Skip to main content

Research Repository

Advanced Search

Outputs (38)

Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments. (2016)
Presentation / Conference Contribution
Ryan, F., Cruickshank, P., Hall, H., & Lawson, A. (2016). Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments. In IDIMC 2016: Exploring our digital shadow - fro

The main theme of the paper is the development of a framework to investigate how online information is used in the creation, building, and evaluation of personal reputations. (Here the term “personal reputation” refers to the reputation of private in... Read More about Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments..

Assessing the available and accessible evidence: how personal reputations are determined and managed online. (2015)
Presentation / Conference Contribution
Ryan, F., Cruickshank, P., Hall, H., & Lawson, A. (2015, June). Assessing the available and accessible evidence: how personal reputations are determined and managed online. Paper presented at Information: interactions and impact (i3) 2015

This paper is concerned with how online information contributes to the determination of personal reputations. The term “personal reputation” in this context means the reputation of private individuals, rather than corporate identity and brand. The pa... Read More about Assessing the available and accessible evidence: how personal reputations are determined and managed online..

Adaptive learning in computing for non-native speakers. (2014)
Presentation / Conference Contribution
Rimbaud, Y., McEwan, T., Lawson, A., & Cairncross, S. (2014). Adaptive learning in computing for non-native speakers. In 2014 IEEE Frontiers in Education Conference Proceedings (1-4). https://doi.org/10.1109/FIE.2014.7044142

A significant proportion of e-Learning resources for engineering and computing education appear to be exclusively in English, requiring many learners to adapt themselves to learning within an English language context. Adaptive learning has a role to... Read More about Adaptive learning in computing for non-native speakers..

Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. (2014)
Presentation / Conference Contribution
Lawson, A., Attridge, A., & Lapok, P. (2014, September). Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. Paper presented at Eurocall 2014

This project aims to address pronunciation problems of English language learners. Current pronunciation software tools mainly address phonemic difficulties and give little or no analytic feedback. Achievement of near native fluency however involves t... Read More about Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis..

Embedding programming skills to support the student journey in networking, security and digital forensics. (2014)
Presentation / Conference Contribution
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Jou

The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in academia for staffing research and knowledge exchange projects. Placements offer... Read More about Embedding programming skills to support the student journey in networking, security and digital forensics..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. (2013)
Presentation / Conference Contribution
Lawson, A., Mikuta, P., & Cruickshank, P. (2013, September). Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. Poster presented at EUROCALL

This research and development is aimed at learners, tutors and course developers of Scottish Gaelic. The method of teaching Gaelic being used initially with the system is Ùlpan. This method has been used for over 50 years to great effect in Israel, w... Read More about Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Computational data protection law: trusting each other offline and online. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012 (31-40). https://doi.org/

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online..