HI-risk: A method to analyse health information risk intelligence
Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society
Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...
Risk analysis for criminal context in information sharing policies.
Presentation / Conference
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August)
Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event, School of Computing, University of Glasgow
This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, whi...
Cyber risk and opportunities in the Cloud.
Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, September)
Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh
This presentation outlines some of the key risks and opportunities in the Cloud.
A comparative review of information security risk assessment methodologies for health care.
Presentation / Conference
Hazelhoff Roelfzema, N. (2011, March)
A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society, Avilla, Spain
Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk a...
Building a new nation: risk, goverance and trust.
Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
The Risks and Opportunities of Mobile Working within Cloud Environments.
Presentation / Conference
Buchanan, W. J., & Smales, A. (2014, February)
The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...
Understanding Personal Online Risk To Individuals Via Ontology Development
Conference Proceeding
Haynes, D. (2020)
Understanding Personal Online Risk To Individuals Via Ontology Development. In Knowledge Organization at the Interface: Proceedings of the Sixteenth International ISKO Conference, 2020, Aalborg, Denmark (171-180). https://doi.org/10.5771/9783956507762-171
The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of bett...
Crime risk evaluation within information sharing between the Police and community partners.
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011)
Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922
The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. ...