Duff, A. (2009). New media & information: convergences & divergences (CD Rom). In New Media & Information: Convergences & DivergencesISBN 9789606746055
Benyon, D. & Mival, O. (2007). Scenarios for Companions. In Austrian Artificial Intelligence Workshop, Vienna, September 2008, 1-38
This paper is concerned with understanding the needs ofCompanion owners (the people formerly known as ‘users’) and in how thoserequirements can be represented, with the whole ...
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R. & Spyra, G. (2014). Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
Improving customer experience through intelligent workflow
Scottish Funding Council
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
Associate Professor in Festival and Event Management
Associate Professor in Accounting & Finance
Lecturer in Festival and Event Management
Lecturer in Electrical and Electronic Engineering
Professor of Information Policy
Pikoulas, J., Mannion, M. & Buchanan, W. J. (1999). Software agents and computer network security. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the, 211-217. doi:10.1109/ECBS.2000.839879. ISBN 0-7695-604-6
Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system us...
Hall, H. (2000). Social exchange for knowledge exchange. In Managing knowledge: conversations and critiques, University of Leicester Management Centre, 10-11 April 2001, 1-23
The factors that motivate people to codify and share knowledge for the benefit of others have
been identified as a priority area for individual companies (Smith & Farquhar, 20...
Russell, G. & Macfarlane, R. (2011). Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. doi:10.1109/TrustCom.2012.259. ISBN 978-0-7695-4745-9
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...
Cruickshank, P. & Smith, C. F. (2008). Self-efficacy as a factor in the evaluation of e-petitions. In Parycek, P. (Ed.). Proceedings of EDEM 2009 - Conference on Electronic Democracy, 223-232. ISBN 978-3-85403-251-9
E-petitions are seen as one response to a perceived decline in public trust of political institutions and the associated symptoms of disengagement. In this paper, some current...
Kwecka, Z., Buchanan, W. J. & Spiers, D. A. (2009). Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, 131 - 136. doi:10.1109/SIBIRCON.2010.5555325. ISBN 978-1-4244-7625-1
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need t...
Kerridge, J. (2013). Process discovery in highly parallel distributed systems
In distributed data processing systems it may happen that data arrives for
processing for which the appropriate algorithm is not available on the specific node
of the distribu...
Burrows, L., Turner, S. & Turner, P. (2009). Re-creating Edinburgh: adopting the tourist gaze. In Neerincx, M. & Brinkman, W. (Eds.). Proceedings of ECCE 2010
Motivation – The work described in this paper investigated the potential of a low fidelity desktop application using the metaphor of the ‘tourist gaze’ in conveying a sense of...
Zhou, S. & Liu, X. (2006). Quality metrics for internet applications: developing new from old. doi:10.1109/COMPSAC.2007.176. ISBN 0-7695-2870-8
This discussion concerns ?metrics?. More specifically, we discuss quantitative metrics for evaluating Internet applications: what should we quantify, monitor and analyse in or...
Kosek, A., Syed, A. & Kerridge, J. (2011). RDF recipes for context-aware interoperability in pervasive systems. In Proceedings of IEEE Symposium on Computers and Communications, 1017-1022. doi:10.1109/ISCC.2010.5546647. ISBN 978-1-4244-7754-8
Nowadays home automation systems integrate many devices from security system, heating, ventilation and air conditioning system, lighting system or audio-video systems. Every t...
Spyra, G. & Buchanan, W. J. (2016). Protecting Documents with Sticky Policies and Identity-Based Encryption. In Proceedings of the Future Technologies Conference (FTC) 2016
Documents are increasingly being held in public cloud-based systems, and there thus increasingly exposed to accesses from malicious entities. This paper focuses on the integra...
This project will focus on the design and development of a distributed software architecture for the platform with innovative technology approaches. This includes microservices with containerisation, ...
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.
Royal Society of Edinburgh
The project aims to advance the autonomy of field robots with a novel approach to developing a new generation of Meteorological Drone Robots (Met-Bot) which will be context-driven, proactively auto-re...
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
The project will produce recommendations for the application of gamification to the training product, informed by the company context, with a design led by the latest academic research in gamification...
To develop a formal Scotland-wide network of LIS researchers and practitioners, to help spread expertise into a connected practitioner community across all LIS sectors through high quality training an...
Carnegie Trust for the Universities of Scotland
As social media use by older people increases, along with an increased rate of dementia diagnoses, the management or oversight of social networking sites by carers is likely to increase. This research...
Eye-tracking is an increasingly popular technique in which user’s eye movements are captured by a computer system, allowing it to ascertain where the user is looking in a display or visual scene (fixa...
This will investigate the feasibility of incentivising environmentally friendly behaviours through rewards given in tokens as well as IoT wearables to discover this behaviour and reward automatically.
The Scottish Informatics & Computer Science Alliance
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words):
Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...
development of innovative projection system to allow responsive and live creation and manipulation of projected scenery for theatrical workshops.
Digital Health Institute
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities.
Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
Arts & Humanities Research Council
Data Driven Innovation (DDI) is transforming society and the economy. DDI is defined as the challenge to make effective use of data to shape, develop and deliver innovative products and services to co...
As a societal phenomenon, festivals and planned events are discussed in a wide policy context. They have entered a broader discus...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
The concept of context-awareness is widely used in mobile and pervasive computing t...
This critical appraisal demonstrates three particular themes that are domin...
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.
19 June 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament on Tuesday 20 June 2017. ...
30 May 2017
Centre for Social Informatics PhD student Lyndsey Jenkins has been appointed to the team of copy-editors for Information Research, one of the longest-established open access journals in the field of I...
22 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry).
19 May 2017
Professor Hazel Hall was admitted as a Fellow of the Royal Society of Edinburgh at a ceremony on Monday 15th May.
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
16 May 2017
Researchers in the Centre for Social Informatics have released findings of the Information Literacy for Democratic Engagement (IL-DEM) project.
19 March 2017
Professor Hazel Hall is the guest of the University of São Paulo, Brazil in the week beginning 13th March 2017.
13 March 2017
Professor Hazel Hall has been appointed Docent of Information Studies at Åbo Akademi University
21 February 2017
Professor Hazel Hall of the School of Computing is one of 60 new elected Fellows of the Royal Society of Edinburgh
20 February 2017
This one-day symposium organised at the Radboud University Medical Centre brought together international scientists in the field of tumor immunology, computational and artificial immune systems.
17 February 2017
The New Year welcomed Emma Hart to the helm of Evolutionary Computation. She took over the role of Editor-in-Chief from Hans-Georg Beyer (who had assumed the role himself in 2010). Professor Hart ans...
Professor Hazel Hall has been appointed Docent in Information Studies within the Faculty of Social Sciences, Business and Economics, Åbo Akademi, Finland.
Dr Oli Mival from the School of Computing's Centre for Interaction Design has been invited to speak at INNOVATE ROBOTICS on the fundamental questions of how we engage in human-robotic-interaction, fro...
16 February 2017