Senior Lecturer, Cranfield University
Duncan is a Senior Lecturer in Cyberspace Operations within the Information Operations Group at Cranfield University and is based at the Defence Academy of the United Kingdom.
He is also a visitor in the Defence and Security Theme at the Alan Turing Institute, the national institute for data science and artificial intelligence where his work is concerned with Digital Identity. He is the PI on an EPSRC funded project entitled `People Powered Algorithms for Desirable Social Outcomes’ that is concerned with the use of Automated Decision making in public policy.
He has previously worked in the Cyber Security Centre at The University of Oxford and the University of Bath, in addition to a period working for the UK Government. His research focuses on the vulnerabilities introduced at the intersection between people and technology.
- Hodges, D. Real world effects of autonomous cyber operations. In Cyber Defence and Security Stream, IET Cyber Security for Industrial Control Systems, February 2019.
- D. Hodges and O. Buckley. Reconstructing what you said: Text inference using smartphone motion. IEEE Transactions on Mobile Computing, 18(4):947–959, April 2019. ISSN 1536-1233. doi:10.1109/TMC.2018.2850313.
- D. Hodges and O. Buckley. Deconstructing who you play: Character choice in online gaming. Entertainment Computing, 27:170 –178, 2018. ISSN 1875-9521. doi:10.1016/j.entcom.2018.06.002.
- M. T. Whitty, J. Doodson, S. Creese, and Hodges, D. A picture tells a thousand words: What facebook and twitter images convey about our personality. Personality and Individual Differences, 133:109 – 114, 2018. ISSN 0191-8869. doi: 10.1016/j.paid.2016.12.050.
- Hodges, D. and O. Buckley. It’s not all about the money: Self-efficacy and motivation in defensive and offensive cyber security professionals. In T. Tryfonas, editor, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, pages 494–506. Springer International Publishing, 2017. ISBN 978-3-319-58460-7. doi: 10.1007/978-3-319-58460-7
- M. Whitty, J. Doodson, S. Creese, and Hodges, D. Individual differences in cyber security behaviours: An examination of who’s sharing passwords. Cyberpsychology, Behavior and Social Networking, 18:3–7, 2015. doi:10.1089/cyber.2014.0179.
- J. Bruce, J. Scholtz, Hodges, D., L. Emanuel, D.S. Fraser, S. Creese, and O.J. Love. Pathways to identity: Using visualization to aid law enforcement in identification tasks. Security Informatics, 3(1):1–13, 2014. doi: 10.1186/s13388-014-0012-6.
- S. Creese, T. Gibson-Robinson, M. Goldsmith, D. Hodges, D. Kim, O. Love, J.R.C. Nurse, B. Pike, and J. Scholtz. Tools for Understanding Identity. In 13th annual IEEE Conference on Technologies for Homeland Security (HST ’13), November 2013.
- Hodges, D. and S. Creese. Breaking the Arc: Risk Control for Big Data. In IEEE BigData 2013, October 2013. doi:10.1109/BigData.2013.6691630.
- Hodges, D. and S. Creese. Building a better intelligence machine: A new approach to capability review and development. In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on, pages 113–115. IEEE, 2013. doi:10.1109/ISI.2013.6578798