Skip to main content

Research Repository

Advanced Search

Outputs (56)

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..

Intelligence information sharing between the police and their community partners. (2011)
Presentation / Conference Contribution
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June). Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime

This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ensure a balanced approach to operational management and organisational develo... Read More about Intelligence information sharing between the police and their community partners..

Interagency data exchange protocols as computational data protection law. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law.

The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design... Read More about Interagency data exchange protocols as computational data protection law..

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010). Novel information sharing syntax for data sharing between police and community partners, using role-based security.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010). Novel information sharing architecture between the Police and their community partners.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..

Radio frequency identification (RFID) in pervasive healthcare (2009)
Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. https://doi.org/10.1504/ijhtm.2009.02373

Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive environments within healthcare facilities. They should not be understood a... Read More about Radio frequency identification (RFID) in pervasive healthcare.

Requirements for getting a robot to grow-up (2003)
Presentation / Conference Contribution
Ross, P., Hart, E., Lawson, A., Webb, A., Prem, E., Poelz, P., & Morgavi, G. (2003). Requirements for getting a robot to grow-up. In W. Banzhaf, T. Christaller, P. Dittrich, J. T. Kim, & J. Ziegler (Eds.), Advances in Artificial Life 7th European Conferen

Much of current robot research is about learning tasks in which the task to be achieved is pre-specified, a suitable technology for the task is chosen and the learning process is then experimentally investigated. In this paper we discuss a different... Read More about Requirements for getting a robot to grow-up.

A role for immunology in 'next generation' robots. (2003)
Presentation / Conference Contribution
Hart, E., Ross, P., Webb, A., & Lawson, A. (2003). A role for immunology in 'next generation' robots. In J. Timmis, P. Bentley, & E. Hart (Eds.), Artificial Immune Systems. ICARIS 2003 (46-56). https://doi.org/10.1007/978-3-540-45192-1_5

Much of current robot research is about learning tasks in which the task to be achieved is pre-specified, a suitable technology for the task is chosen and the learning process is experimentally investigated. A more interesting research question is ho... Read More about A role for immunology in 'next generation' robots..