Hall, H., Cruickshank, P. & Ryan, B. (in press). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information LiteracyISBN n/a
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Pomponi, F. & Inzitari, G. (2017). Zooming in on biomimicry: the potential of tensegrity structures. In PLEA Conference ProceedingsISBN N/A
The foundations of biomimicry lie with the idea that Nature can inspire solutions to complex human problems. Biomimicry in Architecture is a rapidly growing field which also e...
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
Paths for All Partnership
This is a research and evaluation of Macmillan Move all project in collaboration with Paths for all partnership.
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
16 February 2017
Reader in Human Resource Development
Assistant Principal, Student Experience
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Flint, T. (in press). Appropriating Affordances. Three Practice Based Explorations. In Proceedings of BHCI 2017ISBN tbc
Affordance and Appropriation are related. An effective way of examining these phenomena is through practice. This paper discusses practice based exploration of affordance in t...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Benyon, D. & Resmini, A. (in press). User Experience in Cross-channel Ecosystems. In Proceedings of the British HCI Conference 2017ISBN tbc
Recent developments in information and communication technologies have left interaction design and human-computer interaction (HCI) with something of a conceptual gap. The dis...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Farrenkopf, T., Guckert, M., Urquhart, N. & Wells, S. (in press). Information Diffusion in Multi-Agent Communities. In Conference ProceedingsISBN tbc
Understanding the course of events when newly launched products penetrate a market, and how those products supersede existing dominant products, is crucial. Besides potential ...
McKeown, S., Russell, G. & Leimich, P. (in press). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and LawISBN not yet known
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Chomsiri, T., He, X., Nanda, P. & Tan, Z. (2017). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/ISPA, 178-184. doi:10.1109/trustcom.2016.0061. ISBN 978-1-5090-3205-1
The firewalls were invented since 1990s  and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...
Buwert, P. (2017). Shepard Fairey’s inauguration posters may define political art in Trump era
The American street artist Shepard Fairey created a poster for Barack Obama’s presidential election campaign. It was 2008 and the simple red, beige and blue stencilled image o...
Essa, A., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (2016). A new dynamic weight clustering algorithm for wireless sensor networks. In Yang, S., Gao, J., Zhang, Y., Yang, K., Leung, V. C. M. & Hu, J. (Eds.). Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203. ISBN 978-3-319-47729-9, 978-3-319-47728-2
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K. & Thuemmler, C. (2016). Health 4.0: The Case of Multiple Sclerosis. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 100-104. doi:10.1109/HealthCom.2016.7749437. ISBN 978-1-5090-3370-6
Multiple sclerosis is a chronic and variable disease in matters of symptoms, clinical course and outcome. The ultimate goal of currently used drugs and therapeutic strategies ...
Buchanan, W. J. & Van Deursen, N. (2016). HI-risk: A Method to Analyse Health Information Risk Intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)doi:10.1109/HealthCom.2016.7749536. ISBN 978-1-5090-3370-6
— Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to secu...
Crohn's in Childhood Research Association
An investigation of commonly used IBD drugs on autophagy pathway activity and potential therapeutic benefit for treatment of paediatric IBD
The Mental Health Tribunal for Scotland became operational in 2005. It plays an integral role in guaranteeing the rights of patients with mental disorder as originally identified in the Millan Princip...
Chief Scientists Office
Chlamydia trachomatis is the most common sexually transmitted infection in Scotland, and has significant long‐term consequences to reproductive health. Recent studies suggest that in addition to the g...
Scottish Funding Council
This project takes a new approach to teaching Mindful-breathing techniques to children aged 4-9.
Diagnosis of anxiety, stress, depression and ADHD in children has seen a significant increase over the...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Society of Applied Microbiology
SFAM students and graduates into work grant
National Institute for Health Research
The impact of parental drug misuse on children and families is a major public health problem . Parental drug misuse is closely associated with poor parenting, poor child development and increased r...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
The project will take the form of a systematic review of relevant literature to provide an update on the evidence base on the health needs of people with learning disabilities in Scotland since 2004, ...
The Scottish Association for Mental Health
Burdett Trust for Nursing
This nurse-led project will be an interdisciplinary collaboration between leading researchers working in Edinburgh Napier University, in the University of Sydney, and Flinders University, Adelaide Aus...
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
The PhD project which I am undertaking is focused on understanding the role of cathelicidins during respiratory viral infection...
Advocates of game-based learning argue that computer games have the
potential to transform university education, moti...
Mergers are a fact of life in the private sector and are increasingly becoming a factor in the public se...
Proteolytic degradation of the extracellular matrix (ECM...
27 August 2017
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
05 July 2017
The 31st British Human Computer Interaction Conference was held between the 3rd and 6th July 2017 at the University of Sunderland.
The conference was organised by...
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
18 August 2017
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
27 January 2016
27 January 2016
Peter Cruickshank and Bruce Ryan today publish their report on workshops on digital engagement for Community Council and Registered Tenant Organisation members. Key find...