Results 11 to 20 of about 20,944 (204)

A Novel Hybrid Method for Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

open access: yesJournal of Information Security and Cybercrimes Research, 2023
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a
Mohamed Ghane   +4 more
doaj   +1 more source

Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]

open access: yes, 2020
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core   +2 more sources

SOME TYPES OF COMPUTER CRIME AND CYBERCRIME IN UKRAINE

open access: yesAccess to Justice in Eastern Europe, 2021
In this note, the most frequent types of computer crime on the Internet in Ukraine are analysed. It is suggested that international experience in computer crime investigation should be used to combat this because cybercrime has become an international
Stratonov Vasyl, Slinko Dmitro
doaj   +1 more source

Transnational gathering of electronic evidences: challenges and perspectives in the European Union [PDF]

open access: yesRevista Institutului Naţional de Justiţie, 2022
It is well-known that transnational data flows are rising simultaneously with the increasing use of social media, webmail, messaging services, and apps to communicate, work, socialize and gain information, unfortunately, including also unlawful purposes.
Armen OGANESEAN
doaj   +1 more source

Investigating cybercrime

open access: yesTehnika, 2022
High-tech environment is overwhelmed with threats and challenges. On the other hand, cyberspace is all about software and hardware being used to make a grid of the interconnected devices. The emerging technologies seek a technical skill to be managed and protected.
openaire   +2 more sources

Cyber Espionage in the International and Costa Rican Law: A Form of Violation of the Human Right to Privacy

open access: yesAnuario de Derechos Humanos, 2016
Cybercrime is a dangerous consequence of the evolution of information technology. This is how it is conceptualized the issues addressed in this paper. As a methodology, it is discussed and analysed published articles, Costa Rican law, and international ...
Jonathan Masís Solís
doaj   +1 more source

Cybercrime money laundering cases and digital evidence [PDF]

open access: yesStrani pravni život, 2022
The widespread dependence on digital systems and increased value of digital commerce in the metaverse boosted cyber vulnerability. The cybercrime will be more profitable than the global trade of all major illegal drugs combined, while Cybersecurity ...
Matić-Bošković Marina M.
doaj  

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

open access: yesJournal of Information Science Theory and Practice, 2023
Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often
Abdullahi Aminu Kazaure   +2 more
doaj   +1 more source

Forensic and technical criminalistics support in cybercrime investigation

open access: yesRevista Científica General José María Córdova, 2022
The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ...
Andrii Padalka
doaj   +1 more source

PRECEPT:a framework for ethical digital forensics investigations [PDF]

open access: yes, 2020
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able ...
Ferguson, R.I.   +3 more
core   +9 more sources

Home - About - Disclaimer - Privacy