Skip to main content

Research Repository

Advanced Search

All Outputs (34)

Ethical dilemmas and dimensions in penetration testing. (2015)
Conference Proceeding
FAILY, S., MCALANEY, J. and IACOB, C. 2015. Ethical dilemmas and dimensions in penetration testing. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 233-242.

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the eth... Read More about Ethical dilemmas and dimensions in penetration testing..

Digital rights management: the four perspectives of developers, distributors, users and lawyers. (2015)
Conference Proceeding
MCDONALD, N., FAILY, S., FAVALE, M. and GATZIDIS, C. 2015. Digital rights management: the four perspectives of developers, distributors, users and lawyers. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 276-285.

Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights m... Read More about Digital rights management: the four perspectives of developers, distributors, users and lawyers..

Usability and security by design: a case study in research and development. (2015)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I. and SIMPSON, A. 2015. Usability and security by design: a case study in research and development. In Proceedings of the 2015 Workshop on useable security (USEC 2015), co-located with the 2015 Network and distributed system security symposium (NDSS 2015), 8 February 2015, San Diego, USA. Reston: Internet Society [online]. Available from: https://doi.org/10.14722/usec.2015.23012

There is ongoing interest in utilising user experiences associated with security and privacy to better inform system design and development. However, there are few studies demonstrating how, together, security and usability design techniques can help... Read More about Usability and security by design: a case study in research and development..

Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). (2015)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). In Proceedings of the 2015 International Information Society conference 2015 (i-Society 2015), 9-11 November 2015, London, UK. Piscataway: IEEE [online], pages 59-66. Available from: https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS)..

Using gamification to incentivize sustainable urban mobility. (2015)
Conference Proceeding
KAZHAMIAKIN, R., MARCONI, A., PERILLO, M., PISTORE, M., VALETTO, G., PIRAS, L., AVESANI, F. and PERRI, N. 2015. Using gamification to incentivize sustainable urban mobility. In Proceedings of 1st Institute of Electrical and Electronics Engineers (IEEE) International smart cities conference 2015 (ISC2-2015), 25-28 October 2015, Guadalajara, Mexico. Piscataway: IEEE [online], article ID 7366196. Available from: https://doi.org/10.1109/ISC2.2015.7366196

Sustainable urban mobility is an important dimension in a Smart City, and one of the key issues for city sustainability. However, innovative and often costly mobility policies and solutions introduced by cities are liable to fail, if not combined wit... Read More about Using gamification to incentivize sustainable urban mobility..

Mitigating circumstances in cybercrime: a position paper. (2015)
Conference Proceeding
ALI, R., MCALANEY, J., FAILY, S., PHALP, K. and KATOS, V. 2015. Mitigating circumstances in cybercrime: a position paper. In Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S., Liu, L. and Agüero Calvo, R. (eds.) CIT/IUCC/DASC/PICom 2015: proceedings of the 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on computer and information technology (CIT 2015), the 14th IEEE international conference on ubiquitous computing and communications (IUCC 2015), and the 13th IEEE international conference on pervasive intelligence and computing (PICom 2015), 26-28 October 2015, Liverpool, UK. Los Alamitos: IEEE Computer Society [online], pages 1972-1976. Available from: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292

This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cybers... Read More about Mitigating circumstances in cybercrime: a position paper..

ClusterNN: a hybrid classification approach to mobile activity recognition. (2015)
Conference Proceeding
BASHIR, S., DOOLAN, D. and PETROVSKI, A. 2015. ClusterNN: a hybrid classification approach to mobile activity recognition. In Chen, L.L., Steinbauer, M., Khalil, I. and Anderst-Kotsis, G. (eds.) Proceedings of the 13th International advances in mobile computing and multimedia conference (MoMM 2015), 11-13 December 2015, Brussels, Belguim. New York: ACM [online], pages 263-267. Available from: https://doi.org/10.1145/2837126.2837140

Mobile activity recognition from sensor data is based on supervised learning algorithms. Many algorithms have been proposed for this task. One of such algorithms is the K-nearest neighbour (KNN) algorithm. However, since KNN is an instance based algo... Read More about ClusterNN: a hybrid classification approach to mobile activity recognition..

Music recommendation: audio neighbourhoods to discover music in the long tail. (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommendation: audio neighbourhoods to discover music in the long tail. In Hüllermeier, E. and Minor, M. (eds.) Proceedings of the 23rd international conference on case-based reasoning research and development (ICCBR 2015), 28-30 September 2015, Frankfurt am Main, Germany. Lecture notes in computer science, 9343. Cham: Springer [online], pages 73-87. Available from: https://doi.org/10.1007/978-3-319-24586-7_6

Millions of people use online music services every day and recommender systems are essential to browse these music collections. Users are looking for high quality recommendations, but also want to discover tracks and artists that they do not already... Read More about Music recommendation: audio neighbourhoods to discover music in the long tail..

Insourcing a government information system an analysis using institutions and the capability approach. (2015)
Conference Proceeding
OMAR, A., BASS, J.M. and LOWIT, P. 2015. Insourcing a government information system an analysis using institutions and the capability approach. In Proceedings of the 2015 International conference on information society (i-Society 2015), 9-11 November 2015, London, UK. PiscatawayJ: IEEE [online], pages 91-96. Available from: https://doi.org/10.1109/i-Society.2015.7366866

This study explores the effectiveness of insourcing in the Malaysian Government. The research discusses the factors and issues of insourcing in a Malaysian government agency in the context of post contract termination of an outsourcing agreement. A q... Read More about Insourcing a government information system an analysis using institutions and the capability approach..

Online news videos: the UX of subtitle position. (2015)
Conference Proceeding
CRABB, M., JONES, R., ARMSTRONG, M. and HUGHES, C.J. 2015. Online news videos: the UX of subtitle position. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 215-222. Available from: http://doi.acm.org/10.1145/2700648.2809866

Millions of people rely on subtitles when watching video content. The current change in media viewing behaviour involving computers has resulted in a large proportion of people turning to online sources as opposed to regular television for news infor... Read More about Online news videos: the UX of subtitle position..

The development of a framework for understanding the UX of subtitles. (2015)
Conference Proceeding
CRABB, M., JONES, R. and ARMSTRONG, M. 2015. The development of a framework for understanding the UX of subtitles. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 347-348. Available from: http://doi.acm.org/10.1145/2700648.2811372

Approximately 10% of the television audience use subtitles (captioning) to support their viewing experience. Subtitles enable viewers to participate in an experience that is often taken for granted by the general audience. However, when reviewing sub... Read More about The development of a framework for understanding the UX of subtitles..

The transport disruption ontology. (2015)
Conference Proceeding
CORSAR, D., MARKOVIC, M., EDWARDS, P. and NELSON, J.D. 2015. The transport disruption ontology. In Arenas, M., Corcho, O., Simperl, E., Strohmaier, M., d'Aquin, M., Srinivas, K., Groth, P., Dumontier, M., Heflin, J., Thirunarayan, K. and Staab, S. (eds.). The sematic web - ISWC 2015: proceedings of the 14th International semantic web conference 2015 (ISWC 2015), 11-15 October 2015, Bethleham, PA, USA, 9367. Lecture notes in computer science. Cham: Springer [online], pages 329-336. Available from: https://doi.org/10.1007/978-3-319-25010-6_22

This paper presents the Transport Disruption ontology, a formal framework for modelling travel and transport related events that have a disruptive impact on traveller's journeys. We discuss related models , describe how transport events and their imp... Read More about The transport disruption ontology..

Competencies for paradigm shift 'survival'. (2015)
Conference Proceeding
DANIELS, M., CAJANDER, A., ECKERDAL, A., LIND, M., NYLEN, A., CLEAR, T. and MCDERMOTT, R. 2015. Competencies for paradigm shift 'survival'. In Proceedings of the 2015 Frontiers in education conference (FIE 2015): launching a new vision in engineering education, 21-24 October 2015, El Paso, USA. New York: IEEE [online], article number 7344255. Available from: https://doi.org/10.1109/FIE.2015.7344255

The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements being made to theoretical under... Read More about Competencies for paradigm shift 'survival'..

A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research. (2015)
Conference Proceeding
MCDERMOTT, R., DANIELS, M., CAJANDER, A., BASS, J. and LALCHANDANI, J.P. 2015. A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research. In Proceedings of the 2015 Frontiers in education conference (FIE 2015): launching a new vision in engineering education, 21-24 October 2015, El Paso, USA. New York: IEEE [online], article number 7344344. Available from: https://doi.org/10.1109/FIE.2015.7344344

Globally distributed group projects are becoming an attractive and increasingly common feature in computer science education. They provide opportunities for students to engage in activities that enhance both their technical skills and wider professio... Read More about A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research..

Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. (2015)
Conference Proceeding
OCHEI, L.C., BASS, J.M. and PETROVSKI, A. 2015. Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. In Proceedings of the 2015 International conference on cloud and autonomic computing (ICCAC 2015), 21-25 September 2015, Boston, USA. Piscataway: IEEE [online], pages 101-112. Available from: https://doi.org/10.1109/ICCAC.2015.17

Multitenancy is an essential cloud computing property where a single instance of an application serves multiple tenants. Multitenancy introduces significant challenges when deploying application components to the cloud due to the demand for different... Read More about Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools..

Understanding the diverse needs of subtitle users in a rapidly evolving media landscape. (2015)
Conference Proceeding
ARMSTRONG, M., BROWN, A., CRABB, M., HUGHES, C.J., JONES, R. and SANDFORD, J. 2015. Understanding the diverse needs of subtitle users in a rapidly evolving media landscape. In Proceedings of the 2015 International broadcasting convention (IBC) (IBC 2015), 10-14 September 2015, Amsterdam, Netherlands. Stevenage: IET [online]. Available from: https://doi.org/10.1049/ibc.2015.0032

Audiences are increasingly using services such as video on demand and the web to watch television programmes. Broadcasters need to make subtitles available across all these new platforms. These platforms also create new design opportunities for subti... Read More about Understanding the diverse needs of subtitle users in a rapidly evolving media landscape..

Designing a context-aware cyber physical system for detecting security threats in motor vehicles. (2015)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKI, S. 2015. Designing a context-aware cyber physical system for detecting security threats in motor vehicles. In Proceedings of the 8th International conference on security of information and networks (SIN'15), 8-10 September 2015, Sochi, Russia. New York: ACM [online], pages 267-270. Available from: https://doi.org/10.1145/2799979.2800029

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed in the paper and is applied within the context of providing data availability by monitoring electromagnetic interference. The ad... Read More about Designing a context-aware cyber physical system for detecting security threats in motor vehicles..

Music recommenders: user evaluation without real users? (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommenders: user evaluation without real users? In Yang, Q. and Woolridge, M. (eds.) Proceedings of the 24th International joint conference on artificial intelligence (IJCAI-15), 25-31 July 2015, Buenos Aires, Argentina. Palo Alto: AAAI Press [online], pages 1749-1755. Available from: https://www.ijcai.org/Proceedings/15/Papers/249.pdf

Good music recommenders should not only suggest quality recommendations, but should also allow users to discover new/niche music. User studies capture explicit feedback on recommendation quality and novelty, but can be expensive, and may have difficu... Read More about Music recommenders: user evaluation without real users?.

Analysing creative image search information needs. (2015)
Conference Proceeding
GOKER, A., KONKOVA, E., MACFARLANE, A. 2015. Analysing creative image search information needs. In Proceedings of the 2015 ISKO UK biennial conference: knowledge organization - making a difference, 13-14 July 2015, London, UK. London: ISKO [online]. Available from: http://www.iskouk.org/content/analysing-creative-image-search-information-needs

Creative professionals in advertising, marketing, design and journalism search for images to visually represent a concept for their project. The main purpose of this paper is to present an analysis of documents known as briefs to find search facets,... Read More about Analysing creative image search information needs..

Virtual teams and employability in global software engineering education. (2015)
Conference Proceeding
BASS, J.M., MCDERMOTT, R. and LALCHANDANI, J.T. 2015. Virtual teams and employability in global software engineering education. In Proceedings of the 10th IEEE international conference on global software engineering (ICGSE 2015), 13-16 July 2015, Ciudad Real, Spain. Piscataway: IEEE [online], article number 7224489, pages 115-124. Available from: https://doi.org/10.1109/ICGSE.2015.21

Universities face many challenges when creating opportunities for student experiences of global software engineering. We provide a model for introducing global software engineering into the computing curriculum. Our model is based on a three year col... Read More about Virtual teams and employability in global software engineering education..