• Login
    Browsing by Author 
    •   DORA Home
    • Browsing by Author
    •   DORA Home
    • Browsing by Author
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Author "He, Ying"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-20 of 33

    • title
    • publication date
    • submission date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • An Adaptive Learning Ontological Framework Based on Learning Styles and Teaching Strategies 

        Nafea, Shaimaa; Siewe, Francois; He, Ying (Conference)
        Ontology are increasingly being used in a variety of applications, and particularly in adaptive e-learning. They have the potential to enable developers to create adaptive course content for specified domains. E-learning ...
      • A Business Process Oriented Dynamic Cyber Threat Intelligence Model 

        Xu, Yuanchen; Yang, Yingjie; He, Ying (Conference)
        Cyber threat intelligence (CTI) is a method for strengthening information security. CTI provides information on threats and the countermeasures. Businesses can benefit from the defensive knowledge if the relevant CTI ...
      • Challenges of Information Security Incident Learning: An Industrial Case Study in a Chinese Healthcare Organisation 

        He, Ying; Johnson, Chris (Article)
        Security incidents can have negative impacts on healthcare organisations and the security of medical records has become a primary concern of the public. However, previous studies showed that organisations had not effectively ...
      • Context-Aware Driver Distraction Severity  Classification using LSTM Network 

        Fasanmade, Adebamigbe; Aliyu, Suleiman; He, Ying; Sharif, Mhd Saeed; Alfakeeh, Ahmed; Al-Bayatti, Ali Hilal (Conference)
      • Dying of a Hundred Good Symptoms: Why Good Security Can Still Fail - A Literature Review and Analysis 

        Loft, Paul; He, Ying; Janicke, Helge; Wagner, Isabel (Article)
        Many organizations suffer serious information security incidents, despite having taken positive steps towards achieving good security standards. Security certifications and high levels of maturity may have been obtained, ...
      • Electronic Medical Records and Risk Management in Hospitals of Saudi Arabia 

        Al-Barnawi, Abdullah; He, Ying; Maglaras, Leandros; Janicke, Helge (Article)
        Electronic Medical Records (EMR) systems and the associated risks have been well studied in developed countries; the same cannot be said for systems in developing countries. Previous research in Saudi Arabia healthcare ...
      • Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form 

        Evans, Mark; He, Ying; Yevseyeva, Iryna; Luo, Cunjin; Janicke, Helge; Maglaras, Leandros (Article)
        The objective of the research was to establish data relating to underlying causes of human error which are the most common cause of information security incidents within a private sector healthcare organisation. A survey ...
      • Evaluating Information Security Core Human Error Causes (IS-CHEC) Technique in Public Sector and Comparison with the Private Sector 

        Evans, M.; He, Ying; Yevseyeva, Iryna; Maglaras, Leandros (Article)
        Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, ...
      • Exploiting SCADA vulnerabilities using a Human Interface Device 

        Tzokatziou, Grigoris; Maglaras, Leandros; Janicke, Helge; He, Ying (Article)
        SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
      • A Fuzzy-Logic Approach to Dynamic Bayesian Severity Level Classification of Driver Distraction Using Image Recognition 

        Fasanmade, Adebamigbe; He, Ying; Al-Bayatti, Ali Hilal; Morden, J.N.; Aliyu, Suleiman; Alfakeeh, A.S.; Alsayed, A.O. (Article)
        Detecting and classifying driver distractions is crucial in the prevention of road accidents. These distractions impact both driver behavior and vehicle dynamics. Knowing the degree of driver distraction can aid in accident ...
      • A Game-Theoretic Based QoS-Aware Capacity Management for Real-Time EdgeIoT Applications 

        Aliyu, Suleiman Onimisi; Chen, Feng; He, Ying; Yang, Hongji (Conference)
        More and more real-time IoT applications such as smart cities or autonomous vehicles require big data analytics with reduced latencies. However, data streams produced from distributed sensing devices may not suffice to be ...
      • HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents 

        Evans, M.; He, Ying; Maglaras, Leandros; Janicke, Helge (Article)
        Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of ...
      • A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom 

        Aliyu, Aliyu; Maglaras, Leandros; He, Ying; Yevseyeva, Iryna; Cook, Allan; Janicke, Helge; Boiten, Eerke Albert (Article)
        As organisations are vulnerable to cyber attacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many ...
      • Human Behaviour as an aspect of Cyber Security Assurance 

        Maglaras, Leandros; He, Ying; Janicke, Helge; Evans, M. (Article)
        There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as ...
      • Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records 

        He, Ying; Johnson, Chris; Lu, Yu (Article)
        The increasing use of Electronic Health Records has been mirrored by a similar rise in the number of security incidents where con fidencial information has inadvertently been disclosed to third parties. These problems have ...
      • Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template 

        He, Ying; Johnson, Chris (Article)
        Context. The recurrence of past security breaches in healthcare showed that lessons had not been e effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning ...
      • The mimetic virus: A vector for cyber security 

        Ayres, Nicholas; Maglaras, Leandros; Janicke, Helge; Smith, Richard; He, Ying (Article)
        Like conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon and target. Unlike conventional terrorism, ...
      • A Novel Algorithm for Course Learning Object Recommendation Based on Student Learning Styles 

        Siewe, Francois; He, Ying; Nafea, Shaimaa (Conference)
        Explosive growth of e-learning in the recent years has faced difficulty of locating appropriate learning resources to match the students learning styles. Recommender system is a promising technology in e-learning environments ...
      • A novel algorithm for dynamic student profile adaptation based on learning styles 

        Nafea, Shaimaa M.; Siewe, Francois; He, Ying (Conference)
        E-learning recommendation systems are used to enhance student performance and knowledge by providing tailor- made services based on the students’ preferences and learning styles, which are typically stored in student ...
      • On Recommendation of Learning Objects using Felder-Silverman Learning Style Model 

        Nafea, Shaimaa M.; Siewe, Francois; He, Ying (Article)
        The e-learning recommender system in learning institutions is increasingly becoming the preferred mode of delivery, as it enables learning anytime, anywhere. However, delivering personalised course learning objects based ...

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary
         

         

        Browse

        All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

        My Account

        Login

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary