15 results

Conducting Performance Evaluation of an e-Health Platform

Book
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Conducting Performance Evaluation of an e-Health Platform. In T. Issa, P. Isaías, & P. Kommers (Eds.), Advances in Business Information Systems and Analytics; Information Systems and Technology for Organizations in a Networked Society, 295-315. IGI Global Publishing. doi:10.4018/978-1-4666-4062-7.ch016
For increased awareness and adoption of e-Health implementations, results from evaluation must be catered towards three primary perspectives: organizational, end-user and tech...

Mastering Java.

Book
Buchanan, W. J. (1997)
Mastering Java. Macmillan Press
This book provides an introduction to the Java programming language and also covers other related areas such as HTML, JavaScript, CGIscript and VRML. Most of the Java programs...

An overview of artificial immune systems.

Book
Timmis, J., Knight, T., de Castro, L., & Hart, E. (2004)
An overview of artificial immune systems. In R. Paton, H. Bolouri, W. M. L. Holcombe, J. H. Parish, & R. Tateson (Eds.), Computation in Cells and Tissues: Perspectives and Tools of Thought, 51-86. Springer-Verlag
The immune system is highly distributed, highly adaptive, self-organising in nature, maintains a memory of past encounters and has the ability to continually learn about new e...

Individual differences and inclusive design.

Book
Benyon, D., Crerar, A., & Wilkinson, S. (2000)
Individual differences and inclusive design. In C. Stephanidis (Ed.), User interfaces for all: Concepts, methods and tools, 21-46. Lawrence Erlbaum
Usability is widely recognised to be as important as functionality to the success of interactive computer systems. However, even where usability is considered seriously, the s...

Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods.

Book
Imaz, M., & Benyon, D. (2007)
Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods. MIT Press
This work talks about how recent research in cognitive science offers new ways to understand the interaction of people and computers and develops a new literacy for well-infor...

Cryptography

Book
Buchanan, B. (2017)
Cryptography. River Publishers
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it ...

GDPR and Cyber Security for Business Information Systems

Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018)
GDPR and Cyber Security for Business Information Systems. River Publishers
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundame...

Caught between real and virtual worlds.

Book
Turner, P., & Turner, S. (2000)
Caught between real and virtual worlds. In J. Bawa, P. Dorazio, & L. Trenner (Eds.), The Usability Business: Making the Web Work, 60-70. Springer-Verlag
This chapter describes how we, as HCI practitioners, contributed to the design of a collaborative virtual environment-based simulator. This simulator is to be used by senior m...

Designing at a distance via real-time designer-to-designer interaction.

Book
Scrivener, S. A. R., Harris, D., Clark, S., Rockoff, T., & Smyth, M. (1994)
Designing at a distance via real-time designer-to-designer interaction. In S. Greenberg, S. Hayne, & R. Rada (Eds.), Groupware for Real-Time Drawing - A Designers Guide, 5-23. McGraw Hill
This paper describes an experiment in which teams of two designers used a shared computer ‘sketchpad’ to generate design concepts for products while geographically separated b...

PC Interfacing, communications and Windows programming.

Book
Buchanan, W. J. (1998)
PC Interfacing, communications and Windows programming. Addison-Wesley Longman Ltd
author's successful Applied PC Interfacing, Graphics and Interrupts this book covers all the different aspects of computer systems from low-level hardware (such as processors ...