Al-Rifaie on BBC

AISB Committee member and Research Fellow at Goldsmiths, University of London, Dr Mohammad Majid al-Rifaie was interviewed by the BBC (in Farsi) along with his colleague Mohammad Ali Javaheri Javid on the 6 November 2014. He was a...


Read More...

Rose wins the Loebne...

After 2 hours of judging at Bletchley Park, 'Rose' by Bruce Wilcox was declared the winner of the Loebner Prize 2014, held in conjunction with the AISB.  The event was well attended, film live by Sky News and the special guest jud...


Read More...

AISB Convention 2015

The AISB Convention is an annual conference covering the range of AI and Cognitive Science, organised by the Society for the Study of Artificial Intelligence and Simulation of Behaviour. The 2015 Convention will be held at the Uni...


Read More...

Yasemin Erden on BBC

AISB Committee member, and Philosophy Programme Director and Lecturer, Dr Yasemin J. Erden interviewed for the BBC on 29 October 2013. Speaking on the Today programme for BBC Radio 4, as well as the Business Report for BBC world N...


Read More...

Mark Bishop on BBC ...

Mark Bishop, Chair of the Study of Artificial Intelligence and the Simulation of Behaviour, appeared on Newsnight to discuss the ethics of ‘killer robots’. He was approached to give his view on a report raising questions on the et...


Read More...

AISB YouTube Channel

The AISB has launched a YouTube channel: http://www.youtube.com/user/AISBTube (http://www.youtube.com/user/AISBTube). The channel currently holds a number of videos from the AISB 2010 Convention. Videos include the AISB round t...


Read More...
012345

Notice

AISB miscellaneous Bulletin Item

CF Chapter: Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions


Call for Chapters

Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions


Editor: Chang-Tsun Li
Department of Computer Science, University of Warwick, UK

Introduction
------------
Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The primary objective of this book is to provide a media for advancing research and the development of theory and practice of digital crime prevention and forensics. This book will address a broad range of digital crime and forensics disciplines that use electronic devices and software for crime prevention and investigation.

Coverage
--------
The book is intended to cover a wide spectrum of topics that would inform a broad cross-sectional and multi-disciplinary readership ranging from the academic and professional research communities to industry consultants and practitioners. Furthermore, this book seeks to publish a balanced mix of high quality theoretical and empirical research articles and case studies. Topics to be included (but not limited to) are as follows:
- Digital signal processing techniques for crime investigations
- Cryptological techniques and tools for crime investigation
- Cryptological techniques and tools for crime investigation
- Watermarking for digital forensics
- Steganography and steganalysis
- Data carving and recovery
- Machine learning, data mining and information retrieval for crime prevention and forensics
- Computational approaches to digital crime preventions
- Digital evidence
- Crime scene imaging
- Identity theft and biometrics
- Digital document examination
- Small digital device forensics (cell phones, smart phone, PDAs, audio/video devices, cameras, flash drives, gaming devices, GPS devices, etc.)
- RFID technology, applications, security, privacy
- Network access control and intrusion detection
- Malicious codes  and computer virology
- Information warfare
- Policy, standards, protocols, accreditation and certification, ethical issues related to digital crime and forensics
- Criminal investigative criteria and standard of procedure on computer crime
- Practical case studies and reports, legislative developments and limitations, law enforcement
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases

Invited Submissions
-------------------
Individuals interested in submitting chapters (8,000-10,000 words) on the above-suggested topics or other related topics in their area of interest should submit via e-mail a 2-3 page manuscript proposal clearly explaining the mission and concerns of the proposed chapter by 30 June, 2008. We strongly encourage other topics that have not been listed in our suggested list, particularly if the topic is related to the research area in which you have expertise.  Upon acceptance of your proposal, you will have until 30 October, 2008, to prepare your chapter of 8,000-10,000 words and 7-10 related terms and their appropriate definitions.  Guidelines for preparing your paper and terms and definitions will be sent to you upon acceptance of your proposal. Full chapters will be submitted for double-blind review.

Please forward your e-mail of interest including your name, affiliation and a list of topics (5-7) on which you are interested in writing a chapter to Chang-Tsun Li, at ctli@dcs.warwick.ac.uk, by no later than 30 June, 2008. Please use "Book Proposal" as the email subject. You will be notified about the status of your proposed topics by 31 July, 2008.

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), www.igi-global.com, publisher of the Information Science Reference (formerly Idea Group Reference) and Medical Science Reference imprints in 2010.



Chang-Tsun Li
Department of Computer Science,
University of Warwick, Coventry CV4 7AL, UK
E-mail: ctli@dcs.warwick.ac.uk
http://www.dcs.warwick.ac.uk/~ctli