Date


People

Download Available

177 results

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Delphi Study of Risk to Individuals who Disclose Personal Information Online

Journal Article
Haynes, D., & Robinson, L. (in press)
Delphi Study of Risk to Individuals who Disclose Personal Information Online. Journal of Information Science, https://doi.org/10.1177/0165551521992756
A two-round Delphi study was conducted to explore priorities for addressing online risk to individuals. A corpus of literature was created based on 69 peer-reviewed articles ...

Monitoring information security risks within health care

Journal Article
van Deursen, N., Buchanan, W. J., & Duff, A. (2013)
Monitoring information security risks within health care. Computers and Security, 37, 31-45. https://doi.org/10.1016/j.cose.2013.04.005
This paper presents an overview of possible risks to the security of health care data. These risks were detected with a novel approach to information security. It is based on ...

Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects

Thesis
Evangelidis, A. Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7309
eGovernment is a relatively new, but rapidly expanding, domain; mainly due to the perceived outcomes that it may bring to the public administration. Founded on the premise tha...

Risk assessment for mobile systems through a multilayered hierarchical Bayesian network.

Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016)
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the o...

Response to risk: experts and end-user perspectives on email security, and the role of the business information professional in policy development

Journal Article
Kelleher, Z., & Hall, H. (2005)
Response to risk: experts and end-user perspectives on email security, and the role of the business information professional in policy development. Business Information Review, 22(1), 46-52. https://doi.org/10.1177/0266382105052266
This article considers the main sources of e-mail security risk, and means of addressing it with particular reference to the creation and deployment of e-mail security policie...

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...

Dot-to-Dot: Pre-Reading Assessment of Literacy Risk via a Visual-Motor Mechanism on Touchscreen Devices

Conference Proceeding
Park, W., Reves, P., Esteves, A., Kerridge, J. M., Yim, D., & Oh, U. (2021)
Dot-to-Dot: Pre-Reading Assessment of Literacy Risk via a Visual-Motor Mechanism on Touchscreen Devices. In Human-Computer Interaction – INTERACT 2021: 18th IFIP TC 13 International Conference, Bari, Italy, August 30 – September 3, 2021, Proceedings, Part I (192-212). https://doi.org/10.1007/978-3-030-85623-6_13
While early identification of children with dyslexia is crucial, it is difficult to assess literacy risks of these children early on before they learn to read. In this study, ...

Risk analysis for criminal context in information sharing policies.

Presentation / Conference
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August)
Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event, School of Computing, University of Glasgow
This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, whi...

Cyber risk and opportunities in the Cloud.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, September)
Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh
This presentation outlines some of the key risks and opportunities in the Cloud.
17 results

Rigorous Graphical Explainable AI for Higher-Risk Applications

2020 - 2021
Deep Neural Networks (DNNs) are common in many areas, such as human‐robot interaction (HRI), natural language processing, and planning tasks, however, their use in high-risk industrial applications is...
Funder: Engineering and Physical Sciences Research Council | Value: £49,088

Risk and opportunity in collaborative work

2008 - 2008
Social computing tools for collaboration in work environments. This study set out to establish the main risks and opportunities of the adoption of social computing tools within organizations for colla...
Funder: TFPL | Value: £4,400

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

TrueDeploy - Scottish Enterprise HGSP Company Creation

2022 - 2024
The way in which we develop, supply, and secure software is often weak and lacks digital trust. The dominance of open-source software and the interconnectedness of software between organisations has r...
Funder: Scottish Enterprise | Value: £198,161

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

Towards Guided Self-Organisation in Artificial Complex Systems: A Swarm Robotics Case Study

2020 - 2024
Swarm robotics refers to the design and coordination of large numbers of simple physical robots. Uses include environmental applications such as pollution monitoring in the oceans using aquatic robots...
Funder: Royal Society | Value: £11,500

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930

KTP Standard Life

2017 - 2018
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Funder: Innovate UK | Value: £131,909

Data Capture and Auto Identification Reference

2009 - 2011
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a resear...
Funder: Innovate UK | Value: £227,172

First August - Real-time Cyber Tracking and Risk Assessment Tool

2013 - 2014
Prototype software and business case.
Funder: Scottish Funding Council | Value: £5,000