Inspecting the bad society? Bentham’s panopticon revisited.
Journal Article
Duff, A. (2016)
Inspecting the bad society? Bentham’s panopticon revisited. The Asian Conference on Technology, Information & Society, 13-25
In Panopticon; or, The Inspection-House (2008 [1797]), the utilitarian philosopher Jeremy Bentham outlined what he perceived to be a model prison, based on ‘the inspection-pri...
Sharing capability: the development of a framework to investigate knowledge sharing in distributed organizations
Presentation / Conference
Hall, H. (2002, April)
Sharing capability: the development of a framework to investigate knowledge sharing in distributed organizations. Paper presented at Third European Conference on Organizational Knowledge, Learning and Capabilities, Athens, Greece
No abstract available.
Paper presented in the Academic Track by Hazel Hall,
Cryptography across industry sectors
Journal Article
Buchanan, W. J., Woodward, A., & Helme, S. (2017)
Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221
Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies...
Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic.
Presentation / Conference
Lawson, A., Mikuta, P., & Cruickshank, P. (2013, September)
Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. Poster presented at EUROCALL, University of Évora
This research and development is aimed at learners, tutors and course developers of Scottish Gaelic. The method of teaching Gaelic being used initially with the system is Ùlpa...
Daniel Bell's theory of the information society.
Book
Duff, A. (2009)
Daniel Bell's theory of the information society. In B. Smart (Ed.), Post-Industrial Society, 201-232. Sage
Daniel Bell is recognised to be the foremost writer on the information society. The paper expounds his writings in detail, showing their development from the 1960s to the 1990...
Mastering Global Information Systems.
Book
Buchanan, W. J. (1996)
Mastering Global Information Systems. Macmillan Press
This book provides an excellent foundation in modern information systems and data communications. It has five basic themes:
* Digital Information Sources and Multimedia
* The...
UrbanixD: designing human interactions in the networked city
Conference Proceeding
Smyth, M., Helgason, I., Brynskov, M., Mitrovic, I., & Zaffiro, G. (2013)
UrbanixD: designing human interactions in the networked city. In Proceeding CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13), (2533-2536). https://doi.org/10.1145/2468356.2468823
Interaction Design, in an urban context, is an increasingly important field of research. City populations are currently in a state of rapid flux. Conurbations are fast becomin...
Relationship and role transformations in social media environments.
Journal Article
Hall, H. (2011)
Relationship and role transformations in social media environments. Electronic Library, 29(4), 421-428
Based on a keynote paper presented at Internet Librarian International 2010 this article argues that the way in which librarians conceive a number of relationships – between t...
The Past, Present, and Future of Information Policy: Towards a normative theory of the information society
Journal Article
Duff, A. S. (2004)
The Past, Present, and Future of Information Policy: Towards a normative theory of the information society. Information, Communication and Society, 7(1), 69-87. https://doi.org/10.1080/1369118042000208906
The profile of information policy in academic and policy-making circles has been rising in recent decades, a function, presumably, of the expansion of an 'information society'...
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...