Helen Ashman's research while affiliated with University of South Australia and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (114)


Understanding roles in collaborative information behaviour: a case of Chinese group travelling
  • Article

July 2021

·

128 Reads

·

9 Citations

Information Processing & Management

·

·

·

[...]

·

A group trip entails collaborative information behaviour (CIB) of multiple actors seeking, sharing, and using travel-related information. However, there is a lack of investigation on how people choose to assume or be appointed different CIB roles during such leisure projects. Thus, limited information support is provided to travellers involved in group trips. This article investigates role adoption to show how group travellers involved in CIB through different actions. A naturalistic inquiry on CIB was conducted with 20 travel groups from mainland China to Australia. Of these, 36 real tourists participated in the study through initial demographic questionnaires, pre- and post-trip interviews, and self-reported diaries during the travel. Data were analysed using iterative coding guided by the constructivist grounded theory. Results suggested the complexity of CIB among group travellers. Besides searching together as equal peers, most group travellers voluntarily assume different CIB roles which are often implicit. Six distinct CIB roles were identified, including team player, all-rounder, influencer, authoritarian, supporter, and follower. Furthermore, the distribution of such roles in a travel group was examined and classified into five patterns. The findings also contribute to information seeking research in tourism discipline. Practical implications are provided regarding system support for collaborative work and tourism information provision.

Share

Personalised Web search and user satisfaction: a user-centred evaluation.

January 2020

·

30 Reads

·

1 Citation

Introduction. Most university students depend significantly, sometimes exclusively, on the Google search engine for their academic information needs. User satisfaction leads to users’ deeper engagement with an information system that is shown to improve learning in an educational setting. This paper evaluates students’ satisfaction with results from personalised Web search against non-personalised Web search. Method. During semi-structured study sessions, twenty-eight participants (university students) were required to complete a series of search tasks using both personalised and non-personalised Web search. Analysis. Evaluation was based on participants’ explicit feedback as well as their implicit behaviour including search time, number of queries and clicked result links per task, finding the answer and relevance of the search results. Results. There was no apparent significant increase in the participants’ overall level of satisfaction with personalised search results compared to non-personalised results. However, it was found that personalised search reduced the time spent to finish a task and reduced the number of clicks required to arrive at the selected outcome. Conclusions. Personalisation of search results does not increase students' satisfaction with their search results. However, it does reduce the time spent by students in locating information they judged to be satisfactory answers to their questions.


“Active followers”: An emerging role of information behaviour among group holiday makers
  • Conference Paper
  • Full-text available

October 2019

·

83 Reads

·

1 Citation

Proceedings of the Association for Information Science and Technology

In an era of information overload, people often work together on information‐intensive projects. Group holidaying is such an example where people plan and conduct trips together. In this poster paper we present preliminary findings from an ongoing investigation of collaborative information behaviour of group holidaymakers. Through a grounded‐theory approach, preliminary findings show that not all members of the travel group engage equally in the information search. A role labelled “active followers” is identified and the role‐taker's contribution to the group's information seeking and decision‐making is discussed. This paper calls for attention to heterogeneity within collaborating groups and invites further discussion of research into this topic in information science community.

Download

Young Chinese Tourists' Motivations to Engage in Collaborative Information Behaviour for Group Holidays Research-in-Progress

July 2019

·

337 Reads

·

2 Citations

This paper reports work in progress from an ongoing investigation of young Chinese tourists' collaborative information behaviour (CIB). Much existing research around CIB focuses on information seeking episodes while the circumstances where CIB occurs remain unclear. This study addresses this gap by investigating motivations to engage in CIB, paving the way towards a holistic perspective of CIB process. Following a grounded theory approach, data was collected from seven groups of young Chinese independent tourists travelling to Australia via interviews and self-kept diaries. Preliminary results revealed group holidaymakers' broad and complex information needs falling into three categories, with properties being evolving and dynamic. Five dimensions of motivations to engage in CIB were identified, including gathering rich information, shaping specific information needs, sharing information seeking workload, accommodating each member's preferences and opinions, and sense of participation. We present these emerging results, provide design implications on tourist-centred information systems, and propose further research directions.


Table 2 . Negative identification summary of formal language
Table 4 . Negative identification summary of natural language
Profiling and Identifying Individual Users by Their Command Line Usage and Writing Style

August 2018

·

70 Reads

Knowledge Engineering and Data Science

Profiling and identifying individual users is an approach for intrusion detection in a computer system. User profiles are important in many applications since they record highly user-specific information - profiles are basically built to record information about users or for users to share experiences with each other. This research extends previous research on re-authenticating users with their user profiles. This research focuses on the potential to add psychometric user characteristics into the user model so as to be able to detect unauthorized users who may be masquerading as a genuine user. There are five participants involved in the investigation for formal language user identification. Additionally, we analyze the natural language of two famous writers, Jane Austen & William Shakespeare, in their written works to determine if the same principles can be applied to natural language use. This research used the n-gram analysis method for characterizing user’s style, and can potentially provide accurate user identification. As a result, n-gram analysis of a user's typed inputs offers another method for intrusion detection as it may be able to both positively and negatively identify users. The contribution of this research is to assess the use of a user’s writing styles in both formal language and natural language as a user profile characteristic that could enable intrusion detection where intruders masquerade as real users.


Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II

August 2018

·

26 Reads

In this paper, a digital investigation of electronic (e)-banking services on the Windows Phone platform of nine Indonesian banks is undertaken. In the experiments, banking transactions (balance check, funds transfer and phone credit purchase) are performed using a Nokia Lumia 625. The digital evidence resulting from these transactions is acquired and analyzed using mobile forensic tools from Cellebrite and Micro Systemation AB. In order to reconstruct the transaction events, evidence objects are identified and related events are sequenced. Specifically, the findings relating to mobile banking activities identify eight digital evidence objects (SMS, email, call log, contact, media file, network packets, location and installed apps), and a physical object (account book - obtained from a physical investigation). Investigation questions of who, what, when and how are answered from the acquired evidence and the event sequence diagrams. The findings contribute to a better understanding of available mobile banking evidence on Windows Phone devices.


An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II

August 2018

·

116 Reads

·

2 Citations

This study examines the usage of multimedia presentations with a particular focus on the presentation phase within a trial context. The aim is to understand the extent to which multimedia presentations increase a lay person’s understanding of technical terms and concepts in digital forensics. A questionnaire-based survey was conducted in Japan with 25 participants attending the United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) 160th international training course entitled “Contemporary Digital Forensic Investigations”. Multimedia presentations in the form of videos were played with the aim of explaining three concepts: cloud computing, botnet and forensic file recovery. The findings of our survey showed that 84% of the participants had a better understanding after watching the videos. These results both support and extend findings from our previous research studies. The discussion on material classification, background culture and language issues, video material, and other tools that would facilitate understanding and the needs of an expert provide guidance for the practical implementation of multimedia presentations for their usage in a courtroom setting.



An Evidence-based Forensic Taxonomy of Windows Phone Dating Apps

May 2018

·

114 Reads

·

6 Citations

Journal of Forensic Sciences

Advances in technologies including development of smartphone features have contributed to the growth of mobile applications, including dating apps. However, online dating services can be misused. To support law enforcement investigations, a forensic taxonomy that provides a systematic classification of forensic artifacts from Windows Phone 8 (WP8) dating apps is presented in this study. The taxonomy has three categories, namely: Apps Categories, Artifacts Categories, and Data Partition Categories. This taxonomy is built based on the findings from a case study of 28 mobile dating apps, using mobile forensic tools. The dating app taxonomy can be used to inform future studies of dating and related apps, such as those from Android and iOS platforms.


Pilot group experimental pre-conditions.
Privacy and Brain-Computer Interfaces: method and interim findings

October 2017

·

156 Reads

·

7 Citations

ORBIT Journal

Brain-Computer Interfaces (BCIs) are emerging technologies that acquire and translate neural data, applying that data to the control of other systems. Privacy has been identified as an ethical issue possibly arising from the use of BCIs. The research reported in this paper seeks to identify whether BCIs change privacy and if so, how and why. Interim findings are presented before outlining future research opportunities.


Citations (73)


... Then, each was asked to fill out a post-task questionnaire to measure their satisfaction level regarding using Google. The finding concluded that students were satisfied with using it [30]. Therefore, it can be said that one of the ways to examine students' information-seeking behaviour start by measuring both the changes and the impacts which are appeared due to the availability of modern information sources and their new applications that offers such resources. ...

Reference:

Information Seeking Behaviour of Distance Learners: What has Changed During the Covid-19?
Personalised Web search and user satisfaction: a user-centred evaluation.
  • Citing Article
  • January 2020

... Trip-planning and travelling is an obvious example of collaborative information behaviour (CIB), where travel mates need to work together in information searching, sensemaking and decision-making while planning and conducting their holiday (Karunakaran, Reddy, & Spence, 2013;Ye et al., 2019). This leisure activity provides a rich context for researchers to investigate the various roles of collaborative information behaviour in non-work situations and everyday life. ...

Young Chinese Tourists' Motivations to Engage in Collaborative Information Behaviour for Group Holidays Research-in-Progress

... Group trip planning provides a rich context to explore CIB (Fardous et al., 2019;Mohammad Arif et al., 2015;Ye et al., 2019a). It is only recently that CIB research was extended to the field of tourism. ...

“Active followers”: An emerging role of information behaviour among group holiday makers

Proceedings of the Association for Information Science and Technology

... Such analysis may then further inform the interpretation and attribution, and the findings are likely to be eventually presented in the form of expert reports, depositions, and testimonies in any legal or civil proceedings [1][2][3] (Ab Rahman et al., 2017). Unlike most cyber security incident investigations, a digital forensic investigation needs to ensure the validity, reliability and soundness of the evidence, and that the processes (including tools and techniques used in the acquisition and analysis of evidence) and findings are properly documented in the forensic report, in order to be admissible in a court of law [4][5][6]. ...

An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II
  • Citing Chapter
  • August 2018

... While unpopular memes are visible briefly when they are first posted, popular memes are widely viewed. One study manipulated the scores received by Reddit posts, finding that by providing 10 upvotes soon after the content was posted, they could greatly increase the posts' chances of going viral (Carman et al. 2018). This can explain the heavy-tailed distribution of popularity measures on many sites, including in our Reddit data. ...

Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting
  • Citing Conference Paper
  • August 2018

... While no specific research has been conducted relating to identifying a user from dating app data, there is literature that is relevant in a number of different areas, includ-ing data that is being transmitted (Packet Capture) [7,22,23,24], OSINT and trilateration of users [25,26,27,28,29], along with forensic analysis of mobile phones [30,31,32,33], and backups of those devices. ...

An Evidence-based Forensic Taxonomy of Windows Phone Dating Apps
  • Citing Article
  • May 2018

Journal of Forensic Sciences

... Social contexts give rise to privacy, regardless of the technical nature or medium of the context. Privacy is an intrinsic and pliant feature of social contexts, shaped by social contexts and to a lesser extent, shaping of social contexts (Wahlstrom, Fairweather, & Ashman, 2017). One social context which explicates the ethical tension between privacy and the integrity of data is the right to be forgotten. ...

Privacy and Brain-Computer Interfaces: method and interim findings

ORBIT Journal

... However it may raise ethical concerns, the practice of investigating and inquiring about other people's online accounts and profiles for legitimate reasons in a way can actually be beneficial. Such investigations can be a valuable tool for governments, law enforcement 4 agencies, and even concerned & aware individual users to resolve conflicts and crimes, as they can help identify potential suspects and connections to better increase the efforts for online ecosystem safety (Eterovic-Soric et al, 2017). Additionally, analyzing algorithms and monitoring online activity can assist in preventing cyber misconduct and maintaining cybersecurity, becoming essential components of modern cybersecurity strategies (Pour et al, 2023). ...

Stalking the stalkers – detecting and deterring stalking behaviours using technology: A review
  • Citing Article
  • September 2017

Computers & Security

... A number of forensic taxonomies that provide a systematic classification of forensic artifacts from different Android mobile app categories [36,37,38] and Windows Phone mobile app categories have been presented in the literature [39,40]. However, existing ontology-based approaches and (mobile app artifact) forensic taxonomies do not provide a knowledge 'template' that can be used to facilitate knowledge sharing (we also refer interested reader to [41] for a comparison of some of these approaches). ...

An Evidence-Based Forensic Taxonomy of Windows Phone Communication Apps
  • Citing Article
  • August 2017

Journal of Forensic Sciences

... In this case, the original document remains unmodified on the origin server, while the contributions are stored in external link-and data-bases and added to the document on request. Two standards were primarily proposed by the W3C to support such collaboration, XLink [DMD01] and Annotea [KKPS01], and a lot of systems exploit on them, like Goate [MA02], XLinkProxy [CFRV02] and XLinkZilla [DIMV05]. Yet, external annotations and links meet only some of the desired functionalities of a sharable editing environment, since users can only add a single extra layer of annotations onto the original documents, rather than freely collaborate on the document production. ...

Goate: XLink and beyond
  • Citing Conference Paper
  • January 2002