Date


People

Output Type

Download Available

164 results

Case Study - 2016 Shrekeli : Manipulating Pharmaceuticals

Other
Stevenson, D., Gallagher, J., & Fordyce, E. (2015)
Case Study - 2016 Shrekeli : Manipulating Pharmaceuticals. Edinburgh Napier University
No Abstract available.

US hack shows data is the new frontier in cyber security conflict.

Other
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...

Building Communities and Enhancing Belonging: A Route Map for Assessment Design

Other
Haddow, C., & Brodie, J. (2023)
Building Communities and Enhancing Belonging: A Route Map for Assessment Design. [Assessment guide]
A sense of belonging to a community in HE has been linked to positive outcomes for students such as increased engagement, identity development and retention (Masika & Jones, 2...

Hidden from public view, directors’ pay in Malaysia leads to inefficiency and inequality

Other
Minhat, M., & Dzolkarnaini, N. (2020)
Hidden from public view, directors’ pay in Malaysia leads to inefficiency and inequality. London
Ownership and control of business corporations by state or government is common in Asian economies. Whether this is a better governance practice than the market-based model of...

When the ATM runs Windows, how safe is your money?

Other
Buchanan, W. J. (2014)
When the ATM runs Windows, how safe is your money?
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced...

Rhino horn must become a socially unacceptable product in Asia

Other
Gilchrist, J. (2018)
Rhino horn must become a socially unacceptable product in Asia
No abstract available.

Advanced security and network forensics: obfuscation and data hiding.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION 4.1 Objectives 4.2 Introduction 4.3 Obfuscation using Encryption Private-key data hiding Public-key data hiding Hashing Encoding Ex-OR en...

Personalised TV ads are the future – but is it time to panic?

Other
Blake, J. (2015)
Personalised TV ads are the future – but is it time to panic?
TV Advertising is evolving quickly. This article examines how the popularity of viewing content on mobile platforms is changing the way we advertise. VOD and OTT media servi...

Bad vibrations for cyclists in the city

Other
Taylor, M. & Dalton, A. (2017)
Bad vibrations for cyclists in the city. Scotland on Sunday
Article published on risk of nerve damage associated with poor cycling infrastructure in the City of Edinburgh. Research collaboration with Professor Chris Oliver (Edinburgh ...

Floating Sanctuary

Other
Burton, K. (2017)
Floating Sanctuary
A site-specific work for solo cello written for Edinburgh Doors open Day. The piece is informed by the architectural design of Craigsbank Parish Church and was presented in th...

Date


Date


Date


Date