Date


School

Output Type

Download Available

38 results

Psychogeography With Technology

Presentation / Conference
Flint, T., Grandison, T., & Barrett, H. (2018, November)
Psychogeography With Technology. Poster presented at Engage 2018
No abstract available.

Designing Mixed Reality Experiences and Pedagogies on the NYC High Line

Presentation / Conference
O’Keefe, B., Flint, T., Friedman, E., & Benyon, D. (2018, October)
Designing Mixed Reality Experiences and Pedagogies on the NYC High Line. Poster presented at Celebration of Scholarship
No abstract available.

Delivering HE and FE: A user evaluation of virtual learning environments in a networked institution.

Presentation / Conference
Clayes, E., & Fabian, K. (2018, September)
Delivering HE and FE: A user evaluation of virtual learning environments in a networked institution
No abstract available.

Groovy Parallel Patterns: A Library to Support Parallelization

Presentation / Conference
Kerridge, J., Chalmers, K., & Pedersen, M. (2016, June)
Groovy Parallel Patterns: A Library to Support Parallelization. Paper presented at GR8Conf EU 2016, Copenhagen, Denmark

A decentralized group key management protocol for mobile Internet of things (DBGK)

Presentation / Conference
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August)
A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15

Assessing the available and accessible evidence: how personal reputations are determined and managed online.

Presentation / Conference
Ryan, F., Cruickshank, P., Hall, H., & Lawson, A. (2015, June)
Assessing the available and accessible evidence: how personal reputations are determined and managed online. Paper presented at Information: interactions and impact (i3) 2015
This paper is concerned with how online information contributes to the determination of personal reputations. The term “personal reputation” in this context means the reputati...

Could social networking online help NEET young people gain employment?

Presentation / Conference
Mowbray, J., Hall, H. & Raeside, R. (2015, June)
Could social networking online help NEET young people gain employment?. Paper presented at Information: interactions and impact (i3) 2015, Robert Gordon University, Aberdeen, Scotland
This paper first explores the literature pertaining to social networking in both off-line and online environments, and places it within the context of the study of employment ...

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...

Identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J. (2015, April)
Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.

What To Study In HCI? A Reflection Based On CHI and UK Research Data

Presentation / Conference
Padilla, S., Methven, T. S., Robb, D. A., & Chantler, M. J. (2015, April)
What To Study In HCI? A Reflection Based On CHI and UK Research Data. Presented at What to Study in HCI? Workshop at CHI’15: 33rd Annual ACM Conference on Human Factors in Computing Systems
HCI is a wide, varied, and complex field that covers a broad spectrum of research. We therefore believe that there is no simple answer to the question 'what to study in HCI?' ...