HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society
Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...
Novel Hyper-heuristics Applied to the Domain of Bin Packing
Thesis
Sim, K. Novel Hyper-heuristics Applied to the Domain of Bin Packing. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7563
Principal to the ideology behind hyper-heuristic research is the desire to increase the level of generality of heuristic procedures so that they can be easily applied to a wid...
Implementation and evaluation of a botnet analysis and detection method in a virtual environment
Thesis
Waheed, S. (2012)
Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667
Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a...
Data quality and data cleaning in database applications
Thesis
Li, L. Data quality and data cleaning in database applications. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5788
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems and customer relationship manage...
A holistic semantic based approach to component specification and retrieval
Thesis
Li, C. A holistic semantic based approach to component specification and retrieval. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5677
Component-Based Development (CBD) has been broadly used in software development as it enhances the productivity and reduces the costs and risks involved in systems development...
An Investigation into Visual Graph Comparison
Thesis
Melville, A. G. An Investigation into Visual Graph Comparison. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7560
Information Visualisation is extensively used in single graph analysis. However, relatively little work has been done in the field of graph comparison. This work examines and ...
Wild networks: the articulation of feedback and evaluation in a creative inter-disciplinary design studio
Thesis
Joel, S. Wild networks: the articulation of feedback and evaluation in a creative inter-disciplinary design studio. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4578
It is argued that design exists within a collective social network of negotiation, feedback sharing and reflection that is integral to the design process. To encourage this, r...
An evaluation of the power consumption and carbon footprint of a cloud infrastructure
Thesis
Yampolsky, V. (2010)
An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3973
The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) ...
Forensic verification of operating system activity via novel data, acquisition and analysis techniques
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6699
Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific dis...
An integrated firewall policy validation tool
Thesis
Macfarlane, R. (2009)
An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3971
Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manual...