e-crime ()

Areas of Expertise

Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.


Trading Standards
This course investigates open source methods of investigating e-Crime, including mining social media networks and network packets.
FSA PhD Studentship
This studentship is in co-operation with the Financial Services Authority (FSA) and the original aim was to examine an issue in the area of e-commerce that could greatly affect the financial sector. Throughout the course of the research, a framework for the automatic evaluation of web sites has...
Digital forensic Toolkit
This project aims to produce next generation digital forensics tools, using novel methods based on DNA matching.
Information Sharing between the Police and their Community Partners
This is a three year PhD award from the SIPR (Scottish Institute for Policing Research) and focuses on creating new models for information sharing between the police and their community partners.
This work is funded by Scottish Enterprise for a Proof-of-Concept, and involves translating system call information into Digital DNS. It investigates highly authenticated and verifiable digital forensics.


William Buchanan
Director of CDCS
+44 131 455 2759
Mike Dickson
Visiting Academic
+44 131 455
Owen Lo
Research Fellow
+44 131 455
Peter McLaren
+44 131 455
Omair Uthmani
+44 131 455
Alastair Wilson
Visting Academic
+44 131 455
Charley Celice
+44 131 455
Jamie Graves
Affiliate Research Fellow
+44 131 455
Robert Ludwiniak
+44 131 455 2780
Bruce Ramsay
Senior Research Fellow
+44 131 455 2746
Nicole van Deursen (Hazelhoff Roelfze
Research Student
+44 131 455


Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., Russell, G. (2015). Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System. In: (Ed.) Proceedings of HCI International 2015, , () ( ed.). (pp. ). : . .

Kwecka, Z. (2011). Cryptographic Privacy Enhancement Method for Investigative Data Acquisition (PhD). Edinburgh Napier University (Buchanan, W.).

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57 - 81.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010, ). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS ( ed.). : . .

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010, ). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, , () ( ed.). (pp. 131 - 136). Listvyanka: . IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 190-200). Greece: . .

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Greece: . .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 394-402). Greece: . .

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), () ( ed.). : . Inderscience.

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). : . .

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK,: . .

Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security, , () ( ed.). (pp. 47-52). Glamorgan, United Kingdom: . Academic Conferences International.