Buchanan, W. J. (2011, January). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University
Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learni...
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...
Buchanan, B., & Naqvi, N. (2018). Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Buchanan, W. J., Woodward, A., & Helme, S. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221
Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies...
Buchanan, W. J. (1999). Distributed systems and networks. McGraw-Hill
This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distrib...
Buchanan, W. J. (1996). Mastering Global Information Systems. Macmillan Press
This book provides an excellent foundation in modern information systems and data communications. It has five basic themes:
* Digital Information Sources and Multimedia
Buchanan, W. J. (1996). Wiedziec wiecej Internet. Wkt (Poland)
Ksi??ka ta m. In. Uczy jak korzysta? z internetu i sieci www.Opisuje bowiem techniczne aspekty tej ?wiatowej sieci informacyjnej. Dlatego te? mo?e by? wykorzystywana przez wsz...
Buchanan, W. J. (1995). Applied data communications and networks. Springer
This book covers all the key areas of data communications technology including networking and communication systems, signal analysis and transmission systems. It approaches th...
Migas, N., Anastasiadou, C. & Buchanan, W. J. (2006). Mass customisation through personalised brochures: the role of digital printing. Information Systems. ISSN 0306-4379
This paper argues that despite the wide adoption of Internet technologies in destination marketing, information is still disseminated through printed brochures that have large...
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018). Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018)https://doi.org/10.14236/ewic/HCI2018.127
Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfu...
Lapok, P., Lawson, A., & Paechter, B. (2018). 2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms. In H. Rodrigues, J. Herskovits, C. Mota Soares, A. Araújo, J. Guedes, J. Folgado, …J. Madeira (Eds.), EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization, 926-937. doi:10.1007/978-3-319-97773-7_80
In this paper, we investigate the ability of genetic representation methods to describe two-dimensional outline shapes, in order to use them in a generative design system. A s...
Smith, S., Taylor-Smith, E., Smith, C., & Varey, A. (2018). From work-integrated learning to learning-integrated work: motivations and apprehensions of Graduate Apprentices. In Proceedings of the 3rdInternational Research Symposium on Cooperative and Work-Integrated Education, Stuttgart, Germany, 199-207
Graduate Apprenticeship (GA) degrees bring new collaborations between universities and employers and new opportunities for apprentices—to gain a university degree, while also ...
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2000). An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001, 247 - 254. doi:10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time ...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...