Skip to main content

Research Repository

Advanced Search

All Outputs (214)

Ashley Madison breach reveals the rise of the moralist hacker (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Ashley Madison breach reveals the rise of the moralist hacker

There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided for millions of their customer’s details. All sorts of information that isn... Read More about Ashley Madison breach reveals the rise of the moralist hacker.

Echoes of eugenics in Osborne’s budget (2015)
Newspaper / Magazine
Cimini, N. (2015). Echoes of eugenics in Osborne’s budget

Eugenics is alive and well – in the Tory budget. Nicholas Cimini explains why.

Act now or miss your gender targets. (2015)
Newspaper / Magazine
Dutton, M. (2015). Act now or miss your gender targets. [The Scotsman]

VOLUNTARY approach is not enough if Nicola Sturgeon’s ambition of boardroom 50:50 by 2020 is to be realised, says Dr Matthew Dutton.

UK corporation taxation arrangements, part one: changes ahead? (2015)
Newspaper / Magazine
Steven, G. (2015). UK corporation taxation arrangements, part one: changes ahead?

If Scotland gained control of corporation tax, tax residence would become a big issue for many companies on both sides of the border. In a two-part series, Grahame Steven, Lecturer and Teaching Fellow at Edinburgh Napier University, explains the poss... Read More about UK corporation taxation arrangements, part one: changes ahead?.

Apple and Starbucks could have avoided being hacked if they'd taken this simple step (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup systems that could have allowed hackers to break into customers' accounts by rep... Read More about Apple and Starbucks could have avoided being hacked if they'd taken this simple step.

Grand Challenges and O.R. (2015)
Newspaper / Magazine
Weaver, M., & Parkin, J. (2015). Grand Challenges and O.R. Inside O.R

No abstract available.

Lenovo’s security debacle reveals blurred boundary between adware and malware (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malware

A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors have treated this as an alternative income str... Read More about Lenovo’s security debacle reveals blurred boundary between adware and malware.