Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!

Alan Poulter, Ian Ferguson, David Mcmenemy, Richard James Glassey

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

5 Citations (Scopus)

Abstract

The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities
LanguageEnglish
Title of host publicationGlobal Security, Safety, and Sustainability
Subtitle of host publication5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
EditorsHamid Jahankhani, Ali G Hessami, Feng Hsu
Place of PublicationNew York
PublisherSpringer-Verlag
Pages1-8
Number of pages8
Edition1st
ISBN (Electronic)978-3-642-04062-7
DOIs
Publication statusPublished - Sep 2009
Event5th International Conference, ICGS3 2009, - London, United Kingdom
Duration: 1 Sep 20092 Sep 2009

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer-Verlag
Volume45

Conference

Conference5th International Conference, ICGS3 2009,
CountryUnited Kingdom
CityLondon
Period1/09/092/09/09

Fingerprint

Internet

Keywords

  • GIS
  • TETRA
  • ad-hoc environments
  • anti-forensics
  • authentication
  • ehealth
  • genetic alogrithms
  • google earth
  • intrusion detection
  • kerberos
  • neural networks
  • security
  • situation awareness
  • spatial data
  • watermarking
  • web services
  • worldwind
  • public libraries
  • public access IT facilities
  • computer misuse
  • forensic readiness
  • logging

Cite this

Poulter, A., Ferguson, I., Mcmenemy, D., & Glassey, R. J. (2009). Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush! In H. Jahankhani, A. G. Hessami, & F. Hsu (Eds.), Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings (1st ed., pp. 1-8). (Communications in Computer and Information Science; Vol. 45). New York: Springer-Verlag. https://doi.org/10.1007/978-3-642-04062-7_1
Poulter, Alan ; Ferguson, Ian ; Mcmenemy, David ; Glassey, Richard James. / Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!. Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings. editor / Hamid Jahankhani ; Ali G Hessami ; Feng Hsu. 1st. ed. New York : Springer-Verlag, 2009. pp. 1-8 (Communications in Computer and Information Science).
@inproceedings{06d62b998d284c72a97bb2bfb9a54197,
title = "Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!",
abstract = "The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities",
keywords = "GIS, TETRA, ad-hoc environments, anti-forensics, authentication, ehealth, genetic alogrithms, google earth, intrusion detection, kerberos, neural networks, security, situation awareness, spatial data, watermarking, web services, worldwind, public libraries, public access IT facilities, computer misuse, forensic readiness, logging",
author = "Alan Poulter and Ian Ferguson and David Mcmenemy and Glassey, {Richard James}",
note = "ISBN (print) 9783642040610- still fails to pass fulltext",
year = "2009",
month = "9",
doi = "10.1007/978-3-642-04062-7_1",
language = "English",
series = "Communications in Computer and Information Science",
publisher = "Springer-Verlag",
pages = "1--8",
editor = "Hamid Jahankhani and Hessami, {Ali G} and Feng Hsu",
booktitle = "Global Security, Safety, and Sustainability",
edition = "1st",

}

Poulter, A, Ferguson, I, Mcmenemy, D & Glassey, RJ 2009, Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush! in H Jahankhani, AG Hessami & F Hsu (eds), Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings. 1st edn, Communications in Computer and Information Science, vol. 45, Springer-Verlag, New York, pp. 1-8, 5th International Conference, ICGS3 2009, London, United Kingdom, 1/09/09. https://doi.org/10.1007/978-3-642-04062-7_1

Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush! / Poulter, Alan; Ferguson, Ian ; Mcmenemy, David; Glassey, Richard James.

Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings. ed. / Hamid Jahankhani; Ali G Hessami; Feng Hsu. 1st. ed. New York : Springer-Verlag, 2009. p. 1-8 (Communications in Computer and Information Science; Vol. 45).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

TY - GEN

T1 - Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!

AU - Poulter, Alan

AU - Ferguson, Ian

AU - Mcmenemy, David

AU - Glassey, Richard James

N1 - ISBN (print) 9783642040610- still fails to pass fulltext

PY - 2009/9

Y1 - 2009/9

N2 - The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities

AB - The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities

KW - GIS

KW - TETRA

KW - ad-hoc environments

KW - anti-forensics

KW - authentication

KW - ehealth

KW - genetic alogrithms

KW - google earth

KW - intrusion detection

KW - kerberos

KW - neural networks

KW - security

KW - situation awareness

KW - spatial data

KW - watermarking

KW - web services

KW - worldwind

KW - public libraries

KW - public access IT facilities

KW - computer misuse

KW - forensic readiness

KW - logging

U2 - 10.1007/978-3-642-04062-7_1

DO - 10.1007/978-3-642-04062-7_1

M3 - Conference contribution book

T3 - Communications in Computer and Information Science

SP - 1

EP - 8

BT - Global Security, Safety, and Sustainability

A2 - Jahankhani, Hamid

A2 - Hessami, Ali G

A2 - Hsu, Feng

PB - Springer-Verlag

CY - New York

ER -

Poulter A, Ferguson I, Mcmenemy D, Glassey RJ. Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush! In Jahankhani H, Hessami AG, Hsu F, editors, Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings. 1st ed. New York: Springer-Verlag. 2009. p. 1-8. (Communications in Computer and Information Science). https://doi.org/10.1007/978-3-642-04062-7_1