@inproceedings{06d62b998d284c72a97bb2bfb9a54197,
title = "Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!",
abstract = "The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities",
keywords = "GIS, TETRA, ad-hoc environments, anti-forensics, authentication, ehealth, genetic alogrithms, google earth, intrusion detection, kerberos, neural networks, security, situation awareness, spatial data, watermarking, web services, worldwind, public libraries, public access IT facilities, computer misuse, forensic readiness, logging",
author = "Alan Poulter and Ian Ferguson and David Mcmenemy and Glassey, {Richard James}",
note = "ISBN (print) 9783642040610- still fails to pass fulltext; 5th International Conference, ICGS3 2009, ; Conference date: 01-09-2009 Through 02-09-2009",
year = "2009",
month = sep,
doi = "10.1007/978-3-642-04062-7_1",
language = "English",
series = "Communications in Computer and Information Science",
publisher = "Springer-Verlag",
pages = "1--8",
editor = "Hamid Jahankhani and Hessami, {Ali G} and Feng Hsu",
booktitle = "Global Security, Safety, and Sustainability",
edition = "1st",
}