HI-risk: A method to analyse health information risk intelligence
Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...
Delphi Study of Risk to Individuals who Disclose Personal Information Online
Journal Article
Haynes, D., & Robinson, L. (in press)
Delphi Study of Risk to Individuals who Disclose Personal Information Online. Journal of Information Science, https://doi.org/10.1177/0165551521992756
A two-round Delphi study was conducted to explore priorities for addressing online risk to individuals. A corpus of literature was created based on 69 peer-reviewed articles ...
Monitoring information security risks within health care
Journal Article
van Deursen, N., Buchanan, W. J., & Duff, A. (2013)
Monitoring information security risks within health care. Computers and Security, 37, 31-45. https://doi.org/10.1016/j.cose.2013.04.005
This paper presents an overview of possible risks to the security of health care data. These
risks were detected with a novel approach to information security. It is based on ...
Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects
Thesis
Evangelidis, A. Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7309
eGovernment is a relatively new, but rapidly expanding, domain; mainly due to the perceived outcomes that it may bring to the public administration. Founded on the premise tha...
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network.
Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016)
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the o...
Response to risk: experts and end-user perspectives on email security, and the role of the business information professional in policy development
Journal Article
Kelleher, Z., & Hall, H. (2005)
Response to risk: experts and end-user perspectives on email security, and the role of the business information professional in policy development. Business Information Review, 22(1), 46-52. https://doi.org/10.1177/0266382105052266
This article considers the main sources of e-mail security risk, and means of addressing it with particular reference to the creation and deployment of e-mail security policie...
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society
Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...
Dot-to-Dot: Pre-Reading Assessment of Literacy Risk via a Visual-Motor Mechanism on Touchscreen Devices
Conference Proceeding
Park, W., Reves, P., Esteves, A., Kerridge, J. M., Yim, D., & Oh, U. (2021)
Dot-to-Dot: Pre-Reading Assessment of Literacy Risk via a Visual-Motor Mechanism on Touchscreen Devices. In Human-Computer Interaction – INTERACT 2021: 18th IFIP TC 13 International Conference, Bari, Italy, August 30 – September 3, 2021, Proceedings, Part I (192-212). https://doi.org/10.1007/978-3-030-85623-6_13
While early identification of children with dyslexia is crucial, it is difficult to assess literacy risks of these children early on before they learn to read. In this study, ...
Risk analysis for criminal context in information sharing policies.
Presentation / Conference
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August)
Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event, School of Computing, University of Glasgow
This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, whi...
Cyber risk and opportunities in the Cloud.
Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, September)
Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh
This presentation outlines some of the key risks and opportunities in the Cloud.