Results 91 to 100 of about 12,718,181 (237)

Blockchain-Based Digital Evidence Inventory

open access: yesJournal of Advances in Information Technology, 2019
This paper proposes the use of a blockchainbased structure in order to store evidences in a digital forensics investigation. The traditional chain of evidence is augmented with properties of immutability and traceability, thanks to a cryptographic ...
D. Billard
semanticscholar   +1 more source

Blockchain based chain of custody and digital evidence legality in post conflict prosecutions

open access: yesFrontiers in Blockchain
Digital evidence has become central in post-conflict prosecutions for terrorism, war crimes, and organized violence, especially when material is recorded by civilians, NGOs, and digital platforms.
Ibrahim Ahmed Haji   +2 more
doaj   +1 more source

Challenging Assumptions about IT skills in Higher Education [PDF]

open access: yes, 2013
This paper challenges the idea of 'the digital native' and the subsequent assumption of digital literacy skills amongst higher education students. It offers clear evidence that current student populations come from a wider range of backgrounds than the ...
Farrell, SG
core  

Certain aspects of criminal evidence and digital evidence

open access: yesАналітично-порівняльне правознавство
The evolution of digital technology has revolutionized the landscape of criminal investigations and legal proceedings. This paper delves into the nuanced realm of evidence, with a particular focus on digital evidence, which has become increasingly ...
Jakub Matis
doaj   +1 more source

Changing Light: a plethora of digital tools as slides gasp their last? [PDF]

open access: yes, 2010
The title 'Changing Light' reflects the enormous changeover from analogue slides to digital images, both a cultural shift and a physical shift down to the change in light from the smoky beams of dual slide projectors piercing the dark of a classroom, to ...
Gramstadt, Marie-Therese
core   +1 more source

B-DEC: Digital Evidence Cabinet based on Blockchain for Evidence Management

open access: yesInternational Journal of Computer Applications, 2019
Digital evidence handling and preservation are one stage of digital forensic process. This part is very crucial because digital evidence is the basis of digital forensic process.
Eko Yunianto   +2 more
semanticscholar   +1 more source

Cyber terrorism

open access: yesAnalele Ştiinţifice ale Universităţii "Al.I. Cuza" din Iaşi. Ştiinţe Juridice
The present article aims to analyze the current means by which the phenomenon of terrorism, also known as cyber terrorism, is carried out, the reasoning behind this transition from the already known manifestations to contemporary ones, as well as the ...
Ioana ŢURCANU
doaj   +1 more source

Patient characteristics associated with objective measures of digital health tool use in the United States: A literature review. [PDF]

open access: yes, 2020
The study sought to determine which patient characteristics are associated with the use of patient-facing digital health tools in the United States.We conducted a literature review of studies of patient-facing digital health tools that objectively ...
Acharya, Prasad   +6 more
core  

Application of multiple criteria decision making in the selection of digital forensics software / Применение многокритериального принятия решений при выборе программного обеспечения цифровой форензики / Primena višekriterijumskog odlučivanja u izboru softvera digitalne forenzike

open access: yesVojnotehnički Glasnik, 2016
Nowadays there is almost no criminal offense in the investigation of which digital evidence does not play a key role. Constant increase of the capacity of media that store digital data leads to continuous increase of the time necessary to identify and ...
Dejan R. Stanivuković   +1 more
doaj   +1 more source

A model for digital preservation repository risk relationships [PDF]

open access: yes, 2012
The paper introduces the Preserved Object and Repository Risk Ontology (PORRO), a model that relates preservation functionality with associated risks and opportunities for their mitigation.
McHugh, A.
core  

Home - About - Disclaimer - Privacy