Skip to main content

Research Repository

Advanced Search

All Outputs (402)

Customer journey mapping (2011)
Report
Cruickshank, P. (2011). Customer journey mapping

Public services need to adapt to the needs of their customers, the citizens. Often new e-services are technology-initiated, but Smart Cities start with the user. This document places the customer journey mapping (CJM) process in the context of custom... Read More about Customer journey mapping.

Freedom to learn: a radically revised pedagogy to facilitate lifewide learning in the academic curriculum. (2011)
Book Chapter
Cowan, J. (2011). Freedom to learn: a radically revised pedagogy to facilitate lifewide learning in the academic curriculum. In N. J. Jackson (Ed.), Learning for a Complex World (122-136). Authorhouse™

Higher education has progressed fairly steadily to a common pedagogical approach which centres on the idea of alignment. In this arrangement, intended learning outcomes are identified and declared; learning activities which will enable the desired le... Read More about Freedom to learn: a radically revised pedagogy to facilitate lifewide learning in the academic curriculum..

You are where you have been: the privacy implications of location and tracking technologies (2011)
Journal Article
Clarke, R., & Wigan, M. (2011). You are where you have been: the privacy implications of location and tracking technologies. Journal of Location Based Services, 5, 138-155. https://doi.org/10.1080/17489725.2011.637969

A decade ago, technologies that could provide information about the location of a motor vehicle, or a computer, or a person, were in their infancy. A wide range of tools are now in use and in prospect, which threaten to strip away another layer of th... Read More about You are where you have been: the privacy implications of location and tracking technologies.

Helping Eastern students to master Western critical thinking (2011)
Journal Article
Chiu, Y. J., & Cowan, J. (2011). Helping Eastern students to master Western critical thinking. Asia Pacific education review, 6, 103-111. https://doi.org/10.1007/s12564-011-9189-2

It is possible that some of the problems that confront Eastern learners when they are asked to engage in critical thinking come from the misleading association of the title with criticising negatively and even with disagreeing. In some other educa... Read More about Helping Eastern students to master Western critical thinking.

Performance of the distributed CPA protocol and architecture on traditional networks. (2011)
Presentation / Conference Contribution
Chalmers, K. (2011). Performance of the distributed CPA protocol and architecture on traditional networks. In P. Welch, A. T. Sampson, J. B. Pedersen, J. Kerridge, J. F. Broenink, & J. Barnes (Eds.), Communicating Process Architectures 2011 (227-242). htt

Performance of communication mechanisms is very important in distributed systems frameworks, especially when the aim is to provide a particular type of behavior across a network. In this paper, performance measurements of the distributed Communicatin... Read More about Performance of the distributed CPA protocol and architecture on traditional networks..

Enhancing the effectiveness of travel awareness campaigns via the inclusion of theoretical-based content. (2011)
Presentation / Conference Contribution
Carreno, M., Gauce, K., & Welsch, J. (2011). Enhancing the effectiveness of travel awareness campaigns via the inclusion of theoretical-based content. In D. Cygas, & K. Froehner (Eds.), The 8th International Conference on Environmental Engineering (8th IC

Travel awareness campaigns are one of the most commonly used ‘mobility management interventions’, which aim to change individuals’ travel choices and behaviour to more sustainable transport modes. However, despite the widespread uptake of this measur... Read More about Enhancing the effectiveness of travel awareness campaigns via the inclusion of theoretical-based content..

Evaluation of the accuracy of mathematical models through use of multiple metrics. (2011)
Journal Article
Caliskan, N., Jadraque, E., Tham, Y. W., & Muneer, T. (2011). Evaluation of the accuracy of mathematical models through use of multiple metrics. Sustainable Cities and Society SCC, 1, 63-66. https://doi.org/10.1016/j.scs.2011.02.001

Engineering practise heavily relies on the development and use of mathematical models. In this article a number of appropriate metrics have been selected to provide an insight in the validation of models and also to obtain a figure of merit for any g... Read More about Evaluation of the accuracy of mathematical models through use of multiple metrics..

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011)
Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011). Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,

This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first case study involves assessing student perception on the usage of VMware Works... Read More about Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs..

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

Security and forensic computing: introduction to computer security. (2011)
Digital Artefact
Buchanan, W. J. (2011). Security and forensic computing: introduction to computer security

1 INTRODUCTION 14 1.1 The Industrial and the Information Age 14 1.2 CIA and AAA 15 1.3 Protecting against intruders 16 1.4 Users, systems and data 17 1.5 Security and Forensic Computing 19 1.6 ISO 27002 21 1.7 Risks 22 Annual Loss Expectancy... Read More about Security and forensic computing: introduction to computer security..

How academic IT departments manage changing IT environments (2011)
Journal Article
Buchanan, W. J. (2011). How academic IT departments manage changing IT environments. VitAL Magazine, 5, 26-32

Matching what industry wants with what applicants want is a major problem for any IT academic department is matching what the jobs market requires to the types of courses which appeal to applicants. At the current time there is massive demand in the... Read More about How academic IT departments manage changing IT environments.

Evidence to the Justice Committee at the Scottish Parliament. (2011)
Other
Buchanan, W. J. (2011). Evidence to the Justice Committee at the Scottish Parliament

On 20 September 2011, Bill gave evidence at Offensive Behaviour at Football and Threatening Communications Bill: http://news.bbc.co.uk/democracylive/hi/scotland/newsid_9594000/9594710.stm?t=1376s