Results 91 to 100 of about 12,718,181 (237)
Blockchain-Based Digital Evidence Inventory
This paper proposes the use of a blockchainbased structure in order to store evidences in a digital forensics investigation. The traditional chain of evidence is augmented with properties of immutability and traceability, thanks to a cryptographic ...
D. Billard
semanticscholar +1 more source
Blockchain based chain of custody and digital evidence legality in post conflict prosecutions
Digital evidence has become central in post-conflict prosecutions for terrorism, war crimes, and organized violence, especially when material is recorded by civilians, NGOs, and digital platforms.
Ibrahim Ahmed Haji +2 more
doaj +1 more source
Challenging Assumptions about IT skills in Higher Education [PDF]
This paper challenges the idea of 'the digital native' and the subsequent assumption of digital literacy skills amongst higher education students. It offers clear evidence that current student populations come from a wider range of backgrounds than the ...
Farrell, SG
core
Certain aspects of criminal evidence and digital evidence
The evolution of digital technology has revolutionized the landscape of criminal investigations and legal proceedings. This paper delves into the nuanced realm of evidence, with a particular focus on digital evidence, which has become increasingly ...
Jakub Matis
doaj +1 more source
Changing Light: a plethora of digital tools as slides gasp their last? [PDF]
The title 'Changing Light' reflects the enormous changeover from analogue slides to digital images, both a cultural shift and a physical shift down to the change in light from the smoky beams of dual slide projectors piercing the dark of a classroom, to ...
Gramstadt, Marie-Therese
core +1 more source
B-DEC: Digital Evidence Cabinet based on Blockchain for Evidence Management
Digital evidence handling and preservation are one stage of digital forensic process. This part is very crucial because digital evidence is the basis of digital forensic process.
Eko Yunianto +2 more
semanticscholar +1 more source
The present article aims to analyze the current means by which the phenomenon of terrorism, also known as cyber terrorism, is carried out, the reasoning behind this transition from the already known manifestations to contemporary ones, as well as the ...
Ioana ŢURCANU
doaj +1 more source
Patient characteristics associated with objective measures of digital health tool use in the United States: A literature review. [PDF]
The study sought to determine which patient characteristics are associated with the use of patient-facing digital health tools in the United States.We conducted a literature review of studies of patient-facing digital health tools that objectively ...
Acharya, Prasad +6 more
core
Nowadays there is almost no criminal offense in the investigation of which digital evidence does not play a key role. Constant increase of the capacity of media that store digital data leads to continuous increase of the time necessary to identify and ...
Dejan R. Stanivuković +1 more
doaj +1 more source
A model for digital preservation repository risk relationships [PDF]
The paper introduces the Preserved Object and Repository Risk Ontology (PORRO), a model that relates preservation functionality with associated risks and opportunities for their mitigation.
McHugh, A.
core

