Skip to main content

Research Repository

Advanced Search

All Outputs (31)

Persona-driven information security awareness. (2016)
Conference Proceeding
KI-ARIES, D., FAILY, S. and BECKERS, K. 2016. Persona-driven information security awareness. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 97. Available from: https://doi.org/10.14236/ewic/HCI2016.97

Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for ident... Read More about Persona-driven information security awareness..

Improving human-reviews interaction: a study of the role, use and place of online reviews. (2016)
Conference Proceeding
IACOB, C. and FAILY, S. 2016. Improving human-reviews interaction: a study of the role, use and place of online reviews. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 21. Available from: https://doi.org/10.14236/ewic/HCI2016.21

The use and benefits of online reviews are undeniable, yet the interaction means available for buyers when consulting reviews remain limited. This study aims to provide a better understanding of the role and use of online reviews, presenting a set of... Read More about Improving human-reviews interaction: a study of the role, use and place of online reviews..

Human-centered specification exemplars for critical infrastructure environments. (2016)
Conference Proceeding
FAILY, S., LYKOU, G., PARTRIDGE, A., GRITZALIS, D., MYLONAS, A. and KATOS, V. 2016. Human-centered specification exemplars for critical infrastructure environments. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 93. Available from: https://doi.org/10.14236/ewic/HCI2016.93

Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities... Read More about Human-centered specification exemplars for critical infrastructure environments..

Ethical hazards and safeguards in penetration testing. (2016)
Conference Proceeding
FAILY, S., IACOB, C. and FIELD, S. 2016. Ethical hazards and safeguards in penetration testing. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 83. Available from: https://doi.org/10.14236/ewic/HCI2016.83

Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their process... Read More about Ethical hazards and safeguards in penetration testing..

BPGA-EDA for the multi-mode resource constrained project scheduling problem. (2016)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2016. BPGA-EDA for the multi-mode resource constrained project scheduling problem. In Proceedings of the 2016 IEEE congress on evolutionary computation (CEC 2016), 24-29 July 2016, Vancouver, Canada. Piscataway, NJ: IEEE [online], article number 7744222, pages 3417-3424. Available from: https://doi.org/10.1109/CEC.2016.7744222

The Multi-mode Resource Constrained Project Scheduling Problem (MRCPSP) has been of research interest for over two decades. The problem is composed of two interacting sub problems: mode assignment and activity scheduling. These problems cannot be sol... Read More about BPGA-EDA for the multi-mode resource constrained project scheduling problem..

Predictive planning with neural networks. (2016)
Conference Proceeding
AINSLIE, R., MCCALL, J., SHAKYA, S. and OWUSU, G. 2016. Predictive planning with neural networks. In Proceedings of the International joint conference on neural networks (IJCNN), 24-29 July 2016, Vancouver, Canada. Piscataway: IEEE [online], pages 2110-2117. Available from: https://doi.org/10.1109/IJCNN.2016.7727460

Critical for successful operations of service industries, such as telecoms, utility companies and logistic companies, is the service chain planning process. This involves optimizing resources against expected demand to maximize the utilization and mi... Read More about Predictive planning with neural networks..

Motivation, optimal experience and flow in first year computing science. (2016)
Conference Proceeding
MCDERMOTT, R., ZARB, M., DANIELS, M., CAJANDER, Å. and CLEAR, T. 2016. Motivation, optimal experience and flow in first year computing science. In Proceedings of the 2016 Association for Computing Machinery (ACM) conference on innovation and technology in computer science education (ITiCSE '16), 9-13 July 2016, Arequipa, Peru. New York: ACM [online], pages 206-211. Available from: https://doi.org/10.1145/2899415.2899474

We examine the concept of motivation from the perspective of Self Determination Theory and give a brief overview of relevant results. We also consider the optimal state known as Flow and give an account of its conceptualisation in the theory due to C... Read More about Motivation, optimal experience and flow in first year computing science..

Student concerns regarding transition into higher education CS. (2016)
Conference Proceeding
SIEGEL, A.A. and ZARB, M. 2016. Student concerns regarding transition into higher education CS. In Proceedings of the 21st Association for Computing Machinery (ACM) Innovation and technology in computer science education 2016 conference (ITiCSE 2016), 11-13 July 2016, Arequipa, Peru. New York: ACM [online], pages 23-28. Available from: https://doi.org/10.1145/2899415.2909581

This paper discusses a study where 249 students from 18 secondary schools around Scotland who were on the verge of applying to study Computing Science at a higher education institution were surveyed on their concerns about the upcoming transition. Pr... Read More about Student concerns regarding transition into higher education CS..

Novice programmers and the problem description effect. (2016)
Conference Proceeding
BOUVIER, D., LOVELLETTE, E., MATTA, J., ALSHAIGY, B., BECKER, B.A., CRAIG, M., JACKOVA, J., MCCARTNEY, R., SANDERS, K. and ZARB, M. 2016. Novice programmers and the problem description effect. In Proceedings of the Innovation and technology in computer science education on working group reports 2016 (ITiCSE-WGR '16), 9-13 July 2016, Arequipa, Peru. New York: ACM [online], pages 103-118. Available from: https://doi.org/10.1145/3024906.3024912

It is often debated whether a problem presented in a straightforward minimalist fashion is better, or worse, for learning than the same problem presented with a real-life or concrete context. The presentation, contextualization, or problem descriptio... Read More about Novice programmers and the problem description effect..

Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. (2016)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2016. Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. In Zhang, J., Miller, J.A. and Xu, X. (eds.) Proceedings of the 13th Institute of Electrical and Electronics Engineers (IEEE) International services computing conference 2016 (SCC 2016), 27 June - 2 July 2016, San Francisco, USA. Piscataway: IEEE [online], pages 379-386. Available from: https://doi.org/10.1109/SCC.2016.56

Implementing the required degree of isolation between tenants is one of the significant challenges for deploying a multitenant application on the cloud. This paper applies COMITRE (Component-based approach to multitenancy isolation through request re... Read More about Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system..

Water, water, every where: nuances for a water industry critical infrastructure specification exemplar. (2016)
Conference Proceeding
FAILY, S., STERGIOPOULOS, G., KATOS, V. and GRITZALIS, D. 2016. Water, water, every where: nuances for a water industry critical infrastructure specification exemplar. In Rome, E., Theocharidou, M. and Wolthusen, S. (eds.) Critical information infrastructures security: revised selected papers from the proceedings of the 10th International conference on critical information infrastructures security (CRITIS 2015), 5-7 October 2015, Berlin, Germany. Lecture notes in computer science, 9578. Cham: Springer [online], pages 243-246. Available from: https://doi.org/10.1007/978-3-319-33331-1_20

The water infrastructure is critical to human life, but little attention has been paid to the nuances of the water industry. Without such attention, evaluating security innovation in this domain without compromising the productivity goals when delive... Read More about Water, water, every where: nuances for a water industry critical infrastructure specification exemplar..