Skip to main content

Research Repository

Advanced Search

Alistair Lawson's Outputs (56)

Adaptive learning in computing for non-native speakers. (2014)
Presentation / Conference Contribution
Rimbaud, Y., McEwan, T., Lawson, A., & Cairncross, S. (2014, October). Adaptive learning in computing for non-native speakers

A significant proportion of e-Learning resources for engineering and computing education appear to be exclusively in English, requiring many learners to adapt themselves to learning within an English language context. Adaptive learning has a role to... Read More about Adaptive learning in computing for non-native speakers..

Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. (2014)
Presentation / Conference Contribution
Lawson, A., Attridge, A., & Lapok, P. (2014, September). Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. Paper presented at Eurocall 2014

This project aims to address pronunciation problems of English language learners. Current pronunciation software tools mainly address phonemic difficulties and give little or no analytic feedback. Achievement of near native fluency however involves t... Read More about Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis..

Embedding programming skills to support the student journey in networking, security and digital forensics. (2014)
Presentation / Conference Contribution
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey

The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in academia for staffing research and knowledge exchange projects. Placements offer... Read More about Embedding programming skills to support the student journey in networking, security and digital forensics..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., Varga, J., & Anderson, C. (2013, April). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. Presented at CSP 2013: Cyber Security and Privacy

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model. (2013)
Preprint / Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontolog... Read More about Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model..

A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation. (2013)
Preprint / Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the modelling of network firewalls. This is applied into an information sharing poli... Read More about A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation..

Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. (2013)
Presentation / Conference Contribution
Lawson, A., Mikuta, P., & Cruickshank, P. (2013, September). Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. Poster presented at EUROCALL

This research and development is aimed at learners, tutors and course developers of Scottish Gaelic. The method of teaching Gaelic being used initially with the system is Ùlpan. This method has been used for over 50 years to great effect in Israel, w... Read More about Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic..

Investigations of impacts of junction design on emissions: are our junctions sustainable? (2013)
Journal Article
Saleh, W., & Lawson, A. (2013). Investigations of impacts of junction design on emissions: are our junctions sustainable?. World journal of science, technology and sustainable development, 10(2), 143-151. https://doi.org/10.1108/20425941311323145

Purpose - An investigation of the driving behaviour and impacts on emission at two traffic junctions

Design/methodology/approach - A signalised junction and a roundabout in Edinburgh have been selected. An instrumented car has been used and a GPS... Read More about Investigations of impacts of junction design on emissions: are our junctions sustainable?.

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., & Khedim, A. S. (2012, January). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Computational data protection law: trusting each other offline and online (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012, December). Computational data protection law: trusting each other offline and online

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online.

Towards simulation of patient data for evaluation of E-health platform and services. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June). Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting

This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- Health platforms and services in regards to efficiency, reliability, securit... Read More about Towards simulation of patient data for evaluation of E-health platform and services..

Information sharing around child protection. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., Ekonomou, E., Lo, O., & Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector

Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysis and FIltering Risk Engine) architecture, which uses SPoC (Single Point of... Read More about Information sharing around child protection..

The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., & Lawson, A. (2012, January). The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records)

This presentation focuses on: - Using the Cloud to provide geographical flexibility and facilitate information exchange to enable the effective treatment of patients across boundaries. - How the Cloud can improve clinical workflow and provide better... Read More about The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks..

DACAR platform for eHealth services cloud. (2011)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., Lawson, A., & Bell, D. (2011, July). DACAR platform for eHealth services cloud. Presented at 4th International Conference on Cloud Computing

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

Affliate advertising fraud and an investigatory fraud framework. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, June). Affliate advertising fraud and an investigatory fraud framework. Presented at CyberForensics 2011

This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through crime or use identity fraud to claim commission on the sale of goods. It inv... Read More about Affliate advertising fraud and an investigatory fraud framework..

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..