Factors, frameworks and theory: a review of the information systems literature on success factors in project management
Journal Article
Irvine, R., & Hall, H. (2015)
Factors, frameworks and theory: a review of the information systems literature on success factors in project management. Information Research, 20(3),
INTRODUCTION We provide a critical evaluation of the literature on success factors in information systems projects, with a particular focus on organisational information syste...
Enhancing the impact of LIS research projects
Report
Cruickshank, P., Hall, H., & Taylor-Smith, E. (2011)
Enhancing the impact of LIS research projects. Edinburgh: Research Information Network
This report covers extent to which funded research projects in the domain of library and information science (LIS) influence practice in the UK. It focuses particularly on ide...
The census as an information source in public policy-making
Journal Article
Killick, L., Hall, H., Duff, A. S., & Deakin, M. (2016)
The census as an information source in public policy-making. Journal of Information Science, 42(3), 386-395. https://doi.org/10.1177/0165551516628471
This paper provides an assessment of the value of national population censuses as information sources with specific reference to
UK census data and its use in policy-making. M...
How to Become a Smart City: Learning from Amsterdam
Book Chapter
Mora, L., & Bolici, R. (2017)
How to Become a Smart City: Learning from Amsterdam. In A. Bisello, D. Vettorato, R. Stephens, & P. Elisei (Eds.), Smart and Sustainable Planning for Cities and Regions; Green Energy and Technology, (251-266). Bolzano/Bozen, Italy: BMC. https://doi.org/10.1007/978-3-319-44899-2_15
This exploratory study has been carried out to better understand the development process of strategies that allow large European cities to become smart. This aim is achieved t...
Building identity in online environments: an Information Science perspective
Journal Article
Ryan, F. V. C., Cruickshank, P., Hall, H., & Lawson, A. (2018)
Building identity in online environments: an Information Science perspective. Proceedings of the Association for Information Science and Technology, 54(1), 792-793. https://doi.org/10.1002/pra2.2017.14505401187
The research presented in this poster is concerned with the ways in which people use information to build identities for themselves online with reference to the themes of pers...
GCHQ Cyber Zone at Cheltenham Science Festival (Curator)
Exhibition / Performance
Kerr, G. GCHQ Cyber Zone at Cheltenham Science Festival (Curator)
[https://issuu.com/cheltenhamfestivals/docs/science_festival_2019_brochure]. 4 June 2019 - 9 June 2019. (Unpublished
Step into a fascinating digital world…come into the GCHQ Cyber Zone and see what it’s like to be a code cracker, ethical hacker and cyber security expert. Escape to cyber spac...
Using MAP-Elites to support policy making around Workforce Scheduling and Routing
Journal Article
Urquhart, N., Hart, E., & Hutcheson, W. (2020)
Using MAP-Elites to support policy making around Workforce Scheduling and Routing. Automatisierungstechnik, 68(2), https://doi.org/10.1515/auto-2019-0107
English abstract: Algorithms such as MAP-Elites provide a means of allowing users to explore a solution space by returning an archive of high-performing solutions. Such an arc...
Workplace information literacy: Measures and methodological challenges
Journal Article
Widén, G., Ahmad, F., Nikou, S., Ryan, B., & Cruickshank, P. (2021)
Workplace information literacy: Measures and methodological challenges. Journal of Information Literacy, 15(2), https://doi.org/10.11645/15.2.2812
This paper focuses information literacy (IL) from a methodological perspective, addressing quantitative IL measures, suitable for evaluating the role of IL in supporting work...
Decentralized dynamic understanding of hidden relations in complex networks
Journal Article
Mocanu, D. C., Exarchakos, G., & Liotta, A. (2018)
Decentralized dynamic understanding of hidden relations in complex networks. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-19356-4
Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in s...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...