Malcolm W. Corney
Queensland University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Malcolm W. Corney.
annual computer security applications conference | 2002
Malcolm W. Corney; O. de Vel; Alison Anderson; George M. Mohay
This paper describes an investigation of authorship gender attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a support vector machine learning algorithm. Experiments using a corpus of e-mail documents generated by a large number of authors of both genders gave promising results for author gender categorisation.
Faculty of Science and Technology; Information Security Institute | 2002
Olivier Y. de Vel; Alison Anderson; Malcolm W. Corney; George M. Mohay
In this chapter, we briefly overview the relatively new discipline of computer forensics and describe an investigation of forensic authorship attribution or identification undertaken on a corpus of multi-author and multi-topic e-mail documents. We use an extended set of e-mail document features such as structural characteristics and linguistic patterns together with a Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents generated by different authors on a set of topics gave promising results for multi-topic and multi-author categorisation.
technical symposium on computer science education | 2014
Malcolm W. Corney; Sue Fitzgerald; Brian Hanks; Raymond Lister; Renée McCauley; Laurie Murphy
Recent studies have linked the ability of novice (CS1) programmers to read and explain code with their ability to write code. This study extends earlier work by asking CS2 students to explain object-oriented data structures problems that involve recursion. Results show a strong correlation between ability to explain code at an abstract level and performance on code writing and code reading test problems for these object-oriented data structures problems. The authors postulate that there is a common set of skills concerned with reasoning about programs that explains the correlation between writing code and explaining code. The authors suggest that an overly exclusive emphasis on code writing may be detrimental to learning to program. Non-code writing learning activities (e.g., reading and explaining code) are likely to improve student ability to reason about code and, by extension, improve student ability to write code. A judicious mix of code-writing and code-reading activities is recommended.
Fuel | 1988
Malcolm W. Corney; P.R.F. Bell
Batch, column and field lysimeter studies have been conducted to evaluate the concept of codisposal of retort water with Rundle (Queensland, Australia) waste shales. The batch studies indicated that degradation of a significant proportion of the total organic load occurs if the mixture is seeded with soil or compost. These results are compared with those from laboratory column studies and from the field lysimeter at the Rundle site. G.c.-m.s. analysis of some of the eluants indicated that significant degradation of the base-neutral fraction occurs even if no soil seed is added, and that degradation of this fraction was higher under anaerobic conditions.
international conference on digital forensics | 2011
Asadul K. Islam; Malcolm W. Corney; George M. Mohay; Andrew J. Clark; Shane Bracher; Tobias Raub; Ulrich Flegel
In todays technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.
Faculty of Science and Technology; Information Security Institute | 2001
Olivier Y. de Vel; Alison Anderson; Malcolm W. Corney; George M. Mohay
Archive | 2003
Malcolm W. Corney
australasian computing education conference | 2010
Malcolm W. Corney; Donna Teague; Richard Thomas
australasian computing education conference | 2012
Malcolm W. Corney; Donna Teague; Alireza Ahadi; Raymond Lister
australasian computing education conference | 2011
Malcolm W. Corney; Raymond Lister; Donna Teague