Buchanan, W. J. (2011, January). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University
Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learni...
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today, ISSN 2573-8240
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...
Buchanan, B., & Naqvi, N. (2018). Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), (1-4). ISSN 2516-3949
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, doi:10.1093/comjnl/bxy002. ISSN 0010-4620
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2017). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, (1-18). doi:10.1155/2018/5906368. ISSN 1939-0114
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Buchanan, W. J., Woodward, A., & Helme, S. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), (145-162). doi:10.1080/23742917.2017.1327221. ISSN 2374-2917
Security adoption varies across industry sectors, where some companies
such as Google, Apple and Microsoft are strong advocates
of the adoption of HTTPS, while other companies...
Buchanan, W. J. (1999). Distributed systems and networks. McGraw-Hill
This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distrib...
Buchanan, W. J. (1996). Wiedziec wiecej Internet. Wkt (Poland)
Ksi??ka ta m. In. Uczy jak korzysta? z internetu i sieci www.Opisuje bowiem techniczne aspekty tej ?wiatowej sieci informacyjnej. Dlatego te? mo?e by? wykorzystywana przez wsz...
Buchanan, W. J. (1996). Mastering Global Information Systems. Macmillan Press
This book provides an excellent foundation in modern information systems and data communications. It has five basic themes:
* Digital Information Sources and Multimedia
Buchanan, W. J. (1995). Applied data communications and networks. Springer
This book covers all the key areas of data communications technology including networking and communication systems, signal analysis and transmission systems. It approaches th...
Migas, N., Anastasiadou, C. & Buchanan, W. J. (2006). Mass customisation through personalised brochures: the role of digital printing. Information Systems. ISSN 0306-4379
This paper argues that despite the wide adoption of Internet technologies in destination marketing, information is still disseminated through printed brochures that have large...
Lapok, P., Lawson, A., & Paechter, B. (2018). 2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms. In H. Rodrigues, J. Herskovits, C. Mota Soares, A. Araújo, J. Guedes, J. Folgado, …J. Madeira (Eds.), EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization, 926-937. doi:10.1007/978-3-319-97773-7_80
In this paper, we investigate the ability of genetic representation methods to describe two-dimensional outline shapes, in order to use them in a generative design system. A s...
Smith, S., Taylor-Smith, E., Smith, C., & Varey, A. (2018). From work-integrated learning to learning-integrated work: motivations and apprehensions of Graduate Apprentices. In Proceedings of the 3rdInternational Research Symposium on Cooperative and Work-Integrated Education, Stuttgart, Germany, 199-207
Graduate Apprenticeship (GA) degrees bring new collaborations between universities and employers and new opportunities for apprentices—to gain a university degree, while also ...
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2000). An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001, 247 - 254. doi:10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...
Akram, R. N., Markantonakis, K. & Mayes, K. (2012). Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. In Xie, S. (Ed.). 8th International Conference on Computational Intelligence and Security (CIS 2012), 646-652. doi:10.1109/CIS.2012.149. ISBN 978-1-4673-4725-9
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of...
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time ...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...