Skip to main content

Research Repository

Advanced Search

Outputs (3322)

The Use of Imagery in the Campaign Speeches of Barack Hussein Obama and John McCain during the 2008 US Presidential Election. (2016)
Journal Article
McGuire, D., Garavan, T. N., Cunningham, J., & Duffy, G. (2016). The Use of Imagery in the Campaign Speeches of Barack Hussein Obama and John McCain during the 2008 US Presidential Election. Leadership and Organization Development Journal, 37(4), 430-449. https://doi.org/10.1108/LODJ-07-2014-0136

Purpose – The use of imagery in leadership speeches is becoming increasingly important in shaping the beliefs and actions of followers. The purpose of this paper is to investigate the use of speech imagery and linguistic features employed during the... Read More about The Use of Imagery in the Campaign Speeches of Barack Hussein Obama and John McCain during the 2008 US Presidential Election..

Bankers’ stock options, risk-taking and the financial crisis (2016)
Journal Article
Minhat, M., & Abdullah, M. (2016). Bankers’ stock options, risk-taking and the financial crisis. Journal of Financial Stability, 22, 121-128. https://doi.org/10.1016/j.jfs.2016.01.008

This study investigates the relationship between the use of stock options and bank risk in the context of the 2007-2008 financial crisis for banks that are authorised to accept deposits in the United Kingdom. These banks are affected by the European... Read More about Bankers’ stock options, risk-taking and the financial crisis.

Islamic Finance (2016)
Book Chapter
Minhat, M., & Dzolkarnaini, N. (2016). Islamic Finance. In M. C. Ehrhardt, E. Brigham, & R. Fox (Eds.), Financial Management: Theory and PracticeCengage

No abstract available.

Social networking sites and employment status: an investigation based on Understanding Society data (2016)
Presentation / Conference Contribution
Mowbray, J., Raeside, R., Hall, H., & Robertson, P. (2016). Social networking sites and employment status: an investigation based on Understanding Society data. In IDIMC 2016: Exploring our digital shadow - from data to intelligence (75-85)

An analysis is made of secondary data derived from Understanding Society: The UK household longitudinal study (2012) as related to the use of social networking sites (SNSs) amongst 16-21 year olds. This explores the relationship between employment st... Read More about Social networking sites and employment status: an investigation based on Understanding Society data.

Vocabulary learning with the Moodle glossary tool: a case study (2015)
Journal Article
Ratz, S. (2016). Vocabulary learning with the Moodle glossary tool: a case study. Journal of Perspectives in Applied Academic Practice, 4(1), 44-51. https://doi.org/10.14297/jpaap.v4i1.170

Vocabulary learning is a vital part of mastering a language and experience has shown that students often neglect to routinely work on this aspect leading to problems with listening, speaking, reading, and writing skills. This case study describes an... Read More about Vocabulary learning with the Moodle glossary tool: a case study.

Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments. (2016)
Presentation / Conference Contribution
Ryan, F., Cruickshank, P., Hall, H., & Lawson, A. (2016, January). Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments. Presented at IDIMC 2016 - Exploring our digital shadow: from data to intelligence

The main theme of the paper is the development of a framework to investigate how online information is used in the creation, building, and evaluation of personal reputations. (Here the term “personal reputation” refers to the reputation of private in... Read More about Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments..

Postfeminism Meets the Women in Prison Genre: Privilege and Spectatorship in Orange Is the New Black (2016)
Journal Article
Schwan, A. (2016). Postfeminism Meets the Women in Prison Genre: Privilege and Spectatorship in Orange Is the New Black. Television and New Media, 17(6), 473-490. https://doi.org/10.1177/1527476416647497

This article argues that Netflix’s original series Orange is the New Black (2013-), based on Piper Kerman’s memoir (2010), uses postfeminist strategies to covertly promote prison reform and exercise a subtle critique of (female) mass incarceration wh... Read More about Postfeminism Meets the Women in Prison Genre: Privilege and Spectatorship in Orange Is the New Black.

In search of inhospitable knowledge. (2016)
Journal Article
Skokic, V., Lynch, P., & Morrison, A. (2016). In search of inhospitable knowledge. Hospitality and Society, 6(1), 31-54. https://doi.org/10.1386/hosp.6.1.31_1

The aim of this article is to discuss the key issues which have had significant influence on a PhD research student journey from positivism to interpretivism and the subsequent impact on the research methodology adopted. This journey is illustrated t... Read More about In search of inhospitable knowledge..

An exploration of professional identity in the information technology sector (2016)
Thesis
Smith, S. (2016). An exploration of professional identity in the information technology sector. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/9731

At present the Information Technology profession appears to be dogged by high profile project failure, high graduate unemployment rates, employers unable to recruit suitable staff and a professional body under attack. It is not even clear that IT can... Read More about An exploration of professional identity in the information technology sector.

Ford and the First World War (2015)
Book Chapter
Frayn, A. (2015). Ford and the First World War. In A. Chantler, & R. Hawkes (Eds.), An Introduction to Ford Madox Ford (121-133). Ashgate Publishing

No abstract available.

Visualizing Sets with Linear Diagrams. (2015)
Journal Article
Rodgers, P., Stapleton, G., & Chapman, P. (2015). Visualizing Sets with Linear Diagrams. ACM transactions on computer-human interaction, 22(6), 1-39. https://doi.org/10.1145/2810012

This paper presents the first design principles that optimize the visualization of sets using linear diagrams. These principles are justified through empirical studies that evaluate the impact of graphical features on task performance. Linear diagr... Read More about Visualizing Sets with Linear Diagrams..

Law, “Tradition” and Legitimacy: Contesting Driglam Namzha (2017)
Book Chapter
Whitecross, R. W. (2017). Law, “Tradition” and Legitimacy: Contesting Driglam Namzha. In J. D. Schmidt (Ed.), Development Challenges in Bhutan: Perspectives on Inequality and Gross National Happiness (115-134). Springer. https://doi.org/10.1007/978-3-319-47925-5_7

During the 1990s, the High Court of Justice played a significant role in the promotion of Bhutanese culture, intertwining the development of the Bhutanese legal system with Bhutanese cultural traditions. Notably, the Research Unit of the High Court o... Read More about Law, “Tradition” and Legitimacy: Contesting Driglam Namzha.

Fall of Humans: Interactive tabletop games and transmedia storytelling. (2015)
Presentation / Conference Contribution
Dionisio, M., Gujaran, A., Pinto, M., & Esteves, A. (2015, November). Fall of Humans: Interactive tabletop games and transmedia storytelling. Presented at ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces

This paper illustrates how transmedia storytelling can help introduce players to interactive tabletop games. To do so, we developed Fall of Humans (FoH), an experience that takes place over two games: Meat factory, a physical card game where players... Read More about Fall of Humans: Interactive tabletop games and transmedia storytelling..

Comparative Evaluation of Radio and Audio Logo Sound Designs (2015)
Journal Article
McGregor, I., & Cunningham, S. (2015). Comparative Evaluation of Radio and Audio Logo Sound Designs. Journal of the Audio Engineering Society, 63(11), 876-888. https://doi.org/10.17743/jaes.2015.0076

This study aims to explore the suitability of capturing designers’ and listeners’ experiences of sound design for a radio drama and audio logos using the repertory grid technique, which is a proven method of information elicitation based on Personal... Read More about Comparative Evaluation of Radio and Audio Logo Sound Designs.

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, October). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Presentation / Conference Contribution
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015, October). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2015, October). Secret shares to protect health records in Cloud-based infrastructures. Presented at BCS Health Informatics 2015

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

Sticky-Policy enabled authenticated OOXML for Health Care (2015)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015). Sticky-Policy enabled authenticated OOXML for Health Care. In Proceedings of BCS Health Informatics Scotland 2015 Conference. https://doi.org/10.14236/ewic/HIS2015.3

This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. The paper extends the popular Office Open XML (OOXML) document format with eX... Read More about Sticky-Policy enabled authenticated OOXML for Health Care.

Exploratory information searching in the enterprise: A study of user satisfaction and task performance (2015)
Journal Article
Cleverley, P. H., Burnett, S., & Muir, L. (2017). Exploratory information searching in the enterprise: A study of user satisfaction and task performance. Journal of the Association for Information Science and Technology, 68(1), 77-96. https://doi.org/10.1002/asi.23595

No prior research has been identified which investigates the causal factors for workplace exploratory search task performance. The impact of user, task and environmental factors on user satisfaction and task performance was investigated through a mix... Read More about Exploratory information searching in the enterprise: A study of user satisfaction and task performance.