• Cyberstalking in the UK: analysis and recommendations.

      Maple, Carsten; Short, Emma; Brown, Antony; Bryden, Chris; Salter, Michael (IGI Global, 2012)
      The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking.
    • Cyberstalking in the United Kingdom: an analysis of the ECHO Pilot Survey

      Maple, Carsten; Short, Emma; Brown, Antony; University of Bedfordshire (University of Bedfordshire, 2011)
      Network for Surviving Stalking is internationally recognised as the leading Registered Charity in the United Kingdom dedicated to supporting victims of stalking, free of cost or commercial gain. It aims to provide support to victims, potential victims and others affected by stalking or harassment throughout the UK, to raise awareness of the subject and to provide information about stalking and harassment to professionals, relevant agencies and the public. As we have moved into an age of electronic information and communication, stalkers have found new, more effective and efficient means to perpetrate their malicious acts; stalkers have become Cyberstalkers. Cyberstalking has become somewhat of an epidemic stretching across the globe. Network for Surviving Stalking began to notice that an increasing number of people searching for support were being stalked or harassed online, making the charity concerned as to the prevalence, nature and impact of cyberstalking. The charity commissioned a team of researchers and together developed an online questionnaire to establish answers to these questions. This report provides an analysis of the responses to the questionnaire.
    • A mathematical analysis of a disaster management data-grid push service

      Bessis, Nik; Brown, Antony; Asimakopoulou, Eleana (IGI Global, 2010)
      Much work is under way within the Grid technology community on issues associated with the development of services fostering the integration and exploitation of multiple autonomous, distributed data sources through a seamless and flexible virtualized interface. These developments involve fluid and dynamic, ad hoc based interactions between dispersed service providers and consumers. However, several obstacles arise in the design and implementation of such services. In this article, the authors examine a notable obstacle, namely how to keep service consumers informed of relevant changes about data committed in multiple and distributed service provider levels, and most importantly, when these changes can affect others’ well-being. To achieve this, the authors use aggregated case scenarios to demonstrate the need for a data-Grid push service in a disaster management situation. In this regard, the article describes in detail the service architecture, as well as its mathematical analysis for keeping interested stakeholders informed automatically about relevant and critical data changes.
    • Modelling of a self-led critical friend topology in inter-cooperative grid communities

      Bessis, Nik; Huang, Ye; Norrington, Peter; Brown, Antony; Kuonen, Pierre; Hirsbrunner, Beat (Elsevier, 2011-01)
      For decades, much work has been done to increase the effectiveness and efficiency of job sharing amongst available computational resources. Resources can be organized into a variety of topologies, and recent work has shown that a decentralized distributed resource topology is a crucial but complicated scenario. This is because decentralized resources are normally grouped into independent virtual organizations (VOs) and isolated from each other by VO boundaries. To convey jobs across gaps between various virtual organizations, a novel resource topology called the self-led critical friend model (CFM) is proposed in this work. The CFM deals with trust credits between resources according to their historical collaboration records. This trust reveals a feasible, realistic, and transferable correlation to facilitate the resource selection process for job delegation between arbitrarily connected physical resources. Consequently, the CFM is able to overcome the constraints caused by virtual organization boundaries.
    • Modelling self-led trust value management in grid and service oriented infrastructures

      Brown, Antony; Sant, Paul; Bessis, Nik; French, Tim; Maple, Carsten (IGI Global, 2010)
      Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.
    • Towards context-aware real-world environments: the case of a remote autonomous energy aware monitoring system

      Bessis, Nik; McLauchnan, Nicholas; Asimakopoulou, Eleana; Brown, Antony; Norrington, Peter (World Scientific Publishing, 2011)
      Work is underway on issues associated with the development of tools and services to reduce energy consumption. Current trends suggest that energy consumption is increasing and carbon reserves are decreasing whilst green technologies for energy generation are yet to prove themselves. In industry, there are many legacy installations of equipment capable of transmitting their energy usage via the MODBUS protocol. Here we introduce a means of logging energy usage data and transmitting it to a database. The motivation is that making energy users aware of their consumption can help assist them in taking informed action towards the reduction of wasted energy. Thus, we offer a state-of-the-art of possible networking technologies, which have led to a real-world implementation. We present requirements whilst we mathematically model the compression technique. On the development side, we use GSM/GPRS technology, embedded KJava runtime and a bespoke Java application as the framework to email the usage data to the database.