Search for a surname in the box below and then click "Search" to search for Staff.
Smith, S., Smith, C., Taylor-Smith, E., & Gemma, W. (2017, June). Taking education for granted: the role of placement in computing science. Presented at Horizons in STEM Higher Education Conference, Edinburgh, Scotland
The importance of placements and internships was highlighted in the 2016 Shadbolt Review of Computer Science Degree Accreditation and Graduate Employability – indeed the secon...
Smith, S., Smith, C., Berg, T., & Bowen, T. (2017, June). Rich Pictures of the Future. Presented at Horizons in STEM Higher Education Conference, Edinburgh , Scotland
The acceleration of technological innovation means that higher education must prepare students for an unknown future like never before, and help them see their position in rel...
Thuemmler, C. (2017, May). 5G: What Architecture to Serve Vertical Industries?. Presented at IEEE ICC 2017
The implementation and roll out of 5G technology is progressing at increasing speed and will impact all industrial verticals. Health is globally a very important industry wort...
Tsiros, A. (2016). Morpheme. [MaxMSP 5 32 bit software]
This is a MaxMSP 5 32 bit software, Morpheme allows the control of a concatenative synthesis module (IMTR CataRT) through the act of sketching on a digital canvas. The aim is ...
Padilla, S., Methven, T. S., Robb, D. A., & Chantler, M. J. (2015, April). What To Study In HCI? A Reflection Based On CHI and UK Research Data. Presented at What to Study in HCI? Workshop at CHI’15: 33rd Annual ACM Conference on Human Factors in Computing Systems
HCI is a wide, varied, and complex field that covers a broad spectrum of research. We therefore believe that there is no simple answer to the question 'what to study in HCI?' ...
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh
As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifyin...
Buchanan, W. J. (2014, January). Creating engaging and stimulating Web based material. Presented at LTT 2014, Holyrood, Edinburgh
This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Horton, K., Davenport, E., & Wood-Harper, T. (2004). Understanding sociotechnical action: an introduction to the special issue. International Journal of Technology and Human Interaction, 1, 1-6
No abstract available. Item is Editorial preface to special issue.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.8 Application Layer Ana...
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.3 Identity 2.0
5.4 SOAP over HTTP
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
Ammeloot, A. The Meeting Journey: Supporting the Design of Interaction Within Co-located, Collaborative Device Ecologies. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2376807
The combination of personal and Bring Your Own Device (BYOD) technologies with augmented "smart" spaces designed for collaborative work offers new design challenges for the HC...
Binyamin, S. S. Using the Technology Acceptance Model to Measure the Effects of Usability Attributes and Demographic Characteristics on Student Use of Learning Management Systems in Saudi Higher Education. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2376896
Learning management systems (LMS), which allow education at the student’s choice of place and time, have been widely adopted in higher education worldwide. In the case of Saud...