AISB convention 2017

  In the run up to AISB2017 convention, I've asked Joanna Bryson, from the organising team, to answer few questions about the convention and what comes with it. Mohammad Majid al-Rifaie ( Tu...


Harold Cohen

Harold Cohen, tireless computer art pioneer dies at 87   Harold Cohen at the Tate (1983) Aaron image in background   Harold Cohen died at 87 in his studio on 27th April 2016 in Encintias California, USA.The first time I hear...


Dancing with Pixies?...

At TEDx Tottenham, London Mark Bishop (the former chair of the Society) demonstrates that if the ongoing EU flagship science project - the 1.6 billion dollar "Human Brain Project” - ultimately succeeds in understanding all as...


Computerised Minds. ...

A video sponsored by the society discusses Searle's Chinese Room Argument (CRA) and the heated debates surrounding it. In this video, which is accessible to the general public and those with interest in AI, Olly's Philosophy Tube ...


Connection Science

All individual members of The Society for the Study of Artificial Intelligence and Simulation of Behaviour have a personal subscription to the Taylor Francis journal Connection Science as part of their membership. How to Acce...



AISB miscellaneous Bulletin Item

Call for Chapter: Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions


Call for Chapters

Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions

Editor: Chang-Tsun Li
Department of Computer Science, University of Warwick, UK

Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The primary objective of this book is to provide a media for advancing research and the development of theory and practice of digital crime prevention and forensics. This book will address a broad range of digital crime and forensics disciplines that use electronic devices and software for crime prevention and investigation.

The book is intended to cover a wide spectrum of topics that would inform a broad cross-sectional and multi-disciplinary readership ranging from the academic and professional research communities to industry consultants and practitioners. Furthermore, this book seeks to publish a balanced mix of high quality theoretical and empirical research articles and case studies. Topics to be included (but not limited to) are as follows:
- Digital signal processing techniques for crime investigations
- Cryptological techniques and tools for crime investigation
- Cryptological techniques and tools for crime investigation
- Watermarking for digital forensics
- Steganography and steganalysis
- Data carving and recovery
- Machine learning, data mining and information retrieval for crime prevention and forensics
- Computational approaches to digital crime preventions
- Digital evidence
- Crime scene imaging
- Identity theft and biometrics
- Digital document examination
- Small digital device forensics (cell phones, smart phone, PDAs, audio/video devices, cameras, flash drives, gaming devices, GPS devices, etc.)
- RFID technology, applications, security, privacy
- Network access control and intrusion detection
- Malicious codes  and computer virology
- Information warfare
- Policy, standards, protocols, accreditation and certification, ethical issues related to digital crime and forensics
- Criminal investigative criteria and standard of procedure on computer crime
- Practical case studies and reports, legislative developments and limitations, law enforcement
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases

Invited Submissions
Individuals interested in submitting chapters (8,000-10,000 words) on the above-suggested topics or other related topics in their area of interest should submit via e-mail a 2-3 page manuscript proposal clearly explaining the mission and concerns of the proposed chapter by 30 June, 2008. We strongly encourage other topics that have not been listed in our suggested list, particularly if the topic is related to the research area in which you have expertise.  Upon acceptance of your proposal, you will have until 30 October, 2008, to prepare your chapter of 8,000-10,000 words and 7-10 related terms and their appropriate definitions.  Guidelines for preparing your paper and terms and definitions will be sent to you upon acceptance of your proposal. Full chapters will be submitted for double-blind review.

Please forward your e-mail of interest including your name, affiliation and a list of topics (5-7) on which you are interested in writing a chapter to Chang-Tsun Li, at, by no later than 30 June, 2008. Please use "Book Proposal" as the email subject. You will be notified about the status of your proposed topics by 31 July, 2008.

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.),, publisher of the Information Science Reference (formerly Idea Group Reference) and Medical Science Reference imprints in 2010.

Chang-Tsun Li
 Department of Computer Science,
 University of Warwick, Coventry CV4 7AL, UK