Computer games are a rapidly growing segment of the entertainment industry. Design and development of modern computer games can be a complex activity involving many participants from a variety of disciplines. However, computer game design approaches typically appear to be less formalised than those used for other types of software systems. In this article we describe an approach to computer game-flow design intended for the design of individual game levels within a computer game and demonstrate its application in practice.
Web site development work is a growing aspect of the IT activities within many organisations. However, the skills and knowledge required by IT practitioners for successful Web site development are still largely uncertain. In this paper we examine the results of a research exercise involving case studies in 20 UK organisations aimed at investigating: the skills and knowledge that are required for Web site development work, how such skills and knowledge are used in actual practice, and the mechanisms by which such skills and knowledge can be acquired and improved.
Forensic investigation of social networking applicationshttp://researchonline.ljmu.ac.uk/299/ Article LJMU has developed LJMU Research Online for users to access the research output of the University more effectively. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LJMU Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain.The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription. Forensic investigation of social networking applications AbstractSocial networking applications such as Facebook, Twitter and Linkedin may be involved in instances of misuse such as copyright infringement, data protection violations, defamation, identity theft, harassment, and dissemination of confidential information and malware that can affect both organizations and individuals. In this paper we examine the computer forensic process of obtaining digital evidence from social networking applications and the legal aspects of such. Currently there do not appear to be commonly available guidelines for organizations aimed specifically at the computer forensic process of investigation of social networking applications.
Investigating employee harassment via social media http://researchonline.ljmu.ac.uk/1917/ Article LJMU has developed LJMU Research Online for users to access the research output of the University more effectively. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LJMU Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain.The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription. LJMU Research OnlineInvestigating employee harassment via social media PurposeTo examine the process of investigation of employee harassment via social media in order to develop best practice to help organisations conduct such investigations more effectively. Design / methodology / approachReview of the technical, managerial, and legal literature to develop guidance for organisations conducting investigations of employee harassment via social media. FindingsOrganisations may not have effective procedures for the investigation of social media misuse in general and employee harassment via social media in particular. This paper provides guidance for organisations to conduct investigation of employee harassment via social media more effectively. Originality / valueThe paper consolidates the fragmented discussion of the investigation of social media misuse with regard to employee harassment via a literature review across technical, managerial and legal disciplines. The paper provides guidance to support organisations conducting investigations of employee harassment via social media more effectively. AbstractPreviously the investigation of employee harassment within the workplace would typically have involved obtaining evidence regarding physical contact, verbal contact (face to face or via telephone) or written contact (via letters or notes or email) between a suspect and a victim. Social media has added a new avenue to the investigation of employee harassment that goes beyond the physical workplace and normal working hours. In this paper we examine the process of computer forensic investigation of employee harassment via social media and the legal aspects of such. In particular we examine employee harassment via social media in terms of the reporting of harassment, the computer forensic investigation process, the relevant UK legislation and its application, and discuss good practice guidelines for educating employers and employees regarding how to use social media in the workplace and beyond in an acceptable manner.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.