useful visual aids that can aid cyber-attack perception; however, there is...
Article
The harmonium has become the standard instrument in all Sikh musical worship (kirtan) performances and it seems inseparable from the Sikh musical experience. In the mid-nineteenth century, however, the kirtan experience was considerably different. Until the early twentieth century, kirtanis performed kirtan on stringed instruments and adhered to a...
Article
Full-text available
Campus discovery is an important feature of a university student induction process. Approaches towards campus discovery differ from course to course and can comprise guided tours that are often lengthy and uninspiring, or self-guided tours that run the risk of students failing to complete them. This paper describes a campus self-discovery induction...
Article
Full-text available
Campus discovery is an important feature of a university student induction process. Approaches towards campus discovery differ from course to course and can comprise guided tours that are often lengthy and uninspiring, or self-guided tours that run the risk of students failing to complete them. This paper describes a campus self-discovery induction...
Article
Full-text available
Social Media Site (SMS) usage has grown rapidly in the last few years. This sudden increase in SMS usage creates an opportunity for data leakage which could compromise personal and/or professional life. In this work, we have reviewed traditional penetration testing process and discussed the failures of traditional penetration testing process to tes...
Article
Full-text available
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercri...
Article
Full-text available
A number of recent incidents, such as the Stanley Cup Riots, the uprisings in the Middle East and the London riots have demonstrated the value of crowd sourced audio-visual evidence wherein citizens submit audio-visual footage captured on mobile phones and other devices to aid governmental institutions, responder agencies and law enforcement author...
Article
Digital storage systems (DSS) contain an abundance of geospatial data which can be extracted and analysed to provide useful and complex intelligence insights. This data takes a number of forms such as data within text files, configuration databases and in operating system generated files-each of which require particular forms of processing. This pa...
Article
Full-text available
The automobile industry has grown to become an integral part of our day – to – day life. The introduction of wireless vehicles definitely have to pass through the analysis of potential security threats and vulnerabilities, and robust security architecture should be designed that are able to cope with these threats and vulnerabilities. In this work,...
Article
This paper presents a new adaptive data hiding method in colour images using complement value (CV) of higher order three bits (b7, b6 and b5) of each colour image byte to achieve large embedding capacity and imperceptible stego-images. The technique exploits the complement value (CV) of each colour image byte to estimate the number of bits to be em...
Conference Paper
Full-text available
With increasingly more businesses engaging in offshore outsourcing, organisations need to be made aware of the global differences in network security, before entrusting a nation with sensitive information. In July 2011, Syn and Nackrst1 explored this topic by analysing seven countries from a wide spectrum across the globe for network security vulne...
Article
Recent studies in Sikh musicology have focused on its history and theory. However, there is an absence of theoretical research which focuses on the role of emotions in Sikh music. In this paper, we contribute to this research by investigating key issues relating to emotions in Sikh musicology. We explore theories which propose that a rāga will evok...
Conference Paper
Full-text available
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining signature and anomaly based IDSs should be examined. This paper contrasts signature and anomaly-ba...
Article
The Mumbai terror attacks of 2008 demonstrated that India needs to become more prepared to respond to digital intelligence and also to more effectively conduct post-incident investigations. This paper explores the digital forensic investigation infrastructure of India and in particular explores the judicial statutes, police/law enforcement structur...
Conference Paper
Full-text available
The worldwide economic recession resulted in changes in UK government HE policy. This has in turn forced HE institutions to focus more than ever on the employability of students often through increased industrial engagement. Whilst the impact of governmental HE policy may have an adverse effect on certain HE domains, Information Security and Digita...
Article
Full-text available
The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist c...
Article
Full-text available
The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar gui...
Article
Full-text available
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of usi...
Article
Full-text available
This paper proposes a hash-based secure interface between two nodes on the Internet, especial between two interfaces or two web pages. Digital signatures and public-private keys are traditionally used to provide integrity and authentication. This paper proposes an alternative method which uses a shared private key and a public hash function for a m...
Article
Internet file sharing via the use of peer-to-peer networks is an activity that has been growing steadily for several years. It has rapidly become the most widespread method for the exchange of digital material and as a result raises much controversy. The current, most popular protocol in this field is BitTorrent. Although it is relatively simple in...
Article
The experiences of students studying Computer Forensics at the University of Derby, together with the views of the teaching and technical support staff, strongly suggests a growing mismatch between expectations and reality, an underdeveloped ability to problem solve and communicate findings and unrealistic expectations of the job market. In improvi...
Article
Computer-generated three-dimensional (3D) animation is an ideal media to accurately visualize crime or accident scenes to the viewers and in the courtrooms. Based upon factual data, forensic animations can reproduce the scene and demonstrate the activity at various points in time. The use of computer animation techniques to reconstruct crime scenes...

Questions

Questions (5)
Question
I want to know what the precise formula is that SPSS uses to calculate part worths in a conjoint analysis. Assume that I have three attributes (a, b, c), each attribute has three levels (1, 2, 3). participants will score 9 configurations out of 10. The 9 configurations are generated by SPSS' orthogonal design feature.
SPSS gives me the part worth scores - which is wonderful. However, I want to know exactly how it calculates this. Does anybody have an idea?
Question
I am using SPSS to develop an Orthogonal Design. The design is a 4x3x3x3x3 (324 factors). The following sample syntax automatically generates 16 cards (I don't have to tell it to generate that many).
My question is whether SPSS has 'automatically calculated' the number of cases I should be using for my design, or whether I should influence the number of cards generated. In other words, do I *need to* increase this, or can I rely on the 'judgement' by SPSS to use 16 cases.
Here is my plan:
ORTHOPLAN
/FACTORS=Fruit 'Attribute1' (1 'apple' 2 'Orange' 3 'Pear ' 4 'Raspberry') Chocolate 'Attribute2' (1 'snickers' 2 'wispa' 3 'twix') Pizza 'Attribute3' (1 'Margherita' 2 'plain' 3 'vegetable') drink 'attribute4' (1 'coke' 2 'pepsi' 3 'water') price 'attribute5' (1 'cheap' 2 'not cheap' 3 'expensive')
/OUTFILE='a:\plan.sav'
/MIXHOLD YES.
p.s. I understand that I should add some 'holdout cases' (I will do that in my final study).
Question
How can I add a new plan to a previously created SPSS Conjoint plan? It has 'auto generated' 36, however I need 42. Can I manually add to the SPV file?
Question
Is there any research which has performed a critical/objective comparison of the cognitive impact/effect of visual information charting methods such as flow charts, status charts, Petrinets etc? It appears that we have assumed that 'flow charts are the best way to express 'xyz'....' and that 'Petrinets are good at representing 'abc'...' Has anybody compared methods? 
Any comments/pointers very welcome :-)
Question
Ipeirotis published "Demographics of mechanical turk " in 2010.
I think some of the data from there was quoted in Paolacci et al's "Running experiments on amazon mechanical turk. Judgment and Decision making"(2010)
The demographics of MechTurk is important for any researcher. Does anybody know of any more recent research on this topic?

Network

Cited By