Skip to main content

Research Repository

Advanced Search

Ethical Issues in Digital Health. (2015)
Book Chapter
Lim Jumelle, A. K., & Ispas, I. (2015). Ethical Issues in Digital Health. In Requirements Engineering for Digital Health (75-93). Springer. https://doi.org/10.1007/978-3-319-09798-5_4

With advancement in technology and breakthrough in Internet connectivity, digital health technologies have penetrated all aspects of our lives. Hospital information systems (HIS), electronic health records (EHR), ePrescriptions, eReferrals, personal... Read More about Ethical Issues in Digital Health..

Requirements Engineering for Digital Health (2015)
Book
Fricker, S. A., Thuemmler, C., & Gavras, A. (2015). Requirements Engineering for Digital Health. Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-09798-5

Healthcare and well-being have captured the attention of established software companies, start-ups, and investors. Software is starting to play a central role for addressing the problems of the aging society and the escalating cost of healthcare serv... Read More about Requirements Engineering for Digital Health.

Hyperlocal Government Engagement online (2015)
Report
Cruickshank, P., & Ryan, B. (2015). Hyperlocal Government Engagement online. Edinburgh, Scotland: Communities and Culture Network

This report presents a seed research project funded by the CCN+, that investigated digital engagement by three neighbouring Scottish Community Councils (CCs) in a distinct area of a Scottish city. Recent work had shown that CCs generally do not use t... Read More about Hyperlocal Government Engagement online.

When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). When amateurs do the job of a professional, the result is smart grids secured by dumb crypto

Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart grids, which include the smart meters being rolled out to millions of homes... Read More about When amateurs do the job of a professional, the result is smart grids secured by dumb crypto..

US hack shows data is the new frontier in cyber security conflict. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). US hack shows data is the new frontier in cyber security conflict

More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government (although the Chinese deny involvement), this incident shows how data could... Read More about US hack shows data is the new frontier in cyber security conflict..

Roll Project Bin Packing Benchmark Problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Bin Packing Benchmark Problems. [Dataset]. https://doi.org/10.17869/ENU.2015.9364

This document describes two sets of Benchmark Problem Instances for the One Dimensional Bin Packing Problem. The problem instances are supplied as compressed (zipped) SQLITE database files.

The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445

The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.

Roll Project Rich Vehicle Routing benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Rich Vehicle Routing benchmark problems. [Data]. https://doi.org/10.17869/ENU.2015.9367

This document describes a large set of Benchmark Problem Instances for the Rich Vehicle Routing Problem. All files are supplied as a single compressed (zipped) archive containing the instances, in XML format, an Object-Oriented Model supplied in XSD... Read More about Roll Project Rich Vehicle Routing benchmark problems..

Roll Project Job Shop scheduling benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Job Shop scheduling benchmark problems. [Dataset]. https://doi.org/10.17869/ENU.2015.9365

This document describes two sets of benchmark problem instances for the job shop scheduling problem. Each set of instances is supplied as a compressed (zipped) archive containing a single CSV file for each problem instance using the format described... Read More about Roll Project Job Shop scheduling benchmark problems..

The impact of head movements on user involvement in mediated interaction (2015)
Journal Article
Bamoallem, B. S., Wodehouse, A. J., Mair, G. M., & Vasantha, G. A. (2016). The impact of head movements on user involvement in mediated interaction. Computers in Human Behavior, 55(A), 424-431. https://doi.org/10.1016/j.chb.2015.09.016

Communication takes place not only through speech, but also through gestures such as facial expressions, gaze, head movements, hand movements and body posture. Although developing rapidly, current communication platforms do not facilitate the types o... Read More about The impact of head movements on user involvement in mediated interaction.

Evaluation of TFTP DDoS amplification attack (2015)
Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these s... Read More about Evaluation of TFTP DDoS amplification attack.

Service evolution in clouds for dementia patient monitoring system usability enhancement. (2015)
Book Chapter
Wang, Z., & Cheng, G. (2015). Service evolution in clouds for dementia patient monitoring system usability enhancement. In E-Health and Telemedicine : Concepts, Methodologies, Tools, and Applications (1606-1634). IGI Global. https://doi.org/10.4018/978-1-4666-8756-1.ch080

The authors present an analysis which concludes that most e-health system are packaged for large-scale access through cloud-based services shared in a real-time service deployment environment. The service, which has already been deployed in the cloud... Read More about Service evolution in clouds for dementia patient monitoring system usability enhancement..

Architecting the Internet of Things: State of the Art (2015)
Book Chapter
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016). Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3

Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its success relies greatly on a well-defined architecture that will provide sc... Read More about Architecting the Internet of Things: State of the Art.

Ashley Madison breach reveals the rise of the moralist hacker (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Ashley Madison breach reveals the rise of the moralist hacker

There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided for millions of their customer’s details. All sorts of information that isn... Read More about Ashley Madison breach reveals the rise of the moralist hacker.

Design principles for collaborative device ecologies (2015)
Presentation / Conference Contribution
Ammeloot, A., Benyon, D., & Mival, O. (2015). Design principles for collaborative device ecologies. In Proceedings of the 2015 British HCI Conference (255-256). https://doi.org/10.1145/2783446.2783598

This paper describes the ongoing investigation of interaction design issues related to collaborative activities in device ecologies, mixing Bring Your Own Device (BYOD) and smart meeting room technologies.

Could social networking online help NEET young people gain employment? (2015)
Presentation / Conference Contribution
Mowbray, J., Hall, H., & Raeside, R. (2015, June). Could social networking online help NEET young people gain employment?. Paper presented at Information: interactions and impact (i3) 2015

This paper first explores the literature pertaining to social networking in both off-line and online environments, and places it within the context of the study of employment opportunities. Particular focus is given to the prospective use of networki... Read More about Could social networking online help NEET young people gain employment?.

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. (2015)
Presentation / Conference Contribution
Fang, D., Liu, X., & Romdhani, I. (2015, May). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. Presented at Fifth International Conference on Cloud Computing, GRIDs, and Virtualization

As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While many approaches are proposed on the specification and discovery of cloud s... Read More about A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval..

Apple and Starbucks could have avoided being hacked if they'd taken this simple step (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup systems that could have allowed hackers to break into customers' accounts by rep... Read More about Apple and Starbucks could have avoided being hacked if they'd taken this simple step.

Vulnerability analysis. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection

The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive a... Read More about Vulnerability analysis..

Identifying areas of vulnerability. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, April). Identifying areas of vulnerability. Presented at Scot-secure 2015

Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.