EThOS is the UK's national thesis service which aims to maximise the visibility and availability of the UK's doctoral research theses. Users are required to register with EThOS to download or order theses.
The UoG Research Repository is a storage and distribution service for the University’s research and publishing outputs whether articles, conference papers, book contributions, artefacts or video.
Dissertation database
UoG Dissertations
Past copies of UoG undergraduate and taught postgraduate dissertations can be found in the dissertation database
A database of past University of Gloucestershire undergraduate and taught postgraduate dissertations or final year projects.
Only selected dissertations of the approved standard (60%+) have been uploaded. Dissertations can be viewed but download options have been disabled.
Dissertations can be browsed by subject, school and level using the Search facility.
Scopus is a large abstract and citation database of peer-reviewed literature published as journal articles, books and conference proceedings. See more.. for login instructions to use personalisation features.
Scopus provides smart tools to track, analyse and visualise research content and affiliation criteria. Searching Scopus should be part of your literature research process.
To use personalisation features please use the link below
The Computing Research Repository run by Cornell University and contain access to 1000s of pre-published research papers across the full spectrum of computer science.
Most suitable for Level 6, Masters and Postgraduate Research.
Research methods books for Computing
Research Methodology by Ranjit KumarDesigned with students, for students Eight steps, two pathways, one book. The Fifth Edition of the bestseller Research Methodology has reimagined, redesigned, and fully renovated how a textbook can help students achieve success in their methods course or research project. Eight steps: Foolproof for any beginner researcher, the book breaks the process of designing and doing a research project into achievable stages. It delivers students from research problem to their written research report at the pace they need, with clear explanations, DIY tasks and study skills support. In a new landscape format it presents figures, models and visualizations elegantly, so they don′t break over a page, making even complex concepts easier to understand. Two pathways: With an innovative, beautiful design, regular progress checkpoints have been built into the book and its online resources. As students proceed through the 8 steps, each chapter provides regular opportunities for students to check understanding or give themselves a challenge. Each pathway then gives them the resources they need. Confused? Stop, practise with quizzes and flashcards, or use a video to look at a concept a different way. Up for a challenge? Access a wealth of additional material including research articles, readings, case studies, activities, bibliography tools and inspiration to pursue your curiosity, impress your lecturer, and nail your assignments. With this one book, every student gets what they need to succeed. It is the perfect essential text for students and beginner researchers across the social sciences.
Publication Date: 2019
Projects in Computing and Information Systems by Christian DawsonThis book is the essential guide for any student undertaking a computing/IS project, and will give you everything you need to achieve outstanding results. Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and provides the reader with the skills to excel.
Publication Date: 2015
Research Methods for Cyber Security by Thomas W. Edgar; David O. ManzResearch Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Publication Date: 2017
The Literature Review by Lawrence A. Machi; Brenda T. McEvoyFrom daunting to doable in six steps Graduate students who turn in exceptional literature reviews are recognized as excellent critical thinkers, as well as masters of academic argumentation, research writing and writing academic papers. But literature searches and composing the review itself can be intimidating and frustrating. The six-step process pioneered by this book has made the task flowing and seamless for masters and doctoral candidates in Education and related fields. This updated third edition features a wealth of all-new content including: A flowchart that graphically illustrates Machi and McEvoy's process. Reflective Oversight boxes in each chapter that prompt readers to direct metacognitive activities. Links to online guides and resources. Expanded examples illustrating theoretical concepts. When you apply this system to your next literature review the work will be intuitive and enjoyable for you, and the results will impress your teachers and fellow researchers. "The Literature Review clearly walks educators through the steps to completing a literature review with helpful checklists and graphic representations of the process. It makes a very daunting task much more manageable and systematic." Andrea M. Capizzi Vanderbilt University, Nashville, TN "This text is the best guide yet for our dissertation students. The format provides the learner with the framework to think about each step of the literature review process. This thorough and practical guide will provide candidates with the scholarly application that they require to think about their research." Barbara J. Poling, Interim Dean College of Education and Organizational Leadership, University of La Verne