Rich Pictures: A valuable means to explore complex IS issues
Journal Article
Berg, T., & Pooley, R. (2012)
Rich Pictures: A valuable means to explore complex IS issues. Journal of Systemic Practice and Action Research,
This paper discusses the value and interpretive risks when using iconography for system understanding using the rich picture tool. It is suggested that a visual language of pi...
Improving cloud network security using the Tree-Rule firewall
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014)
Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
Designing a probe to explore home information systems in the United Kingdom
Journal Article
Davenport, E., Higgins, M., & Gillham, M. (1996)
Designing a probe to explore home information systems in the United Kingdom. Online Information Review, 20(2), 75-80. https://doi.org/10.1108/eb024565
The authors are engaged in a three-year study of home information systems in the United Kingdom. The project addresses cable and satellite, multimedia CDs and paper-based syst...
Making places: visualization, interaction and experience in urban space
Journal Article
Smyth, M., Trigueiros, P., Helgason, I., Coelho, A., Gallacher, S., Burrows, A., …Penha, R. (2015)
Making places: visualization, interaction and experience in urban space. Interaction Design and Architecture(s) IxDetA, 25, 813-816
Preface to the focus section: Making places: visualization, interaction and experience in urban space
Cities are exciting and people continue to be drawn to urban areas beca...
Triangulation in practice.
Journal Article
Turner, P., & Turner, S. (2009)
Triangulation in practice. Virtual Reality, 13, 171-181. https://doi.org/10.1007/s10055-009-0117-2
Triangulation is the means by which an alternate perspective is used to validate, challenge or extend existing findings. It is frequently used when the field of study is diffi...
Scheduling chicken catching - an investigation into the success of a genetic algorithm on a real world scheduling problem.
Journal Article
Hart, E., Ross, P., & Nelson, J. (1999)
Scheduling chicken catching - an investigation into the success of a genetic algorithm on a real world scheduling problem. Annals of Operations Research, 92, 363-380. https://doi.org/10.1023/A%3A1018951218434
Genetic Algorithms (GAs) are a class of evolutionary algorithms that have been successfully
applied to scheduling problems, in particular job-shop and flow-shop type problems
...
Presence in blended spaces
Journal Article
Benyon, D. (2012)
Presence in blended spaces. Interacting with Computers, 24, 219-226. https://doi.org/10.1016/j.intcom.2012.04.005
Mixed reality technologies have been around for over ten years but it is only with the proliferation of smart phones and tablet (computers) that mixed and augmented reality in...
Applications of Blockchain Within Healthcare.
Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018)
Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...
Demo Hour: Anthony Otten, Daniel Schulze, Mie Sorensen, Di Mainstone, Tim Murray-Browne
Journal Article
Helgason, I. (2011)
Demo Hour: Anthony Otten, Daniel Schulze, Mie Sorensen, Di Mainstone, Tim Murray-Browne. Interactions, 18, 8-9. https://doi.org/10.1145/2008176.2008179
These Demo Hour projects were curated by Ingi Helgason, a researcher and design lecturer at Edinburgh Napier University and the Open University. The projects were presented at...
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box
Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017)
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to...