Skip to main content

Research Repository

Advanced Search

Outputs (682)

Lightweight threads for portable software (1993)
Presentation / Conference Contribution
Russell, G. (1993). Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG

No abstract available.

Microwaves in the laboratory. (1988)
Presentation / Conference Contribution
Buchanan, W. J. (1988). Microwaves in the laboratory.

The place for increasing interest and enhancing learning in the area of Microwave/ EM Wave propagation is in the laboratory.

Student perception of on-line lectures with a blended learning environment. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Ludwiniak, R. (2010). Student perception of on-line lectures with a blended learning environment.

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..

Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. (2014)
Presentation / Conference Contribution
Eshaftri, M., Essa, A., Qasem, M., Romdhani, I., & Al-Dubai, A. (2014, June). Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. Paper presented at International Conference on Networking, Distributed Systems and Applications : INDS 2014, Bejaia, Algeria

Wireless sensor networks (WSNs) have recently become an integral part of a wide range of systems such as surveillance, target tracking, security and health management systems. WSNs deploy a large number of sensor nodes that cooperate to... Read More about Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks..

Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. (2014)
Presentation / Conference Contribution
Lawson, A., Attridge, A., & Lapok, P. (2014, September). Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. Paper presented at Eurocall 2014

This project aims to address pronunciation problems of English language learners. Current pronunciation software tools mainly address phonemic difficulties and give little or no analytic feedback. Achievement of near native fluency however involves t... Read More about Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis..

Embedding programming skills to support the student journey in networking, security and digital forensics. (2014)
Presentation / Conference Contribution
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey

The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in academia for staffing research and knowledge exchange projects. Placements offer... Read More about Embedding programming skills to support the student journey in networking, security and digital forensics..

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference Contribution
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach (2015)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 80... Read More about Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach.

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society (2014)
Thesis
van Deursen Hazelhoff Roelfze, N. (2014). HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6921

This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations experience similar risks and could benefit from sharing knowledge in order... Read More about HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society.

Building a new nation: risk, goverance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013

This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..

Who would you trust to identify you in accessing your health record?
Presentation / Conference Contribution
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. Who would you trust to identify you in accessing your health record?

Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper outlines a joint project between Edinburgh Napier University and miiCard [10]... Read More about Who would you trust to identify you in accessing your health record?.

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Preprint / Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Cyber risk and opportunities in the Cloud. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013

This presentation outlines some of the key risks and opportunities in the Cloud.

Public perceptions in health care security. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013

Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Information Age, where almost every part of our lives involves some form of integ... Read More about Public perceptions in health care security..

e-Health in the Cloud (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). e-Health in the Cloud. Presented at Future of e-Health

This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty index.

Conducting Performance Evaluation of an e-Health Platform (2013)
Book Chapter
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2013). Conducting Performance Evaluation of an e-Health Platform. In T. Issa, P. Isaías, & P. Kommers (Eds.), Advances in Business Information Systems and Analytics; Information Systems and Technology for Organizations in a Networked Society (295-315). IGI Global Publishing. https://doi.org/10.4018/978-1-4666-4062-7.ch016

For increased awareness and adoption of e-Health implementations, results from evaluation must be catered towards three primary perspectives: organizational, end-user and technical perspective. This chapter addresses the issue of conducting performan... Read More about Conducting Performance Evaluation of an e-Health Platform.

Norms and standards in modular medical architectures. (2014)
Presentation / Conference Contribution
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., Mival, O., Benyon, D., Buchanan, W. J., & Paulin, A. (2013, October). Norms and standards in modular medical architectures. Presented at 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)

Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules... Read More about Norms and standards in modular medical architectures..