Skip to main content
    • by 
    • by 
    • by 
    • by 
    • Information Security
    • by 
    • by  and +1
Many citizens rely upon online services, and it is certain that this reliance will increase in the future. However, they frequently lack a solid appreciation of the related safety and security issues, and can be missing out on an... more
    • by 
    • Information Systems
In 2010 Jeff Baker proposed a panel for the 2010 ICIS Conference in St. Louis on the topic ” Technologies that Transform Business and Research: Lessons from the Past as we look into the Future? (Baker  et al., 2011), He invited Frank... more
    • by 
    • by 
    •   4  
      EducationSchoolsTechnology Integration in SchoolsData Privacy
In this paper we explore a methodological innovation in a practitioner based context-data sharing, the integration of data sets from different sources to improve organisational knowledge and strategic decision making. In this case the... more
    • by 
In November 2016, Jeremy Hunt, the UK Health Secretary, gave evidence to the Commons Health Committee’s investigation into suicide prevention, which raised concerns about the impact of technologically facilitated social behaviours on... more
    • by 
    • Sociology
This paper describes an ongoing investigation into the potential impact that the Semantic Web could have on the personal privacy of individuals. The argument presented is that personal privacy should become part of the underlying... more
    • by 
    • Computer Science
I am delighted to have the opportunity to provide a foreword for this new book, that looks at the often complex relationship between enabling children to benefit technology and the Internet whilst at the same time keeping them safe. In... more
    • by 
    • Political Science
Supporters of e-Government believe that this technology will be a panacea for enhancing the engagement and participation of citizens in politics and government. However, there is little empirical support for this assertion. Due to the... more
    • by 
    •   5  
      Computer ScienceSocial ExclusionPublic EngagementModernization theory
During the dot com era the word “personalisation” was a hot buzzword. With the fall of the dot com companies the topic has lost momentum. As the killer application for UMTS has yet to be identified, the concept of... more
    • by 
    •   7  
      Computer SciencePersonalizationWorld Wide WebInformation Service
The World Wide Web has experienced explosive growth as a content delivery mechanism, delivering hypertext files and static media content in a standardised way. However, this content has been unable to interact with other content, making... more
    • by 
    •   12  
      Computer ScienceDistributed ComputingContent AnalysisDistributed System
Today's software units (classes, components and services) require large amounts of information during their development and use that can be documented for future reference, like documentation, multimedia files, specification, and models.... more
    • by 
    •   2  
      Computer ScienceSoftware Engineering
Given that minors who generate and share sexual images of themselves are frequently blamed when images are spread further, terms such as 'youth-produced' and 'self-generated' do little to move the focus of responsibility away from the... more
    • by 
    •   2  
      PsychologyBlame
This book considers the rapidly evolving, both legally and socially, nature of image-based abuse for both minors and adults. Drawing mainly from UK data, legislation and case studies, the book presents a thesis that the law is, at best,... more
    • by 
    •   2  
      SociologyRoutledge
Jisc Business and Community Engagement Programme, "Embedding impact analysis in research using BCE practitioners".
    • by 
    •   6  
      EngineeringComputer ScienceResearch SupportDigital Technologies