Skip to main content

Research Repository

Advanced Search

Finding the hidden gems: recommending untagged music. (2011)
Conference Proceeding
HORSBURGH, B., CRAW, S., MASSIE, S. and BOSWELL, R. 2011. Finding the hidden gems: recommending untagged music. In Proceedings of the 22nd International joint conference on artificial intelligence (IJCAI-11), 16-22 July 2011, Barcelona, Spain. Palo Alto: AAAI Press [online], pages 2256-2261. Available from: https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-376

We have developed a novel hybrid representation for Music Information Retrieval. Our representation is built by incorporating audio content into the tag space in a tag-track matrix, and then learning hybrid concepts using latent semantic analysis. We... Read More about Finding the hidden gems: recommending untagged music..

Machine learning for improved pathological staging of prostate cancer: a performance comparison on a range of classifiers. (2011)
Journal Article
REGNIER-COUDERT, O., MCCALL, J., LOTHIAN, R., LAM, T., MCCLINTON, S. and N'DOW, J. 2012. Machine learning for improved pathological staging of prostate cancer: a performance comparison on a range of classifiers. Artificial intelligence in medicine [online], 55(1), pages 25-35. Available from: https://doi.org/10.1016/j.artmed.2011.11.003

Objectives: Prediction of prostate cancer pathological stage is an essential step in a patient's pathway. It determines the treatment that will be applied further. In current practice, urologists use the pathological stage predictions provided in Par... Read More about Machine learning for improved pathological staging of prostate cancer: a performance comparison on a range of classifiers..

Here's Johnny: a methodology for developing attacker personas. (2011)
Conference Proceeding
ATZENI, A., CAMERONI, C., FAILY, S., LYLE, J. and FLÉCHAIS, I. 2011. Here's Johnny: a methodology for developing attacker personas. In Proceedings of the 6th International conference on availability, reliability and security (ARES 2011), 22-26 Aug 2011, Vienna, Austria. Los Alamitos: IEEE Computer Society [online], pages 722-727. Available from: https://doi.org/10.1109/ARES.2011.115

The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona developm... Read More about Here's Johnny: a methodology for developing attacker personas..

User-centered information security policy development in a post-Stuxnet world. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. User-centered information security policy development in a post-Stuxnet world. In Proceedings of the 5th International workshop on secure software engineering (SecSE 2011), part of the 6th International conference on availability, reliability and security (ARES 2011), 22-26 Aug 2011, Vienna, Austria. Los Alamitos: IEEE Computer Society [online], pages 716-721. Available from: https://doi.org/10.1109/ARES.2011.111

A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements Engineering methods can facilitate such an approach, but these tend to focus on either security at the expense... Read More about User-centered information security policy development in a post-Stuxnet world..

Eliciting policy requirements for critical national infrastructure using the IRIS framework. (2011)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2011. Eliciting policy requirements for critical national infrastructure using the IRIS framework. International journal of secure software engineering [online], 2(4), pages 1-18. Available from: https://doi.org/10.4018/jsse.2011100101

Despite existing work on dealing with security and usability concerns during the early stages of design, there has been little work on synthesising the contributions of these fields into processes for specifying and designing systems. Without a bette... Read More about Eliciting policy requirements for critical national infrastructure using the IRIS framework..

Related scientific information: a study on user-defined relevance. (2011)
Thesis
BERESI, U.C. 2011. Related scientific information: a study on user-defined relevance. Robert Gordon University, PhD thesis.

This dissertation presents an investigation into the manifestations of relevance observed in the context of related scientific information. The main motivation is to observe if researchers, in the context of knowledge discovery, use different criteri... Read More about Related scientific information: a study on user-defined relevance..

Artificial reaction networks. (2011)
Presentation / Conference
GERRARD, C.E., MCCALL, J., COGHILL, G.M. and MACLEOD, C. 2011. Artificial reaction networks. Presented at the 11th UK workshop on computational intelligence (UKCI 2011), 7-9 September 2011, Manchester, UK.

In this paper we present a novel method of simulating cellular intelligence, the Artificial Reaction Network (ARN). The ARN can be described as a modular S-System, with some properties in common with other Systems Biology and AI techniques, including... Read More about Artificial reaction networks..

Changing computing curricula in African universities: evaluating progress and challenges via design-reality gap analysis. (2011)
Journal Article
BASS, J.M. and HEEKS, R. 2011. Changing computing curricula in African universities: evaluating progress and challenges via design-reality gap analysis. Electronic journal of information systems in developing countries [online], 48(1), article 5. Available from: https://doi.org/10.1002/j.1681-4835.2011.tb00341.x

Information and communication technologies (ICTs) are diffusing rapidly into all African nations. Effective use of the new technology requires a step-change in local skill levels; including a step-change in ICT-related university education. Part of t... Read More about Changing computing curricula in African universities: evaluating progress and challenges via design-reality gap analysis..

Eliciting usable security requirements with misusability cases. (2011)
Presentation / Conference
FAILY, S. and FLÉCHAIS, I. 2011. Eliciting usable security requirements with misusability cases. Presented at the 19th IEEE international requirements engineering conference (RE 2011), 29 August - 2 September 2011, Trento, Italy.

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly descr... Read More about Eliciting usable security requirements with misusability cases..

Bridging user-centered design and requirements engineering with GRL and persona cases. (2011)
Conference Proceeding
FAILY, S. 2011. Bridging user-centered design and requirements engineering with GRL and persona cases. In Castro, J., Franch, X., Mylopoulos, J. and Yu, E. (eds.) Proceedings of the 5th International i* workshop (iStar 2011), 28-29 August 2011, Trento, Italy. CEUR workshop proceedings, 766. Aachen: CEUR-WS [online], pages 114-119. Available from: http://ceur-ws.org/Vol-766/paper20.pdf

Despite the large body of i* research, there has been comparatively little work on how goal-modelling techniques can help identify usability concerns. Recent work has considered how goal models might better integrate with User-Centered Design. This p... Read More about Bridging user-centered design and requirements engineering with GRL and persona cases..

Automatically structuring domain knowledge from text: an overview of current research. (2011)
Journal Article
CLARK, M., KIM, Y., KRUSCHWITZ, U., SONG, D., ALBAKOUR, D., DIGNUM, S., BERESI, U. C., FASLI, M. and DE ROECK, A. 2012. Automatically structuring domain knowledge from text: an overview of current research. Information processing and management [online], 48(3), pages 552-568. Available from: https://doi.org/10.1016/j.ipm.2011.07.002

This paper presents an overview of automatic methods for building domain knowledge structures (domain models) from text collections. Applications of domain models have a long history within knowledge engineering and artificial intelligence. In the la... Read More about Automatically structuring domain knowledge from text: an overview of current research..

Plan recommendation for well engineering. (2011)
Conference Proceeding
THOMSON, R., MASSIE, S., CRAW, S., AHRIZ, H. and MILLS, I. 2011. Plan recommendation for well engineering. In Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K. and Ali, M. (eds.) Modern approaches in applied intelligence: proceedings of the 24th International conference on industrial, engineering and other applications of applied intelligent systems (IEA/AIE 2011), 28 June - 1 July 2011, Syracuse, USA. Lecture notes in computer science, 6704. Berlin: Springer [online], part II, pages 436-445. Available from: https://doi.org/10.1007/978-3-642-21827-9_45

Good project planning provides the basis for successful offshore well drilling projects. In this domain, planning occurs in two phases: an onshore phase develops a project plan; and an offshore phase implements the plan and tracks progress. The Perfo... Read More about Plan recommendation for well engineering..

Motivating all our students? (2011)
Conference Proceeding
BOUVIER, D., CARTER, J., CARDELL-OLIVER, R., HAMILTON, M., KURKOVSKY, S., MARKHAM, S., MCCLUNG, O.W., MCDERMOTT, R., RIEDESEL, C., SHI, J. and WHITE, S. 2011. Motivating all our students? In Proceedings of the 16th Innovation and technology in computer science education annual conference: working group reports (ITiCSE-WGR '11), 27-29 June 2011, Darmstadt, Germany. New York: ACM [online], pages 1-18. Available from: https://doi.org/10.1145/2078856.2078858

Academics expend a large amount of time and effort to sustain and enhance the motivation of undergraduate students. Typically based on a desire to ensure that all students achieve their full potential, approaches are based on an understanding that st... Read More about Motivating all our students?.

Do we know each other or is it just our devices? A federated context model for describing social activity across devices. (2011)
Presentation / Conference
GIONIS, G., DESRUELLE, H., BLOMME, D., LYLE, J., FAILY, S. and BASSBOUSS, L. 2011. Do we know each other or is it just our devices? A federated context model for describing social activity across devices. Presented at the Federated social web Europe conference, 3-5 June 2011, Berlin, Germany.

The availability of connected devices is rapidly growing. In our everyday life, we already use a multitude of personal devices that are connected to the Internet. The number of shipped smart-phones at the end of 2010 even surpassed the traditional co... Read More about Do we know each other or is it just our devices? A federated context model for describing social activity across devices..

Persona cases: a technique for grounding personas. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. Persona cases: a technique for grounding personas. In Proceedings of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-12 May 2011, Vancouver, Canada. New York: ACM [online], pages 2267-2270. Available from: https://doi.org/10.1145/1978942.1979274

Personas are a popular technique in User-Centered Design, however their validity can be called into question. While the techniques used to developed personas and their integration with other design activities provide some measure of validity, a perso... Read More about Persona cases: a technique for grounding personas..

Security goes to ground: on the applicability of security entrepreneurship to grassroot activism. (2011)
Presentation / Conference
FAILY, S. 2011. Security goes to ground: on the applicability of security entrepreneurship to grassroot activism. Presented at the Workshop on HCI, politics and the city, part of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-8 May 2011, Vancouver, Canada.

Designing security for grassroot movements raises several challenges not particular to the organisations that are catered to by conventional approaches to security design. Drawing on analogies between Social Entrepreneurship and Grassroot Activism, a... Read More about Security goes to ground: on the applicability of security entrepreneurship to grassroot activism..

Two requirements for usable and secure software engineering. (2011)
Presentation / Conference
FAILY, S. 2011. Two requirements for usable and secure software engineering. Presented at the 1st Software and usable security aligned for good engineering workshop (SAUSAGE 2011), 5-6 April 2011, Gaithersburg, USA.

Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how developers might build such systems. Based on recent research, we believe evidence exists that blending techniques from Security, Usability, and Software... Read More about Two requirements for usable and secure software engineering..

Seeking the philosopher's stone. (2011)
Journal Article
FLÉCHAIS, I. and FAILY, S. 2011. Seeking the philosopher's stone. Interfaces: the quarterly magazine of BCS Interaction Group [online], 86, pages 14-15. Available from: https://www.bcs.org/media/5326/interfaces86-spring2011.pdf

This article describes the unique challenges facing usable security research and design, and introduces three proposals for addressing these. For all intents and purposes, security design is currently a craft, where quality is dependent on individual... Read More about Seeking the philosopher's stone..

Situation awareness in context-aware case-based decision support. (2011)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2011. Situation awareness in context-aware case-based decision support. In Proceedings of the 2011 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2011), 22-24 February 2011, Miami, USA. New York: IEEE [online], article number 5753761, pages 9-16. Available from: https://doi.org/10.1109/COGSIMA.2011.5753761

Humans naturally reuse recalled knowledge to solve problems and this includes understanding the context i.e. the information that identifies or characterizes these problems. For problems in complex and dynamic environments, providing effective soluti... Read More about Situation awareness in context-aware case-based decision support..