Software Development
Permanent URI for this collection
Browse
Browsing Software Development by Author "Slay, Jill"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Are the financial transactions conducted inside virtual environments truly anonymous? An experimental research from an Australian perspective.(Emerald, 2012) Irwin, Angela S. M.; Slay, Jill; Choo, Raymond K.-K.; Liu, LinThis paper examines the identity and payment method verification procedures implemented by a number of popular massively multiplayer online games (MMOGs) and online financial service providers (OFSPs) to determine if the systems they currently have in place are sufficient to uncover the identities of those who may wish to use such environments to conduct money laundering or terrorism financing activity. The paper also investigates whether the payment instruments or methods used by account holders to place funds into their account(s) hinder or assist investigators to expose the real-world identity of the account holder. The paper then discusses whether it is feasible and/or desirable to introduce know your customer (KYC) and customer due diligence (CDD) legislation into virtual environments and illustrates an effective KYC approach which may assist MMOGs and OFSPs to correctly identify their account holders, should legislation be put in place.Item Development of InfoVis software for digital forensics.(IEEE, 2012) Osborne, Grant; Turnbull, Benjamin; Slay, JillInformation Visualisation techniques are one method that may be used to combat the growing complexity and data sizes associated with digital forensic investigations. This work outlines the processes, challenges, trials and tribulations of developing proof-of-concept forensic software designed to create interactive Information Visualisations from digital evidence sources.Item Digital forensics in the Cloud: Research perspectives. Paper presented at the ISC Secure Johannesburg Conference, November 15, 2012.(2012) Slay, JillI am a researcher in forensic computing carrying out research aimed to develop a sound theoretical and scientific foundation for the discipline, based on principles broadly gained from software engineering.Item Digital Forensics Institute in Malaysia: The way forward(Pario Communications Limited, 2012) Arrifin, A.; Jazri, H.; Slay, Jill; Lee, I.This paper analyzes cybercrimes, cyber related crimes and problems encountered in Malaysia. Mitigation efforts are discussed such as digital forensics research and procedures including progress. Comparison is made with Japan and to move forward, a Digital Forensics Institute in Malaysia (DFIM) is proposed.Item An integrated tool-support for small team meetings in organisations.(IJCA, 2012) Dhenesh, Virallikattur S.; Sitnikova, Elena; Slay, JillTeams collaborate in different contexts within organisations to share information with its members in achieving their targets. Collaborations with face-to-face meetings are prevalent despite the emergence of numerous tools to support distributed team collaborations. However, the nature of tool-support for team collaborations in the last decade was focused on supporting distributed and web-mediated meetings. Furthermore the tools were either not designed to support all the processes within team collaboration or not readily adopted by users. Literature on developing an integrated tool-support that includes all the potential processes within a meeting, and learning lessons whilst designing tools to improve the state of their adoption is largely unexplored. This paper reports on a qualitative study that observed twenty team meetings from five organisations in South Australia and analysed the data using a grounded theory approach to generate stories on team activities. The stories were used to develop a tool-kit framework and lessons on providing a tool support for team meetings. The proposed framework consists of a list of potential hardware and software tools that could be introduced within a team meeting to support the team activities.Lessons were learned on the potential processes that would require tool support, participants’ requirements and how technology could be introduced to provide assistance in team meetings.The results from the study in comparisons with an earlier study on simulated meetings identified that it is possible to provide an integrated tool-support for team meetings whilst the framework is grounded on the activities within them. Given, the results were based only on passive observations of team meetings, the framework and lessons will be used as a foundationfor a follow-up study in generating conceptsto initiate focus group discussions with team members. Thus, the framework and the lessons be refined and are aimed to provide more insights for system designers in developing an integrated tool-support for team meetings.Item Lessons towards developing an integrated tool-support for small team meetings.(MECS Publisher, 2012) Dhenesh, Virallikattur S.; Sitnikova, Elena; Slay, JillTeams within organisations meet regularly to review their progress and engage in collaborative activities within a team setting. However, the uptake of tools to support their activities within team meetings is limited. Research efforts on understanding the reasons for low rates of tool adoption and learning lessons in developing tools that could be readily adopted by team members within team meetings are largely unexplored. This qualitative study focuses on learning lessons towards developing an integrated tool-support for small team meetings within organisations using focus groups. Discussions were based on a tool-kit framework generated by observing their team meetings in an earlier study. The discussions were recorded and the transcripts were analysed using grounded theory approach to generate stories on team processes and potential tools that could assist team members during each process. The lessons derived from the study were based on three aspects of tool-support namely the potential users of the proposed tool-kit, processes within the team meetings that would be influenced by the introduction of the tool-kit and the technological aspects of the tool-kit.Item Voice Over IP and forensics: A review of recent Australian work. Paper presented at the 1st International Conference on Digital Forensics and Investigation (ICDFI), September 21-23, 2012, Beijing, China.(2012) Slay, Jill; Simon, Matthew; Irwin, DavidThe popularity of Voice over the Internet Protocol (VoIP) for providing voice communication over IP networks such as the Internet has resulted in VoIP becoming a global telephony service. VoIP applications convert analogue voice signals into a digital format, which is then encapsulated into IP packets for transmission over the Internet. Our research has examined both the security and privacy implications of widespread adoption of VoIP for personal and business telecommunications and also the use of VoIP calls by criminals, as many implementations of VoIP may also use strong encryption to secure both the voice payload as well as to control messages. We have also considered the implication of recovering electronic evidence and information from VoIP since conventional methods of eavesdropping and wire-tapping do not apply to VoIP calls. This paper provides an overview of the development of investigative processes and forensic tools to enable law enforcement to engage the digital forensic process in a VoIP environment