15 results

GDPR and Cyber Security for Business Information Systems

Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018)
GDPR and Cyber Security for Business Information Systems. River Publishers
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundame...

Cryptography

Book
Buchanan, B. (2017)
Cryptography. River Publishers
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it ...

Requirements Engineering for Digital Health

Book
Fricker, S. A., Thuemmler, C., & Gavras, A. (2015)
Requirements Engineering for Digital Health. Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-09798-5
Healthcare and well-being have captured the attention of established software companies, start-ups, and investors. Software is starting to play a central role for addressing t...

Conducting Performance Evaluation of an e-Health Platform

Book
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Conducting Performance Evaluation of an e-Health Platform. In T. Issa, P. Isaías, & P. Kommers (Eds.), Advances in Business Information Systems and Analytics; Information Systems and Technology for Organizations in a Networked Society, 295-315. IGI Global Publishing. doi:10.4018/978-1-4666-4062-7.ch016
For increased awareness and adoption of e-Health implementations, results from evaluation must be catered towards three primary perspectives: organizational, end-user and tech...

SQL Hacks. Tips and tools for digging into your data.

Book
Cumming, A., & Russell, G. (2007)
SQL Hacks. Tips and tools for digging into your data. O'Reilly
...SQL Hacks reveals the secrets that database experts use to dig through their data and get the answers they need. It includes 100 hacks for sorting, sifting, shuffling, and ...

Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods.

Book
Imaz, M., & Benyon, D. (2007)
Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods. MIT Press
This work talks about how recent research in cognitive science offers new ways to understand the interaction of people and computers and develops a new literacy for well-infor...

An overview of artificial immune systems.

Book
Timmis, J., Knight, T., de Castro, L., & Hart, E. (2004)
An overview of artificial immune systems. In R. Paton, H. Bolouri, W. M. L. Holcombe, J. H. Parish, & R. Tateson (Eds.), Computation in Cells and Tissues: Perspectives and Tools of Thought, 51-86. Springer-Verlag
The immune system is highly distributed, highly adaptive, self-organising in nature, maintains a memory of past encounters and has the ability to continually learn about new e...

Measuring pedestrian trajectories using a pyroelectric differential infrared detector.

Book
Armitage, A., Binnie, D., Kerridge, J., & Lei, L. (2003)
Measuring pedestrian trajectories using a pyroelectric differential infrared detector. In S. J. Proser, & E. Lewis (Eds.), Sensors and their Applications XII, 143-149. Institute of Physics Publishing

Reverse engineering.

Book
Chu, W., Lu, C., Chang, C., Liu, X., & Yang, H. (2001)
Reverse engineering. In S. K. Chang (Ed.), Handbook of Software Engineering & Knowledge Engineering, 447-466. World Scientific
Software systems have become business-critical for many companies. These systems are usually large and complex. Some have evolved over decades and therefore are known as legac...

Caught between real and virtual worlds.

Book
Turner, P., & Turner, S. (2000)
Caught between real and virtual worlds. In J. Bawa, P. Dorazio, & L. Trenner (Eds.), The Usability Business: Making the Web Work, 60-70. Springer-Verlag
This chapter describes how we, as HCI practitioners, contributed to the design of a collaborative virtual environment-based simulator. This simulator is to be used by senior m...