Benjamin Weaver
Benjamin Weaver
Ph.D. candidate and lecturer at Lund University, LUSAX Security InformaticsBenjamin Weaver graduated with a M.Sc. in Business Administration from Lund University in 1996. Prior to his return to academia, Benjamin spent five years in Brussels, providing research and customised consulting services for the pan-European venture capital and private equity industry, as well as working closely with the European Commission on a number of projects. From 1996 to 2000 he held a position as market analyst and project manager with a telecommunications market research and consulting company based in Copenhagen. While in this position, Benjamin closely followed the newly deregulated Nordic telecom market, providing research and advice for major telecom operators, suppliers and policy makers. Since 2006, Benjamin has been part of the LUSAX project, a collaboration between the security industry and the Institute of Economic Research, Lund University. The purpose of the Lusax project has been to investigate the effects and dynamics resulting from the paradigmatic change from analogue and mechanical to digital and network-enabled technology platforms within the industry. In addition to his work in the LUSAX project, Benjamin has led or participated in several consulting research projects related to both the security industry as well ICT-related projects with clients such as Ericsson. Benjamin is also part of the newly formed Standardisation Research Centre, where he will contribute with a project focused on the development of standards within the security industry.
News mentions
Since 2006, the LUSAX research program at Lund University in Sweden has investigated the effects of digitisation on the physical security industry. This article will look into the...
Key people from LUSAX Security Informatics
Security experts
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
