default search action
Mark Taylor 0005
Person information
- affiliation: Liverpool John Moores University, UK
Other persons with the same name
- Mark Taylor — disambiguation page
- Mark Taylor 0001 — IBM Microelectronics, Essex Junction, VT, USA
- Mark Taylor 0002 — Flinders University, College of Science and Engineering, Adelaide, SA, Australia (and 2 more)
- Mark Taylor 0003 (aka: Mark B. Taylor) — University of Bristol, Department of Physics, UK
- Mark Taylor 0004 — Sandia National Laboratory, Albuquerque, NM, USA
- Mark Taylor 0006 — Society for Information Management
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j40]Denis Reilly, Mark Taylor, Paul Fergus, Carl Chalmers, Steven Thompson:
The Categorical Data Conundrum: Heuristics for Classification Problems - A Case Study on Domestic Fire Injuries. IEEE Access 10: 70113-70125 (2022) - 2021
- [j39]Denis Reilly, Mark Taylor, Paul Fergus, Carl Chalmers, Steven Thompson:
Misper-Bayes: A Bayesian Network Model for Missing Person Investigations. IEEE Access 9: 49990-50000 (2021) - [j38]Robert Hegarty, Mark Taylor:
Digital evidence in fog computing systems. Comput. Law Secur. Rev. 41: 105576 (2021) - [j37]Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, Martin Randles:
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Trans. Internet Techn. 21(3): 54:1-54:23 (2021) - 2020
- [j36]Mohammed Al-Khafajiy, Thar Baker, Muhammad Asim, Zehua Guo, Rajiv Ranjan, Antonella Longo, Deepak Puthal, Mark Taylor:
COMITMENT: A Fog Computing Trust Management Approach. J. Parallel Distributed Comput. 137: 1-16 (2020)
2010 – 2019
- 2019
- [j35]Mark Taylor, Mike Baskett, Denis Reilly, Somasundaram Ravindran:
Game Theory for Computer Games Design. Games Cult. 14(7-8): 843-855 (2019) - 2018
- [c14]Suparawadee Trongtortam, Hulya Francis, Mark Taylor, Sud Sudirman, Andrew Symons:
Development of a Preliminary Model Guide for Using Mobile Learning Technology in Resource - Limited Primary Schools in Thailand. DeSE 2018: 83-88 - 2017
- [j34]Mark Taylor, Denis Reilly:
Knowledge representation for missing persons investigations. J. Syst. Inf. Technol. 19(1/2): 138-150 (2017) - [j33]Mark Taylor, Denis Reilly, Brett Lempereur:
An access control management protocol for Internet of Things devices. Netw. Secur. 2017(7): 11-17 (2017) - [c13]Hulya Francis, Mark Taylor, Sud Sudirman, Suparawadee Trongtortam, Andrew Symons:
The Attitude towards the Use of Mobile Learning Technology Enhanced Teaching. DeSE 2017: 135-138 - 2016
- [j32]Mark John Taylor, John Haggerty, David Gresty, Chris Wren, Tom Berry:
Avoiding the misuse of social media by employees. Netw. Secur. 2016(5): 8-11 (2016) - 2015
- [j31]Farath N. Arshad, Nonso Nnamoko, James Wilson, Bibhas Roy, Mark Taylor:
Improving Healthcare System Usability Without Real Users: A Semi-Parallel Design Approach. Int. J. Heal. Inf. Syst. Informatics 10(1): 67-81 (2015) - [j30]Mark John Taylor, John Haggerty, David Gresty, Natalia Criado Pacheco, Tom Berry, Peter Almond:
Investigating employee harassment via social media. J. Syst. Inf. Technol. 17(4): 322-335 (2015) - [c12]Mustafa Anil Tuncel, Hulya Francis, Mark Taylor, David Llewellyn-Jones:
Visualdrives Forensic Tool. DeSE 2015: 107-111 - 2014
- [j29]Mark John Taylor, Rod Stables, Bashir Matata, Paulo J. G. Lisboa, Andy Laws, Peter Almond:
Website design: Technical, social and medical issues for self-reporting by elderly patients. Health Informatics J. 20(2): 136-150 (2014) - [j28]John Haggerty, Sheryllynne Haggerty, Mark John Taylor:
Forensic triage of email network narratives through visualisation. Inf. Manag. Comput. Secur. 22(4): 358-370 (2014) - [j27]Mark John Taylor, John Haggerty, David Gresty, Peter Almond, Tom Berry:
Forensic investigation of social networking applications. Netw. Secur. 2014(11): 9-16 (2014) - [c11]John Haggerty, Mark John Taylor:
Retrieval and Analysis of Web Search Narratives for Digital Investigations. INC 2014: 153-162 - 2013
- [c10]John Haggerty, Sheryllynne Haggerty, Mark John Taylor:
Visual Triage of Email Network Narratives for Digital Investigations. EISMC 2013: 102-111 - 2012
- [j26]Mark Taylor, Glyn Hughes, John Haggerty, David Gresty, Peter Almond:
Digital evidence from mobile telephone applications. Comput. Law Secur. Rev. 28(3): 335-339 (2012) - [j25]John Haggerty, Mark C. Casson, Sheryllynne Haggerty, Mark John Taylor:
A Framework for the Forensic Analysis of User Interaction with Social Media. Int. J. Digit. Crime Forensics 4(4): 15-30 (2012) - [j24]Mark Taylor, Emma Higgins, Paulo Lisboa:
Testing geographical information systems: a case study in a fire prevention support system. J. Syst. Inf. Technol. 14(3): 184-199 (2012) - [c9]John Haggerty, Mark C. Casson, Sheryllynne Haggerty, Mark John Taylor:
Forensic Analysis of User Interaction with Social Media: A Methodology. WDFIA 2012: 66-75 - 2011
- [j23]Mark Taylor, John Haggerty, David Gresty, Tom Berry:
Digital evidence from peer-to-peer networks. Comput. Law Secur. Rev. 27(6): 647-652 (2011) - [j22]John Haggerty, Alexander John Karran, David J. Lamb, Mark John Taylor:
A Framework for the Forensic Investigation of Unstructured Email Relationship Data. Int. J. Digit. Crime Forensics 3(3): 1-18 (2011) - [j21]Mark John Taylor, John Haggerty, David Gresty, David J. Lamb:
Forensic investigation of cloud computing systems. Netw. Secur. 2011(3): 4-10 (2011) - [c8]Paul Fergus, Mark Taylor, Madjid Merabti, John Haggerty, L. Bracegirdle:
Expanding Tele-care: Using Motion Sensors for Monitoring Purposes. DeSE 2011: 19-23 - [c7]Rabea Kurdi, A. Taleb-Bendiab, Martin Randles, Mark John Taylor:
E-Government Information Systems and Cloud Computing (Readiness and Analysis). DeSE 2011: 404-409 - [c6]Alexander John Karran, John Haggerty, David J. Lamb, Mark John Taylor, David Llewellyn-Jones:
A Social Network Discovery Model for Digital Forensics Investigations. WDFIA 2011: 160-170 - [p1]Paul Fergus, John Haggerty, Mark John Taylor, L. Bracegirdle:
Towards a Whole Body Sensing Platform for Healthcare Applications. Whole Body Interaction 2011: 135-149 - 2010
- [j20]Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate computer usage policies. Comput. Law Secur. Rev. 26(1): 72-76 (2010) - [j19]Mark Taylor, John Haggerty, David Gresty, Robert Hegarty:
Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3): 304-308 (2010) - [j18]Mark John Taylor, John Haggerty, David Gresty, Paul Fergus:
Forensic investigation of peer-to-peer networks. Netw. Secur. 2010(9): 12-15 (2010)
2000 – 2009
- 2009
- [j17]Mark John Taylor, Mike Baskett:
The science and art of computer games development for undergraduate students. Comput. Entertain. 7(2): 24:1-24:9 (2009) - [j16]Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate e-mail investigations. Comput. Law Secur. Rev. 25(4): 372-376 (2009) - [j15]Peter Alasdair Kinloch, Hulya Francis, Michael Francis, Mark Taylor:
Police Operational Planning and Crime Detection through Adopting an Information Systems Approach. J. Inf. Technol. Res. 2(4): 1-16 (2009) - [j14]Mark John Taylor, David C. Pountney:
Animation as an Aid for Higher Education Computing Teaching. Trans. Edutainment 3: 203-218 (2009) - [c5]John Haggerty, David J. Lamb, Mark John Taylor:
Social Network Visualization for Forensic Investigation of E-mail. WDFIA 2009: 81-92 - 2008
- [j13]Mark John Taylor, David C. Pountney, Mike Baskett:
Using animation to support the teaching of computer game development techniques. Comput. Educ. 50(4): 1258-1268 (2008) - [c4]John Haggerty, David Llewellyn-Jones, Mark John Taylor:
FORWEB: file fingerprinting for automated network forensics investigations. e-Forensics 2008: 29 - 2007
- [j12]Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate computer forensic investigations. Comput. Law Secur. Rev. 23(6): 562-566 (2007) - [c3]John Haggerty, Mark John Taylor:
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. SEC 2007: 1-12 - 2006
- [j11]Mark John Taylor, David Gresty, Mike Baskett:
Computer game-flow design. Comput. Entertain. 4(1): 5 (2006) - 2004
- [j10]Mark John Taylor, J. McWilliam, David England, J. Akomode:
Skills required in developing electronic commerce for small and medium enterprises: case based generalization approach. Electron. Commer. Res. Appl. 3(3): 253-265 (2004) - 2003
- [j9]Mark John Taylor, Stephen J. Wade, David England:
Informing IT system Web site design through normalisation. Internet Res. 13(5): 342-355 (2003) - 2002
- [j8]Mark John Taylor, J. McWilliam, H. Forsyth, Stephen J. Wade:
Methodologies and website development: a survey of practice. Inf. Softw. Technol. 44(6): 381-391 (2002) - [j7]Mark John Taylor, J. McWilliam, J. Sheehan, A. Mulhaney:
Maintenance issues in the Web site development process. J. Softw. Maintenance Res. Pract. 14(2): 109-122 (2002) - [c2]Adrianos Evangelidis, J. Akomode, A. Taleb-Bendiab, Mark John Taylor:
Risk Assessment & Success Factors for e-Government in a UK Establishment. EGOV 2002: 395-402 - [c1]Mark John Taylor, J. McWilliam, Stephen J. Wade, W. Anacoura:
A User Centred Website Development Approach. Information Systems: The e-Business Challenge 2002: 171-184 - 2001
- [j6]Mark John Taylor, David Gresty, R. Askwith:
Knowledge for network support. Inf. Softw. Technol. 43(8): 469-475 (2001) - [j5]Mark John Taylor, David England, David Gresty:
Knowledge for Web site development. Internet Res. 11(5): 451-461 (2001)
1990 – 1999
- 1998
- [b1]Mark John Taylor:
Methodologies and software maintenance. University of Salford, UK, 1998 - [j4]Mark John Taylor, Eddie P. Moynihan, A. T. Wood-Harper:
End-user computing and information systems methodologies. Inf. Syst. J. 8(1): 85- (1998) - [j3]Mark John Taylor, Eddie P. Moynihan, Andy Laws:
Training for software maintenance. J. Softw. Maintenance Res. Pract. 10(6): 381-393 (1998) - 1997
- [j2]Mark John Taylor, Eddie P. Moynihan, Trevor Wood-Harper:
Knowledge for software maintenance. J. Inf. Technol. 12(2): 155-166 (1997) - 1996
- [j1]Mark John Taylor, A. T. Wood-Harper:
Methodologies and Software Maintenance. J. Softw. Maintenance Res. Pract. 8(5): 295-307 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint