
Lewis GolightlyTeesside University · Computer Science
Lewis Golightly
Bachelor of Science
PhD student in Cybersecurity
Lecturer in Computer Science
About
11
Publications
5,653
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
30
Citations
Citations since 2017
Publications
Publications (11)
The paper discusses cybersecurity for children (particularly teenagers) and focuses on Social Media’s impact using a theoretical approach. Many social media users are unaware of their Cybersecurity in Social Media and all-round digital privacy and do not understand the importance of developing privacythrough taking both digital and physical measure...
Access Control is a crucial defence mechanism organizations can deploy to meet modern cybersecurity needs and legal compliance with data privacy. The aim is to prevent unauthorized users and systems from accessing protected resources in a way that exceeds their permissions. The present survey aims to summarize state-of-the-art Access Control techni...
Breakthroughs in healthcare analytics can help both the doctor and the patient. Analytics in healthcare can help spot and diagnose diseases early on. Therefore, they can also be used to improve healthcare quality and patient outcomes. Machine learning models can be used to find patterns in data and generate predictions based on these patterns. They...
Dear friends in academia: We are pleased to share the video presentation of our paper for your reference and use in your research in the areas of Cloud Computing, Organizational Adoption, and Cybersecurity. This research This paper investigates the organizational adaptation for cloud computing technology-reviewing case studies from various institut...
Over the years, there has been a heavy reliance on cloud computing as IT has innovated through time. In recent times cloud computing has grown monumentally. Many organizations rely on this technology to perform their business as usual and use it as a backbone of their companies' IT infrastructure. This paper investigates the organizational adaptati...
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate bou...
The increase and advancements of network technology play a significant role in the lives of us. This is through homes, businesses and people in a professional and social capacity. The way we use technology in everyday life aids the friendships, achievements and entertainment parts of our day to day life. This makes the fundamental device in the net...
With the growing popularity of the Internet of Things, smart home applications are developing gradually and bring convenience to users' lives. In this paper, first, an overview of IoT and widely agreed and accepted three-layer architecture of IoT are introduced. Next, this paper discusses the basic features of the smart home and data analytics in a...
This project focuses on the complexity of the global supply chain, increasing customer expectations and stronger demand for customization and other wide range of challenges that encourage manufacturers to identify and implement innovative techniques that can enhance their competitiveness. Digital transformation is associated with many benefits and...
Projects
Project (1)
This is a collection of IT-related research for sharing with interested academic friends.