Poulter, A., Ferguson, I., McMenemy, D. and Glassey, R. (2009) Question: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush! In: Jahankhani, J., Hessami, A. G. and Hsu, F. (eds.) Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings. Series: Communications in computer and information science (45). Springer: Berlin, Heidelberg, pp. 1-8. ISBN 9783642040610 (doi: 10.1007/978-3-642-04062-7_1)
Full text not currently available from Enlighten.
Abstract
The background to this paper is the introduction of public access IT facilities in public libraries. These facilities have seen recorded instances of misuse alongside weaknesses in checking identities of users and in explaining Acceptable Use Policies (AUPs) to users. The FRILLS (Forensic Readiness of Local Libraries in Scotland) project, funded by the Scottish Library and Information Council, attempted to survey the situation in Scottish public libraries and develop a forensic readiness logging regime for use in them. There is in depth discussion of the use of logging in public library computer facilities.
Item Type: | Book Sections |
---|---|
Keywords: | GIS, TETRA, ad-hoc environments, anti-forensics, authentication, ehealth, genetic algorithms, Google Earth, intrusion detection, kerberos, neural networks, security, situation awareness, spatial data, watermarking, web services, worldwind, public libraries, public access IT facilities, computer misuse, forensic readiness, logging. |
Status: | Published |
Glasgow Author(s) Enlighten ID: | McMenemy, Dr David and Glassey, Dr Richard |
Authors: | Poulter, A., Ferguson, I., McMenemy, D., and Glassey, R. |
College/School: | College of Arts & Humanities > School of Humanities > Information Studies College of Science and Engineering > School of Computing Science |
Publisher: | Springer |
ISBN: | 9783642040610 |
University Staff: Request a correction | Enlighten Editors: Update this record