Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!

Alan Poulter, Ian Ferguson, David Mcmenemy, Richard James Glassey

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

6 Citations (Scopus)
102 Downloads (Pure)


The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities
Original languageEnglish
Title of host publicationGlobal Security, Safety, and Sustainability
Subtitle of host publication5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
EditorsHamid Jahankhani, Ali G Hessami, Feng Hsu
Place of PublicationNew York
Number of pages8
ISBN (Electronic)978-3-642-04062-7
Publication statusPublished - Sep 2009
Event5th International Conference, ICGS3 2009, - London, United Kingdom
Duration: 1 Sep 20092 Sep 2009

Publication series

NameCommunications in Computer and Information Science


Conference5th International Conference, ICGS3 2009,
Country/TerritoryUnited Kingdom


  • GIS
  • ad-hoc environments
  • anti-forensics
  • authentication
  • ehealth
  • genetic alogrithms
  • google earth
  • intrusion detection
  • kerberos
  • neural networks
  • security
  • situation awareness
  • spatial data
  • watermarking
  • web services
  • worldwind
  • public libraries
  • public access IT facilities
  • computer misuse
  • forensic readiness
  • logging


Dive into the research topics of 'Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!'. Together they form a unique fingerprint.

Cite this