Contra Bentham: ethical information policy in the PanopticEon
Duff, A. S., & Bentham, C. (2017)
Contra Bentham: ethical information policy in the PanopticEon. Journal of Information Ethics, 26(1), 93-111
The article addresses the problem of surveillance within the framework of ethical information policy. Jeremy Bentham’s plan for a panoptic penitentiary is subjected to forensi...
Ethical ePunditry? The role of expertise in online opinion-making
Forrest, E., & Duff, A. S. (2017)
Ethical ePunditry? The role of expertise in online opinion-making. Journal of Information Ethics, 26(1),
The use of blogs to communicate ideas, opinions and knowledge has grown over the past two decades. Social media platforms have facilitated the rise of hybridised forms of writ...
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017)
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection, (355-358). https://doi.org/10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...
Practices of community representatives in exploiting information channels for citizen engagement
Presentation / Conference
Cruickshank, P., Ryan, B., & Hall, H. (2017, June)
Practices of community representatives in exploiting information channels for citizen engagement. Paper presented at i3: Information: Interactions and impact
This extended abstract presents results of an investigation of the practices of community representatives (in this case: Community Councillors in Scotland) in exploiting infor...
The role of networking and social media tools during job search: an information behaviour perspective
Mowbray, J., Hall, H., Raeside, R., & Robertson, P. (2017)
The role of networking and social media tools during job search: an information behaviour perspective. Information Research, 22(1),
Introduction. The paper presents a critical analysis of the extant literature pertaining to the networking behaviour of young jobseekers in both offline and online environment...
A social-technological alignment matrix.
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...
Specification for Generic Enablers as Software
Brogan, J. P., & Thuemmler, C. (2014)
Specification for Generic Enablers as Software. In 2014 11th International Conference on Information Technology: New Generations, 129-136. doi:10.1109/itng.2014.51
Generic Enablers are a specialism of software engineering. They are components used for providing reusable building blocks that enable the construction of applications for fut...
Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services
Lim, A. K., Thuemmler, C., Paulin, A., Jell, T., & Keow Lim, A. K. (2017)
Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In S. Latifi (Ed.), Information Technology-Next Generation, (811-817). https://doi.org/10.1007/978-3-319-54978-1_100
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...
Cryptography across industry sectors
Buchanan, W. J., Woodward, A., & Helme, S. (2017)
Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221
Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies...
From triviality to business tool: the case of Twitter in library and information services delivery.
Loudon, L., & Hall, H. (2010)
From triviality to business tool: the case of Twitter in library and information services delivery. Business Information Review, 27(4), 236-241. https://doi.org/10.1177/0266382110390480
This article evaluates microblogging in general, and Twitter in particular, as a professional tool in library and information services provision. It draws on the findings of a...