Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!

Alan Poulter, Ian Ferguson, David Mcmenemy, Richard James Glassey

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

7 Citations (Scopus)
157 Downloads (Pure)

Abstract

The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities
Original languageEnglish
Title of host publicationGlobal Security, Safety, and Sustainability
Subtitle of host publication5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
EditorsHamid Jahankhani, Ali G Hessami, Feng Hsu
Place of PublicationNew York
PublisherSpringer-Verlag
Pages1-8
Number of pages8
Edition1st
ISBN (Electronic)978-3-642-04062-7
DOIs
Publication statusPublished - Sept 2009
Event5th International Conference, ICGS3 2009, - London, United Kingdom
Duration: 1 Sept 20092 Sept 2009

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer-Verlag
Volume45

Conference

Conference5th International Conference, ICGS3 2009,
Country/TerritoryUnited Kingdom
CityLondon
Period1/09/092/09/09

Keywords

  • GIS
  • TETRA
  • ad-hoc environments
  • anti-forensics
  • authentication
  • ehealth
  • genetic alogrithms
  • google earth
  • intrusion detection
  • kerberos
  • neural networks
  • security
  • situation awareness
  • spatial data
  • watermarking
  • web services
  • worldwind
  • public libraries
  • public access IT facilities
  • computer misuse
  • forensic readiness
  • logging

Fingerprint

Dive into the research topics of 'Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!'. Together they form a unique fingerprint.

Cite this