: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Ten years ago we were on the verge of having cameras built into our mobile phones, but knew very little about what to expect or how they would be used. Now we are faced with the s...
Max L. Wilson, Simon Robinson, Dan Craggs, Kristia...
This research project investigated the relationships between IS staff and other organisational actors in four organisations. Using a network-based approach borrowed from Sociology...
In this paper, we propose a system called kMedia that can assist users to form knowledge for community by showing shared topics networks (STN) among them. One of the important aspe...
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...