MSc ILS Exam Prep Jan 2013

Get Started. It's Free
or sign up with your email address
Rocket clouds
MSc ILS Exam Prep Jan 2013 by Mind Map: MSc ILS Exam Prep Jan 2013

1. Diagrams from slide notes by Dr Steven Buchanan

2. Law

2.1. Acts

2.1.1. Copyright, Design and Patents Act 1988 c.2003. MPAA seeks injunction against 321 Studios for its manufacture of anti-copyright software. Economic rights Reproduction, adaptation, distribution rights These rights are waived or sold, usually to a publisher or an employer Moral rights Intellectual aspect of the creation Gives the author control of the work Cannot be waived even if the economic rights have been sold to someone else Author retains right of ownership and integrity of work Fair dealing Research and private study, with restrictions... Criticism or review News reporting Making a single copy for a visually impaired person Major challenges in the digital age, causing Digital Economy Act 2010, and Hargreaves Report 2011 Ease of file sharing Growing acceptable download culture Publishers and legislators who are panicking at both

2.1.2. Computer Misuse Act 1990 Between February 2001, and March 2002, Gary McKinnon is alleged to have hacked into 97 US military and NASA computers. Wiki 2008 House of Lords appeal. Section 1. Unauthorised access to computer material 2012. R v Astrid Curzon. Curzon had recently been made redundant from Royal Wootton Bassett Academy. Accessed the schools email system, using login details of another employee, and read private emails from the Head. 2005. R v Daniel Cuthbert. IT security consultant donated £30 to Tsunami appeal website, then checked site security. 1999. Michelle Begley hacked into the Police National Computer to trace a woman who was having an affair with her husband. Accessed electoral rolls and driving license information. Section 2. Unauthorised access with intent to commit or facilitate commission of further offences Section 3. Unauthorised modification of computer material 2006. David Lennon launched a denial of service attack (DS) on former employer. Sent 5,000,000 emails, crashed the mail server. 2003. Aaron Caffrey acquitted of DoS attack that crippled the Port of Houston, Texas. Trojan defense - other hackers had taken control of his pc. Sections 1, and 2 Sections 2, and 3 1995. Pile, AKA The Black Baron sentenced 18 months imprisonment, for authoring Pathogen and Qeeg viruses, using polymorphic encription to conceal viruses within innocuous programs. First virus writer jailed. Sections 1, and 3 2012. James Jeffrey hacked British Pregnancy Advisory Service (BPAS) website, and posted ant abortion messages on its home page. Sections 1, 2, and 3 (and others) 1999. US Amex credit analyst gained access to credit card accounts and PINs. Accomplice used forged Amex xards in London in ATM $1M fraud.This case defined 'hacking' as all forms of unauthorised access, by an insider or an outsider. Bbc

2.1.3. Data Protection Act 1998 Eight Principles Fairly and lawfully processed Processed for limited purposes Adequate, relevant, and not excessive Accurate Not kept for longer than necessary Processed in line with data subject's rights Secure Not transferred to countries without adequate data protection

2.1.4. Regulation of Investigatory Powers Act 2000 How does the BBC use RIPA? c.2008. Poole Borough Council vs Tim Joyce and Jenny Paton, over school catchment

2.1.5. Human Rights Act 2000 2012. European judges rule that indeterminate sentences 'breach human rights' UK cannot deport terrorist suspect to home country, if suspect faces the possibility of torture or death.

2.1.6. Freedom of Information Acts allow the uncovering of embarrassments, and worse, contravention of other acts. Freedom of Information Act 2000 Used to find out extent of RIPA use in local councils c.2008. Exposed the surveillance of Tim Joyce and Jenny Paton Used to uncover the extent of contravention of the Competiion Act 1998 by Tesco, regarding the sale of dairy products in 2002 and 2003. Freedom of Information Act (Scotland) 2002 Used to uncover prescription waste in Scotland in 2011. Arms length organisations and act in the news

2.1.7. Anti-Terrorism, Crime and Security Act 2001 Greater restraining powers, but blue dot aboove. in the Guardian

2.1.8. Prevention of Terrorism Act 2005 Even greater, tagging and house arrest curcumvention of Human Rights. in the Guardian

2.1.9. Police and Justice Act 2006 Shifts in policing. in the Guardian Computer misuse CASES!

2.1.10. Serious Crime Act 2007 Facebook during the London riots. The court upheld Jordan Blackshaw and Perry Sutcliffe-Keenan's four-year sentences for icitement to commit serious crime using social media.

2.1.11. Digital Economy Act 2010 in the Guardian

2.2. Ranganathan's 5 Laws of Library Science

2.2.1. Every reader his/her book

2.2.2. Every book its reader

2.2.3. Save the time of the reader

2.2.4. A library is a growing organism

2.2.5. Books are for use

2.3. mainstreaming of computers driven by social media

3. IR&A

3.1. Theorists

3.1.1. Saracevic relevance motivational relevance situational relevance cognitive relevance topical relevance system relvance

3.1.2. Ellis

3.1.3. Broeder

3.1.4. Koenemann & Belkin

3.1.5. Kuhlthau Information seeking process ISP Initiation Selection Exploration Formulation Collection Presentation

3.2. Calculations

3.2.1. Raw Frequency tf/dt term frequency (tf) number of terms in a document (dt)

3.2.2. Inverse Document Frequency idft

3.3. Terms & Definitions

3.3.1. Recall

3.3.2. Precision

3.4. Multi-media

3.4.1. Image Visual properties, Content-Based Image Retrieval, CBIR colour-based retrieval

3.4.2. Video Basic retrieval unit is a shot, summarised by a key frame. Basic approach then similar to images Scene detection Movement detection

3.4.3. Audio Index features (representation and matching are problematic, because of the dynamic time aspect of audio). Simplified procedure, which which gives a vector of features for each sample Features

3.4.4. Speech Speech recognition using a model to produce text, then text retrieval. Acoustic model. Simplest approach. Prone to error. Language model takes into account expected word sequences

3.4.5. Keyword-Based Annotation text surrounding an image text extraction from an image text pointing to an image the Alt and Caption attributes of an image file name of an image

4. Managing Information Systems

4.1. Information Services

4.1.1. Information Strategy Earl's 4 Components Information Management Information Technology Information Systems Information Content Enterprise Architecture Frameworks TOGAF Zachmann Strategic Plan Systems Thinking Models Components Characteristics Views Process Notation Processess