Senior Research Fellow
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7. doi:10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),doi:10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Burdett Trust for Nursing
Mobile health (mHealth) is a rapidly growing area with patients and healthcare professionals using applications (apps) on smartphones to help them manage chronic illness. Dementia is a growing problem...
Technology has been heralded as a potential enabler of communication between individuals and those in their informal or
professional care network. Enabling people to effectively talk about their needs...
Development of a reliable methodology for better risk management of engineered biomaterials in Advanced Therapy Medicinal Products and/or Medical Devices.
BIORIMA stands for Biomaterial Risk Manageme...
07 December 2016
The paper reports some of the findings of Frances Ryan's doctoral research. The full study – due to be completed in spring 2017 – takes into account prior research on the buil...
13 December 2016
Centre for Social Informatics PhD student Iris Buunk has been awarded a John Campbell Trust travel bursary.
Iris will use the bursary to support participation at ...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
Lecturer in Finance
Senior Lecturer T&R
Lecturer in Cybersecurity and Networks; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
0131 455 5047
Thuemmler, C., Alois, P., Jell, T. & Keow Lim, A. (2017). Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In Latifi, S. (Ed.). Information Technology-Next Generation, 811-817. doi:10.1007/978-3-319-54978-1_100. ISBN 978-3-319-54977-4
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...
Hart, E., Sim, K., Gardiner, B., & Kamimura, K. (2017). A Hybrid Method for Feature Construction and Selection to Improve Wind-Damage Prediction in the Forestry Sector. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference, 1121-1128. doi:10.1145/3071178.3071217
Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing r...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017). New Trust Metric for the RPL Routing Protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),doi:10.1109/IACS.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Appleton, L., Duff, A. S., Hall, H., & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference Proceedings
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Legl, C., & Weaver, M. (in press). Guidelines for sustainable-value creation within the context of German automotive industry’s strategic carbon crisis management. In N/A
The continuing debate on the global environmental progress through achievement of smarter clean/green-policies, reasoned with the need for carbon-emissions’ reduction/preventi...
Rutter, M. J., Smith, S. & Binyamin, S. (2017). The students acceptance of learning management systems in Saudi Arabia: a case study of King Abdulaziz University. In INTED2017 Proceedings, 9324-9333. doi:10.21125/inted.2017.2205. ISBN 978-84-617-8491-2
The Technology Acceptance Model (TAM) has become one of the most widely-used models in understanding user acceptance of technologies and has been employed in many empirical st...
De Gruyter, C., Rose, G., Currie, G., & Rye, T. (2017). Travel Plans for New Developments: A Global Review. In Proceedings Transportation Research Board Annual Meeting
Travel plans, also known as Transportation Demand Management (TDM) plans, can be required for new infill and greenfield developments through the land use planning and approval...
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K. & Thuemmler, C. (2016). Health 4.0: The Case of Multiple Sclerosis. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 100-104. doi:10.1109/HealthCom.2016.7749437. ISBN 978-1-5090-3370-6
Multiple sclerosis is a chronic and variable disease in matters of symptoms, clinical course and outcome. The ultimate goal of currently used drugs and therapeutic strategies ...
Forestry Commission Scotland
Applied research and knowledge transfer addressing industry needs – as set out by the SIRT management board. This includes providing information and advice to industry sponsors
Chief Scientists Office
: Anxiety and depression are common after stroke. Mindfulness Based Stress Reduction courses teach people with long-term conditions (LTCs) skills such as meditation to help them self-manage anxiety an...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Production of final version smartphone application and data queries for citizen science research in Brazil to improve mangrove crab fisheries management.
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Scottish Rugby Union
Sports team coaching and support staff face a regular challenge to provide optimal player workloads in order to elicit positive development and performance adaptations, while at the same time minimisi...
Arts & Humanities Research Council
Sustainable landscape management in rural areas requires the creation of opportunities that treat landscapes in the context of their historical, cultural and social factors. The growing popularity of ...
Skills Development Scotland
Graduate Apprenticeships (GAs) are undergraduate degrees in which the students are in full-time employment, studying on campus one day per week. In September 2017, Edinburgh Napier’s first cohort of a...
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
This project aims to develop an e-policy platform augmented with a toolbox of applications and online services, which will assist national and regional authorities in the EU in elaborating or revising...
Scottish Institute for Policing Research
The project seeks to establish baseline criteria that could be used to appraise the custody dimension of Police Scotland’s activities. It comes at a time when Police Scotland are considering an intern...
Scottish Funding Council
The UCORS system outline and elementary functional developments are complete. However, the product requires some focused knowledge capture to ensure the application and service integrate fully with cl...
The aim of the study is to ...
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems an...
Developmental Dysplasia of the Hip (DDH) is a common walking disability in childhoo...
Although previous research has widely acknowledg...
The developed economies are now considered to be entering the growth phase of
knowledge-based economic activity. Th...
Mobile ad-hoc networking (MANET) technology has been a major avenue for many wireless and mobile networke...
The United Kingdom Higher Education sector is undergoing a prolonged period of turbulence in its external environment...
This thesis sets out a journey which culminates in the development of an analytical framework, the "Organisational C...
Traffic congestion today is a major problem in almost all of the metropolitan areas of
the world. ...
This thesis describes the development of the HI-risk method to assess socio-tec...
13 March 2017
Professor Hazel Hall is visiting the University of São Paulo, Brazil in the week beginning 13th March 2017 as a guest of of the Departamento de Engenharia de Produção da Polit...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
26 November 2017
For further information please see: https://hazelhall.org/2017/11/30/exploring-data-and-information-management-in-archaeology/
30 June 2016
The Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) have published a series of 24 fact sheets on the demogr...
08 September 2017
Centre for Social Informatics PhD student Iris Buunk presented a co-authored paper ‘Skills in sight: how social media affordances increase network awareness’ at the 18th Europ...
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
21 April 2016
Announcement of resultsEmerald and the Indian Academy of Management (IAM) are delighted to offer a research grant for an Indian project in the field of management research.
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
06 April 2016
06 April 2016
Academics and the imposter phenomenon: What is it and how do you address it?
Dr. Holly M. Hutchins, University of Houston
Imposter syndrome was first coi...
02 June 2016
02 June 2016
Frances Ryan is at Dartington Hall in Totnes, Devon, today as an invited speaker at Cilip’s 5th annual Discover Academic Research, Training, and Support (DARTS) conference.