Skip to main content

Research Repository

Advanced Search

All Outputs (142)

Information literacy in Scotland: making it mainstream. (2015)
Journal Article
Crawford, J., Irving, C., & Smith, L. (2015). Information literacy in Scotland: making it mainstream. CILIP Update, 41-43

How the Right Information an online community of practice, is bringing together information professionals and representatives from other professions to promote information literacy as a national policy issue in Scotland.

Could social networking online help NEET young people gain employment? (2015)
Presentation / Conference Contribution
Mowbray, J., Hall, H., & Raeside, R. (2015, June). Could social networking online help NEET young people gain employment?. Paper presented at Information: interactions and impact (i3) 2015

This paper first explores the literature pertaining to social networking in both off-line and online environments, and places it within the context of the study of employment opportunities. Particular focus is given to the prospective use of networki... Read More about Could social networking online help NEET young people gain employment?.

How can information literacy be modelled from a lifelong learning perspective? (2015)
Presentation / Conference Contribution
Irving, C., Hall, H., & Brettle, A. (2015, June). How can information literacy be modelled from a lifelong learning perspective?. Paper presented at Information: interactions and impact (i3) 2015

Traditionally much research into information literacy has focused on one area: it prioritises investigations into the information literacy skills of those in education. Provision for students in higher education (for example, Bruce, Edwards & Lupton,... Read More about How can information literacy be modelled from a lifelong learning perspective?.

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015). An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing: advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3

Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized and managed through diverse service portals. This significantly limits the e... Read More about An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework.

You can’t say politics on the internet? (2015)
Digital Artefact
Ryan, B. (2015). You can’t say politics on the internet?. [http://eprints.whiterose.ac.uk/114803/1/Final-report-A-Manifesto-for-Digital-Messiness.pdf]

I have been interested in how governments use the internet to engage with citizens for a few years now. Of course, I’m very late to this party – e-democracy was ‘invented’ over 20 years ago. I didn’t start from there – I stumbled into researching how... Read More about You can’t say politics on the internet?.

Developing the concept of 'Shared Usability' in Product Design for Older Adults (2015)
Thesis
Shore, L. Developing the concept of 'Shared Usability' in Product Design for Older Adults. (Thesis). Quality & Qualifications Ireland (Institute of Technology, Carlow). Retrieved from http://researchrepository.napier.ac.uk/Output/2758660

Globally the Older Adult population is increasing; people are living longer and in many cases with some form of physical or functional limitation in their own home. As a result, there is a requirement for support from Stakeholders (family members, ne... Read More about Developing the concept of 'Shared Usability' in Product Design for Older Adults.

Using Argumentation Within Sustainable Transport Communication (2015)
Presentation / Conference Contribution
Wells, S., & Pangbourne, K. (2015, June). Using Argumentation Within Sustainable Transport Communication. Paper presented at 1st European Conference on Argumentation: Argumentation and Reasoned Action (ECA15)

See attached file.

Combinatorial Dialogue Games in Strategic Argumentation (2015)
Presentation / Conference Contribution
Wells, S. (2015, June). Combinatorial Dialogue Games in Strategic Argumentation. Paper presented at 1st European Conference on Argumentation: Argumentation and Reasoned Action (ECA15)

This paper introduces combinatorial dialogue, a formal approach to strategising within argumentative dialogue games where the moves played within a dialogue game are interpreted as moves within an edge-addition and/or edge-removal combinatorial game.... Read More about Combinatorial Dialogue Games in Strategic Argumentation.

Student voice and peer support during transition (2015)
Presentation / Conference Contribution
Meharg, D., Tizard, J., & Varey, A. (2015, June). Student voice and peer support during transition. Paper presented at QAA Enhancement Themes, Glasgow

Despite increased investment in transition between further education and higher education during the last 10 years, direct entrants remain less likely to take an active part in class, less likely to feel part of the academic community, and also less... Read More about Student voice and peer support during transition.

Supporting student transitions to placement: developing a new self-identity. (2015)
Presentation / Conference Contribution
Smith, S., & Smith, C. F. (2015). Supporting student transitions to placement: developing a new self-identity. In QAA Enhancement Theme

Employer expectations of graduates, as evidenced by the job descriptions of graduate vacancies, often include relevant work experience; however meeting student demand for placements remains a challenge for universities. In practice there is generally... Read More about Supporting student transitions to placement: developing a new self-identity..

A research agenda for metaheuristic standardization. (2015)
Presentation / Conference Contribution
Hart, E., & Sim, K. (2015, June). A research agenda for metaheuristic standardization. Paper presented at 11th Metaheuristics International Conference

We propose that the development of standardized, explicit, machine-readable descriptions of metaheuris- tics will greatly advance scientific progress in the field. In particular, we advocate a purely functional description of metaheuristics — separat... Read More about A research agenda for metaheuristic standardization..

Discourse, speculation and mltidisciplinarity: designing urban futures. (2015)
Journal Article
Helgason, I., Smyth, M., Rosenbak, S., & Mitrovic, I. (2015). Discourse, speculation and mltidisciplinarity: designing urban futures. Nordic design research conference, 1-10

This paper presents a design case study of a summer school that brought together a multi-disciplinary group of early-career professionals to explore ideas relating to new technologies in an urban context. The organisers of the summer school took an e... Read More about Discourse, speculation and mltidisciplinarity: designing urban futures..

IoT analytics: collect, process, analyze and present massive amounts of operational data - research and innovation challenges. (2015)
Book Chapter
Barnaghi, P., Bauer, M., Biswas, A. R., Botterman, M., Cheng, B., Cirillo, F., Dillinger, M., Graux, H., Hoseinitabatabaie, S. A., Kovacs, E., Longo, S., Nunna, S., Paulin, A., Prasad, R. R. V., Soldatos, J., Thuemmler, C., & Volk, M. (2015). IoT analytics: collect, process, analyze and present massive amounts of operational data - research and innovation challenges. In O. Vermesan, & P. Friess (Eds.), Building the Hyperconnected Society : IoT research and innovation value chains, ecosystems and markets. Volume 43 (1-331). River Publisher

IoT analytics: collect, process, analyze and present massive amounts of operational data - research and innovation challenges.

Teaching penetration and malware analysis in a cloud-based environment. (2015)
Presentation / Conference Contribution
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education

This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network Forensics (BEng (Hons) level and focused on Penetration testing and Malwar... Read More about Teaching penetration and malware analysis in a cloud-based environment..

Heart data analysis, modelling and application in risk assessment (2015)
Thesis
Lo, O. Heart data analysis, modelling and application in risk assessment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/8833

The heart is a fundamental aspect of the human body. Significant work has been undertaken to better understand the characteristics and mechanisms of this organ in past research. Greater understanding of the heart not only provides advances in medicin... Read More about Heart data analysis, modelling and application in risk assessment.

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. (2015)
Presentation / Conference Contribution
Fang, D., Liu, X., & Romdhani, I. (2015, May). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. Presented at Fifth International Conference on Cloud Computing, GRIDs, and Virtualization

As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While many approaches are proposed on the specification and discovery of cloud s... Read More about A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval..

Apple and Starbucks could have avoided being hacked if they'd taken this simple step (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup systems that could have allowed hackers to break into customers' accounts by rep... Read More about Apple and Starbucks could have avoided being hacked if they'd taken this simple step.

Vulnerability analysis. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection

The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive a... Read More about Vulnerability analysis..

An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes (2015)
Journal Article
Ahmad, J., Hwang, S. O., & Ali, A. (2015). An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes. Wireless Personal Communications, 84(2), 901-918. https://doi.org/10.1007/s11277-015-2667-9

During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with co... Read More about An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes.