MSc ILS Exam Prep Jan 2013

Get Started. It's Free
or sign up with your email address
Rocket clouds
MSc ILS Exam Prep Jan 2013 by Mind Map: MSc ILS Exam Prep Jan 2013

1. Diagrams from slide notes by Dr Steven Buchanan

2. Law

2.1. Acts

2.1.1. Copyright, Design and Patents Act 1988

2.1.1.1. c.2003. MPAA seeks injunction against 321 Studios for its manufacture of anti-copyright software.

2.1.1.2. Economic rights

2.1.1.2.1. Reproduction, adaptation, distribution rights

2.1.1.2.2. These rights are waived or sold, usually to a publisher or an employer

2.1.1.3. Moral rights

2.1.1.3.1. Intellectual aspect of the creation

2.1.1.3.2. Gives the author control of the work

2.1.1.3.3. Cannot be waived even if the economic rights have been sold to someone else

2.1.1.3.4. Author retains right of ownership and integrity of work

2.1.1.4. Fair dealing

2.1.1.4.1. Research and private study, with restrictions...

2.1.1.4.2. Criticism or review

2.1.1.4.3. News reporting

2.1.1.4.4. Making a single copy for a visually impaired person

2.1.1.5. Major challenges in the digital age, causing Digital Economy Act 2010, and Hargreaves Report 2011

2.1.1.5.1. Ease of file sharing

2.1.1.5.2. Growing acceptable download culture

2.1.1.5.3. Publishers and legislators who are panicking at both

2.1.2. Computer Misuse Act 1990

2.1.2.1. Between February 2001, and March 2002, Gary McKinnon is alleged to have hacked into 97 US military and NASA computers.

2.1.2.1.1. Wiki

2.1.2.1.2. 2008 House of Lords appeal.

2.1.2.2. Section 1. Unauthorised access to computer material

2.1.2.2.1. 2012. R v Astrid Curzon. Curzon had recently been made redundant from Royal Wootton Bassett Academy. Accessed the schools email system, using login details of another employee, and read private emails from the Head.

2.1.2.2.2. 2005. R v Daniel Cuthbert. IT security consultant donated £30 to Tsunami appeal website, then checked site security.

2.1.2.2.3. 1999. Michelle Begley hacked into the Police National Computer to trace a woman who was having an affair with her husband. Accessed electoral rolls and driving license information.

2.1.2.3. Section 2. Unauthorised access with intent to commit or facilitate commission of further offences

2.1.2.4. Section 3. Unauthorised modification of computer material

2.1.2.4.1. 2006. David Lennon launched a denial of service attack (DS) on former employer. Sent 5,000,000 emails, crashed the mail server.

2.1.2.4.2. 2003. Aaron Caffrey acquitted of DoS attack that crippled the Port of Houston, Texas. Trojan defense - other hackers had taken control of his pc.

2.1.2.5. Sections 1, and 2

2.1.2.6. Sections 2, and 3

2.1.2.6.1. 1995. Pile, AKA The Black Baron sentenced 18 months imprisonment, for authoring Pathogen and Qeeg viruses, using polymorphic encription to conceal viruses within innocuous programs. First virus writer jailed.

2.1.2.7. Sections 1, and 3

2.1.2.7.1. 2012. James Jeffrey hacked British Pregnancy Advisory Service (BPAS) website, and posted ant abortion messages on its home page.

2.1.2.8. Sections 1, 2, and 3 (and others)

2.1.2.8.1. 1999. US Amex credit analyst gained access to credit card accounts and PINs. Accomplice used forged Amex xards in London in ATM $1M fraud.This case defined 'hacking' as all forms of unauthorised access, by an insider or an outsider.

2.1.2.9. Bbc

2.1.3. Data Protection Act 1998

2.1.3.1. Eight Principles

2.1.3.1.1. Fairly and lawfully processed

2.1.3.1.2. Processed for limited purposes

2.1.3.1.3. Adequate, relevant, and not excessive

2.1.3.1.4. Accurate

2.1.3.1.5. Not kept for longer than necessary

2.1.3.1.6. Processed in line with data subject's rights

2.1.3.1.7. Secure

2.1.3.1.8. Not transferred to countries without adequate data protection

2.1.4. Regulation of Investigatory Powers Act 2000

2.1.4.1. How does the BBC use RIPA?

2.1.4.2. c.2008. Poole Borough Council vs Tim Joyce and Jenny Paton, over school catchment

2.1.5. Human Rights Act 2000

2.1.5.1. 2012. European judges rule that indeterminate sentences 'breach human rights'

2.1.5.2. UK cannot deport terrorist suspect to home country, if suspect faces the possibility of torture or death.

2.1.6. Freedom of Information Acts allow the uncovering of embarrassments, and worse, contravention of other acts.

2.1.6.1. Freedom of Information Act 2000

2.1.6.1.1. Used to find out extent of RIPA use in local councils c.2008. Exposed the surveillance of Tim Joyce and Jenny Paton

2.1.6.1.2. Used to uncover the extent of contravention of the Competiion Act 1998 by Tesco, regarding the sale of dairy products in 2002 and 2003.

2.1.6.2. Freedom of Information Act (Scotland) 2002

2.1.6.2.1. Used to uncover prescription waste in Scotland in 2011.

2.1.6.3. Arms length organisations and act in the news

2.1.7. Anti-Terrorism, Crime and Security Act 2001

2.1.7.1. Greater restraining powers, but blue dot aboove. in the Guardian

2.1.8. Prevention of Terrorism Act 2005

2.1.8.1. Even greater, tagging and house arrest curcumvention of Human Rights. in the Guardian

2.1.9. Police and Justice Act 2006

2.1.9.1. Shifts in policing. in the Guardian

2.1.9.1.1. Computer misuse CASES!

2.1.10. Serious Crime Act 2007

2.1.10.1. Facebook during the London riots. The court upheld Jordan Blackshaw and Perry Sutcliffe-Keenan's four-year sentences for icitement to commit serious crime using social media.

2.1.11. Digital Economy Act 2010

2.1.11.1. in the Guardian

2.2. Ranganathan's 5 Laws of Library Science

2.2.1. Every reader his/her book

2.2.2. Every book its reader

2.2.3. Save the time of the reader

2.2.4. A library is a growing organism

2.2.5. Books are for use

2.3. mainstreaming of computers driven by social media

3. IR&A

3.1. Theorists

3.1.1. Saracevic

3.1.1.1. relevance

3.1.1.1.1. motivational relevance

3.1.1.1.2. situational relevance

3.1.1.1.3. cognitive relevance

3.1.1.1.4. topical relevance

3.1.1.1.5. system relvance

3.1.2. Ellis

3.1.3. Broeder

3.1.4. Koenemann & Belkin

3.1.5. Kuhlthau

3.1.5.1. Information seeking process ISP

3.1.5.1.1. Initiation

3.1.5.1.2. Selection

3.1.5.1.3. Exploration

3.1.5.1.4. Formulation

3.1.5.1.5. Collection

3.1.5.1.6. Presentation

3.2. Calculations

3.2.1. Raw Frequency tf/dt

3.2.1.1. term frequency (tf)

3.2.1.2. number of terms in a document (dt)

3.2.2. Inverse Document Frequency idft

3.3. Terms & Definitions

3.3.1. Recall

3.3.2. Precision

3.4. Multi-media

3.4.1. Image

3.4.1.1. Visual properties, Content-Based Image Retrieval, CBIR

3.4.1.1.1. colour-based retrieval

3.4.2. Video

3.4.2.1. Basic retrieval unit is a shot, summarised by a key frame. Basic approach then similar to images

3.4.2.1.1. Scene detection

3.4.2.1.2. Movement detection

3.4.3. Audio

3.4.3.1. Index features (representation and matching are problematic, because of the dynamic time aspect of audio).

3.4.3.1.1. Simplified procedure, which which gives a vector of features for each sample

3.4.3.1.2. Features

3.4.4. Speech

3.4.4.1. Speech recognition using a model to produce text, then text retrieval.

3.4.4.1.1. Acoustic model. Simplest approach. Prone to error.

3.4.4.1.2. Language model takes into account expected word sequences

3.4.5. Keyword-Based Annotation

3.4.5.1. text surrounding an image

3.4.5.2. text extraction from an image

3.4.5.3. text pointing to an image

3.4.5.4. the Alt and Caption attributes of an image

3.4.5.5. file name of an image

4. Managing Information Systems

4.1. Information Services

4.1.1. Information Strategy

4.1.1.1. Earl's 4 Components

4.1.1.1.1. Information Management

4.1.1.1.2. Information Technology

4.1.1.1.3. Information Systems

4.1.1.1.4. Information Content

4.1.1.2. Enterprise Architecture Frameworks

4.1.1.2.1. TOGAF

4.1.1.2.2. Zachmann

4.1.1.2.3. Strategic Plan

4.1.1.3. Systems Thinking Models

4.1.1.3.1. Components

4.1.1.3.2. Characteristics

4.1.1.3.3. Views

4.1.1.3.4. Process Notation

4.1.1.3.5. Processess