Entity

Time filter

Source Type

Kristiansand, Norway

Drange T.,Noroff University College
Proceedings of the International Conferences on Interfaces and Human Computer Interaction 2014, Game and Entertainment Technologies 2014 and Computer Graphics, Visualization, Computer Vision and Image Processing 2014 - Part of the Multi Conference on Computer Science and Information Systems, MCCSIS 2014 | Year: 2014

Those individuals born from 1982 onwards possess a familiarity towards Internet media and communication not experienced by previous generations. Often labelled Millennials, these individuals have grown up with the wide variety of social interactions supported by the Internet. A large number of these individuals have chosen to pursue education online; the number of students taking online courses has been drastically increasing for many years, and continues to grow. This paper presents a case study examining some of the issues of Millennial students and Generation X academics in particular focusing on the communication challenges that arise. The result of Millennial students with minimal faceto- face interacting skills communicate with lecturers and tutors from the Generation X, with noticeably more face-to-face experience. Copyright © 2014 IADIS Press All rights reserved.


Drange T.,Noroff University College | Kargaard J.,Noroff Vocational School
Proceedings of the International Conferences on Interfaces and Human Computer Interaction 2015, IHCI 2015, Game and Entertainment Technologies 2015, GET 2015 and Computer Graphics, Visualization, Computer Vision and Image Processing 2015, CGVCVIP 2015 - Part of the Multi Conference on Computer Science and Information Systems 2015 | Year: 2015

We are using Moodle as a learning platform in both Bachelor programs and in vocational education offerings, and how learning content is presented through this platform has always been a matter of taste. There are several things to care for in implementing a functional structure of learning content, both from the student's perspective, from the educator's perspective and from the administrator's perspective. We have recently changed the structure of our Bachelor level courses, and with this paper we would like to share our experience with examples and comments from all stakeholders, to provide knowledge in the pursuit of best practices when it comes to the interface that students, educators and administrators are compelled to work with on a daily basis.


Read H.,University of South Wales | Sutherland I.,Noroff University College | Sutherland I.,Edith Cowan University | Xynos K.,University of South Wales | And 2 more authors.
Information Security Journal | Year: 2015

ABSTRACT: Embedded devices are becoming ubiquitous in both domestic and commercial environments. Although smartphones, tablets, and video game consoles are all labeled by their primary function, most of these devices offer additional features and are capable of additional interactivity. Given the proprietary nature of such devices in terms of hardware and software and the protection mechanisms incorporated into these systems, it is and will continue to be extremely difficult to use “traditional digital forensics” methodologies to access storage media and acquire data for analysis. This paper examines how consumer law may be stifling research that the forensic community could ultimately depend upon to examine devices. Copyright © Taylor & Francis Group, LLC.


Read H.,University of South Wales | Read H.,Noroff University College | Xynos K.,University of South Wales | Sutherland I.,University of South Wales | And 10 more authors.
Digital Investigation | Year: 2013

Tools created by the computer hacking community to circumvent security protection on hard drives can have unintentional consequences for digital forensics. Tools originally developed to circumvent Microsoft's Xbox 360 hard drive protection can be used, independently of the Xbox 360 system, to change the reported size/model of a hard drive enabling criminals to hide data from digital forensic software and hardware. The availability of such concealment methods raises the risk of evidence being overlooked, particularly as triage and on-scene inspections of digital media become more common. This paper presents two case studies demonstrating the process using Western Digital and Fujitsu branded drives. It outlines the difficulties faced by standard computer forensic analysis techniques in revealing the true nature of the drive and finally provides suggestions for extra checks to reveal this type of concealment. © 2013 Elsevier Ltd. All rights reserved.


Sutherland I.,University of South Wales | Sutherland I.,ECU Security Research Institute | Sutherland I.,Noroff University College | Read H.,University of South Wales | And 2 more authors.
Digital Investigation | Year: 2014

A number of new entertainment systems have appeared on the market that have embedded computing capabilities. Smart Televisions have the ability to connect to networks, browse the web, purchase applications and play games. Early versions were based on proprietary operating systems; newer versions released from 2012 are based on existing operating systems such as Linux and Android. The question arises as to what sort of challenges and opportunities they present to the forensics examiner. Are these new platforms or simply new varieties of existing forms of devices? What data do they retain and how easy is it to access this data? This paper explores this as a future forensic need and asks if we are missing potential sources of forensic data and to what degree we are ready to process these systems as part of an investigation. © 2014 Elsevier Ltd.

Discover hidden collaborations