Search
-
What we know now
https://le.ac.uk/richard-iii/identification/what-we-know-now
Analysis of the king’s skeleton not only aided its identification but also provided new insights into Richard III’s diet and lifestyle, and what he might have looked like.
-
Fear of Crime
https://le.ac.uk/modules/2024/cr7160
Module code: CR7160 Our exposure to crime –whether direct or indirect- and coverage from social media, television and newspapers has led to a heightened perception of deviance and fear in contemporary society.
-
Research Communication
https://le.ac.uk/modules/2024/gy3426
Module code: GY3426 The academic publishing landscape has significantly changed with the impact of globalisation, new technologies and the growth of the knowledge economy.
-
Springfest
https://le.ac.uk/springfest
Celebrate the end of the second term of the year with activities, food and competitions on campus at Leicester.
-
Events
https://le.ac.uk/history/research/current-research-grants/mns-disorders-in-guyanas-jails/events
See the latest events held by MNS disorder in Guyanas Jails project team at The University of Leicester.
-
Social Sciences and Humanities Librarians’ Blog: Academic and staff blogs from the University of Lei
https://staffblogs.le.ac.uk/socscilibrarians/page/10/
Academic and staff blogs from the University of Leicester
-
Sarah Casewell
https://le.ac.uk/inspirational-women/sarah-casewell
Sarah is the Co-Chair for The Women’s Forum, which supports the work and careers of women at the University.
-
Diane Levine
https://le.ac.uk/inspirational-women/diane-levine
Diane is at the heart of interdisciplinary research at Leicester.
-
Employability and careers
https://le.ac.uk/natural-sciences/study/employability
Our programme has been designed and recognised for its innovative approach to employability, winning the Embedding Employability element of the UK Collaborative Award for Teaching Excellence in 2017.
-
Foundations of Cybersecurity
https://le.ac.uk/modules/2025/co7099
Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...