Skip to main content

Research Repository

Advanced Search

All Outputs (160)

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory framework

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

Hallelujah! using topical examples to Illustrate ethical and business Issues for engineers. (2010)
Presentation / Conference Contribution
McEwan, T., & Cairncross, S. (2010). Hallelujah! using topical examples to Illustrate ethical and business Issues for engineers. In Proceedings of FIE 2010 (S3E-1). https://doi.org/10.1109/FIE.2010.5673348

Technically-oriented undergraduate students are often reluctant to engage with “Legal, Social, Ethical and Professional Issues”. In particular many learners appear to have an increasingly cavalier attitude to intellectual property in digital media. M... Read More about Hallelujah! using topical examples to Illustrate ethical and business Issues for engineers..

Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925

The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..

Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010, June). Improving data quality in data warehousing applications. Presented at Proceedings of the 12th International Conference on Enterprise Information Systems

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocol

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Towards self-aware PerAda systems. (2010)
Presentation / Conference Contribution
Hart, E., & Paechter, B. (2010, July). Towards self-aware PerAda systems

Pervasive Adaptation (PerAda) refers to massive-scale pervasive information and communication systems which are capable of autonomously adapting to highly dynamic and open technological and user contexts. PerAda systems are thus a special case of col... Read More about Towards self-aware PerAda systems..

Research: why bother? (2010)
Journal Article
Hall, H., & Clapton, J. (2010). Research: why bother?. Public Library Journal, 25(3), 18-21

This article explains why librarianship research is so important for practice, and the value of CILIP's Library and Information Research Group.

Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition (2010)
Presentation / Conference Contribution
Hall, H., & Brazier, C. (2010, August). Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition. Presented at World Library and Information Congress: 76th IFLA General Conference and Assembly

In recent years there has been growing recognition amongst the UK library and information profession of a need for a co-ordinated and strategic approach to Library and Information Science (LIS) research. Therefore in March 2009 the British Library (B... Read More about Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition.

Promoting the priorities of practitioner research engagement. (2010)
Journal Article
Hall, H. (2010). Promoting the priorities of practitioner research engagement. Journal of Librarianship and Information Science, 42(2), 83-88. https://doi.org/10.1177/0961000610363978

One of the aims of the Library and Information Science Research Coalition is to promote library and information science practitioner research. Successfully meeting this aim should result in greater use of the existing knowledge base and the creation... Read More about Promoting the priorities of practitioner research engagement..

A survey of multiple tree visualisation. (2010)
Journal Article
Graham, M., & Kennedy, J. (2010). A survey of multiple tree visualisation. Information Visualization, 9, 235-252. https://doi.org/10.1057/ivs.2009.29

This paper summarises the state-of-the-art in multiple tree visualisations. It discusses the spectrum of current representation techniques used on single trees, pairs of trees and finally multiple trees, in order to identify which representations are... Read More about A survey of multiple tree visualisation..

Design Issues for Peer-to-Peer Massively Multiplayer Online Games. (2010)
Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010). Design Issues for Peer-to-Peer Massively Multiplayer Online Games. International Journal of Advanced Media and Communication, 4, 108-125. https://doi.org/10.1504/IJAMC.2010.032138

Massively Multiplayer Online Games (MMOGs) are increasing in both popularity and scale, and while classical Client/Server (C/S) architectures convey some benefits, they suffer from significant technical and commercial drawbacks. This realisation has... Read More about Design Issues for Peer-to-Peer Massively Multiplayer Online Games..

Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. (2010)
Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010). Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. International Journal of Advanced Media and Communication, 4, 140-153. https://doi.org/10.1504/IJAMC.2010.032140

We present the design, implementation and evaluation of Deadline-Driven Auctions (DDAs), a novel task-mapping infrastructure for heterogeneous distributed environments. DDA is primarily designed for hosting Non-Player Characters (NPCs) in P2P Massive... Read More about Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs..

Daniel Bell's theory of the information society. (2010)
Book Chapter
Duff, A. (2010). Daniel Bell's theory of the information society. In B. Smart (Ed.), Post-Industrial Society (201-232). SAGE Publications

Daniel Bell is recognised to be the foremost writer on the information society. The paper expounds his writings in detail, showing their development from the 1960s to the 1990s. It is argued that his position has always contained three distinguishabl... Read More about Daniel Bell's theory of the information society..

Signing an e-petition as a transition from lurking to participation. (2010)
Book Chapter
Cruickshank, P., Edelmann, N., & Smith, C. F. (2010). Signing an e-petition as a transition from lurking to participation. In J. Chappellet, O. Glassey, M. Janssen, A. Macintosh, J. Scholl, E. Tambouris, & M. Wimmer (Eds.), Electronic Government and Electronic Participation (275-282). Trauner

As one form of online political participation, the e-petitioning is seen as a response to a perceived decline in public trust of political institutions and the associated symptoms of political disengagement. This paper uses the psychological concept... Read More about Signing an e-petition as a transition from lurking to participation..