Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Malcolm W. Corney is active.

Publication


Featured researches published by Malcolm W. Corney.


annual computer security applications conference | 2002

Gender-preferential text mining of e-mail discourse

Malcolm W. Corney; O. de Vel; Alison Anderson; George M. Mohay

This paper describes an investigation of authorship gender attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a support vector machine learning algorithm. Experiments using a corpus of e-mail documents generated by a large number of authors of both genders gave promising results for author gender categorisation.


Faculty of Science and Technology; Information Security Institute | 2002

E-Mail Authorship Attribution for Computer Forensics

Olivier Y. de Vel; Alison Anderson; Malcolm W. Corney; George M. Mohay

In this chapter, we briefly overview the relatively new discipline of computer forensics and describe an investigation of forensic authorship attribution or identification undertaken on a corpus of multi-author and multi-topic e-mail documents. We use an extended set of e-mail document features such as structural characteristics and linguistic patterns together with a Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents generated by different authors on a set of topics gave promising results for multi-topic and multi-author categorisation.


technical symposium on computer science education | 2014

'explain in plain english' questions revisited: data structures problems

Malcolm W. Corney; Sue Fitzgerald; Brian Hanks; Raymond Lister; Renée McCauley; Laurie Murphy

Recent studies have linked the ability of novice (CS1) programmers to read and explain code with their ability to write code. This study extends earlier work by asking CS2 students to explain object-oriented data structures problems that involve recursion. Results show a strong correlation between ability to explain code at an abstract level and performance on code writing and code reading test problems for these object-oriented data structures problems. The authors postulate that there is a common set of skills concerned with reasoning about programs that explains the correlation between writing code and explaining code. The authors suggest that an overly exclusive emphasis on code writing may be detrimental to learning to program. Non-code writing learning activities (e.g., reading and explaining code) are likely to improve student ability to reason about code and, by extension, improve student ability to write code. A judicious mix of code-writing and code-reading activities is recommended.


Fuel | 1988

Retention and degradation of organics in Rundle waste shale/retort water mixtures

Malcolm W. Corney; P.R.F. Bell

Batch, column and field lysimeter studies have been conducted to evaluate the concept of codisposal of retort water with Rundle (Queensland, Australia) waste shales. The batch studies indicated that degradation of a significant proportion of the total organic load occurs if the mixture is seeded with soil or compost. These results are compared with those from laboratory column studies and from the field lysimeter at the Rundle site. G.c.-m.s. analysis of some of the eluants indicated that significant degradation of the base-neutral fraction occurs even if no soil seed is added, and that degradation of this fraction was higher under anaerobic conditions.


international conference on digital forensics | 2011

Detecting Collusive Fraud in Enterprise Resource Planning Systems

Asadul K. Islam; Malcolm W. Corney; George M. Mohay; Andrew J. Clark; Shane Bracher; Tobias Raub; Ulrich Flegel

In todays technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.


Faculty of Science and Technology; Information Security Institute | 2001

Multi-Topic E-mail Authorship Attribution Forensics

Olivier Y. de Vel; Alison Anderson; Malcolm W. Corney; George M. Mohay


Archive | 2003

Analysing e-mail text authorship for forensic purposes

Malcolm W. Corney


australasian computing education conference | 2010

Engaging students in programming

Malcolm W. Corney; Donna Teague; Richard Thomas


australasian computing education conference | 2012

Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions

Malcolm W. Corney; Donna Teague; Alireza Ahadi; Raymond Lister


australasian computing education conference | 2011

Early relational reasoning and the novice programmer: swapping as the hello world of relational reasoning

Malcolm W. Corney; Raymond Lister; Donna Teague

Collaboration


Dive into the Malcolm W. Corney's collaboration.

Top Co-Authors

Avatar

George M. Mohay

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Donna Teague

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Alison Anderson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Clark

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Olivier Y. de Vel

Defence Science and Technology Organisation

View shared research outputs
Top Co-Authors

Avatar

Roheena Q. Khan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge