(+44) 131 455 5358
Perret, C., Powers, S. T., Pitt, J., & Hart, E. (in press). Can justice be fair when it is blind? How social network structures can promote or prevent the evolution of despotism. In Proceedings of the 2018 Conference on Artificial Life
Hierarchy is an efficient way for a group to organize, but often goes along with inequality that benefits leaders. To control despotic behaviour, followers can assess leaders'...
Lu, X., & Rahman, M. (in press). Why Do we Like Commenting and Sharing in Social Media? An Online Approach of Luxury Brand Communication. In Gamma Conference Proceedings
Liu, X., & Liu, Q. (in press). Appliance Recognition Based on Continuous Quadratic Programming. In Proceedings of 4th International Conference on Cloud Computing and Security (ICCCS 2018)
The detailed information of residents' electricity consumption is of great significance to the planning of the use of electrical appliances and the reduction of electrical ene...
Royal Society of Edinburgh
The first BSL National Plan (due 22 October 2017) and its mandate for the inclusion of Deaf Culture in Scottish public life provide the context and rationale for the proposed collaborative networking ...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Digital Health Institute
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
20 September 2017
Dr Bruce Ryan presented a paper entitled 'Exploring information literacy through the lens of Activity Theory' at European Conference on Information Literacy (ECIL) in St Malo,...
23 November 2016
23 November 2016
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud environments persists, along with an increasin...
Lecturer Child Health and Cancer Nursing
Lecturer (Child Health)
Information Services Advisor
Associate Professor in Law
Lecturer/BSc Programme leader
White, P., Lee, M., Roberts, D., & Cole, L. (2018). Data from: "Land-sharing via land-sparing: enhancing productivity and biodiversity on model dairy farms as a route to sustainable intensification". doi:10.17869/ENU.2018.1141073
Original title of datasets = Data from: Sustainable intensification of a dairy farming system.
Hart, E., Steyven, A. S. W., & Paechter, B. (in press). Evolution of a Functionally Diverse Swarm via a Novel Decentralised Quality-Diversity Algorithm. In Proceedings of GECCO 2018
The presence of functionality diversity within a group has been demonstrated to lead to greater robustness, higher performance and increased problem-solving ability in a broad...
Hairstans, R., Smith, R., & Wilson, P. (2018). The merits of varying forms of mass timber products for offsite and modular construction. In N/A
Mass timber is a family of Solid Laminate Timber Systems (SLTS) formed from smaller sections of timber connected by glue, mechanical fixings, moisture movement or a combinatio...
Deakin, M., Mora, L., & Reid, A. (2018). The Research and Innovation of Smart Specialisation Strategies: The Transition from the Triple to Quadruple Helix. In M. Bozina Beros, N. Recker, & M. Kozina (Eds.), Proceedings of the 27th International Scientific Conference on Economic and Social Development, 94-103
This article suggests the Entrepreneurial Discovery Process (EPD) that underlies Research and Innovation Strategies for Smart Specialisation (RIS3) is not so much caught in th...
Hall, H., Cruickshank, P., & Ryan, B. (2018). Exploring Information Literacy Through the Lens of Activity Theory. In Communications in Computer and Information Science; Information Literacy in the Workplace, 803-812. doi:10.1007/978-3-319-74334-9_81
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Moradpoor, N., Clavie, B., & Buchanan, B. (2018). Employing Machine Learning Techniques for Detection and Classification of Phishing Emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017doi:10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...
Asif, R. (2017). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedings
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
Blake, J. (2017). Brexit has started: so what should Remain Vote Scotland do to protect its interests?. The Scotsman, Edinburgh, Scotland
This Scotsman newspaper article is based on research by James Blake - examining the impact of Brexit on the creative industries - and other reports from members of the RSE You...
Briers, R., Campbell, R., Galt, K., Walters, M., & Holmes, J. (2017). Using stable isotopes to assess the distribution of reproduction by migratory and resident Salmo trutta within river systems: some complicating factors. In Sea Trout Science and Management
Understanding the distribution of spawning resident and migratory trout in a river system is important for fishery management. In most cases this information is lacking or onl...
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Moradpoor, N., Brown, M., & Russell, G. (2017). Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017). A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 188-193. doi:10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Engineering and Physical Sciences Research Council
Robotics is changing the landscape of innovation. But traditional design approaches are not suited to novel or unknown habitats and contexts, for instance: robot colonies for ore mining, exploring or ...
Burdett Trust for Nursing
Mobile health (mHealth) is a rapidly growing area with patients and healthcare professionals using applications (apps) on smartphones to help them manage chronic illness. Dementia is a growing problem...
Carnegie Trust for the Universities of Scotland
The objective of this research study is to develop a prototype model for gathering and reusing ocean plastic in-situ. The proposal is to visit a number of beachside locations along the Scottish West C...
The Scottish Informatics & Computer Science Alliance
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Scottish Funding Council
Walks and Waterfalls is a multi-channel interactive project intended to design and roadmap a blended experience between a fine art photography book, a mobile augmented reality app and physical locatio...
Technology has been heralded as a potential enabler of communication between individuals and those in their informal or
professional care network. Enabling people to effectively talk about their needs...
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Arts & Humanities Research Council
The project pursues three main aims and objectives:
1. Address desideratum: During the First World War, many communities in Britain and its Empire hosted internment camps for military Prisoners of Wa...
The Mental Health Tribunal for Scotland became operational in 2005. It plays an integral role in guaranteeing the rights of patients with mental disorder as originally identified in the Millan Princip...
Economic and Social Research Council
Integration of health and social care services is happening across the United Kingdom. Integrating services is important as it puts more focus on supporting the lives – not just the health – of indivi...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Forestry Commission Scotland
Applied research and knowledge transfer addressing industry needs – as set out by the SIRT management board. This includes providing information and advice to industry sponsors
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud environments persists, along with an incr...
The exchange of information between the police and community partner organisations forms a core aspect of...
As we move into storing data within a public cloud infrastructure we reduce the defences and must embed security into the data. Along with this we need to find w...
Leo Appleton's PhD research explores the impact of libraries on citizenship. He is...
This research explores the role, use and v...
This thesis describes the development of the HI-risk method to assess socio-tec...
Hip fracture is a common, serious and well-defined in...
The total fertility rate in Bangladesh declined from 6.3 children per women in 1975 to 3.3 in 1997-1999. This decline of...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
The concept of context-awareness is widely used in mobile and pervasive computing t...
20 July 2017
07 December 2016
The paper reports some of the findings of Frances Ryan's doctoral research. The full study – due to be completed in spring 2017 – takes into account prior research on the buil...
31 May 2018
This was the 4th instalment of the Big Data in Cyber Security Conference organised by The Cyber Academy.
It has been co-organised with SBL and it was part of The...
12 January 2018
In summer 2017 all the PhD students in academic departments that hold membership of the Scottish Informatics and Computer Science Alliance (SICSA) were invited to recognise th...
19 March 2017
Professor Hazel Hall, Peter Cruickshank and Dr Bruce Ryan set out to investigate levels of digital and information literacy within Scotland’s Community Council system. Their w...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
20 February 2017
The Royal Society of Edinburgh (RSE) brings together distinguished individuals from the arts, business, science and technology and academia worlds to advance learning and know...
18 February 2016
18 February 2016
Associate students, joining Edinburgh Napier University in third year can now articulate onto a number of different undergraduate programmes, take part in University coordinat...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
05 July 2017
The 31st British Human Computer Interaction Conference was held between the 3rd and 6th July 2017 at the University of Sunderland.
The conference was organised by...
26 January 2016
26 January 2016
The MAZI grant application for the EU Horizon2020 CAPS framework was successful and the project started officially on January 1st, 2016.