Results 191 to 200 of about 12,533,330 (242)
Some of the next articles are maybe not open access.
2020
With the advent of computers, there came computer-related crimes; hence, there comes the need for cybercrime judicial proceedings. And for any trial, evidence plays an instrumental role in bringing the victim to justice. So, there is a need for digital evidence. Digital crime evidence forms a core for the field of computer forensics.
null Parkavi R. +2 more
openaire +1 more source
With the advent of computers, there came computer-related crimes; hence, there comes the need for cybercrime judicial proceedings. And for any trial, evidence plays an instrumental role in bringing the victim to justice. So, there is a need for digital evidence. Digital crime evidence forms a core for the field of computer forensics.
null Parkavi R. +2 more
openaire +1 more source
International Conference on Electronics, Computer and Computation, 2019
Admissibility of Evidence is the eligibility of particular pieces of evidence for inception as part of the evidence in a case. Admissibility means the character or quality to be accepted and allowed to be presented or introduced as evidence in court.
E. Edward, J. Ojeniyi
semanticscholar +1 more source
Admissibility of Evidence is the eligibility of particular pieces of evidence for inception as part of the evidence in a case. Admissibility means the character or quality to be accepted and allowed to be presented or introduced as evidence in court.
E. Edward, J. Ojeniyi
semanticscholar +1 more source
Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence
International Journal of Strategic Engineering, 2019Various social networking sites (SNSs), widely referred to as social media, provide services such as email, blogging, instant messaging and photo sharing for social and commercial interactions.
R. Montasari +3 more
semanticscholar +1 more source
, 2019
The purpose of this paper is to examine the extent to which line officers in police agencies can identify digital evidence at crime scenes, also known as the binary artifacts stored on computers, mobile devices, tablets and the internet, through an ...
T. Holt +2 more
semanticscholar +1 more source
The purpose of this paper is to examine the extent to which line officers in police agencies can identify digital evidence at crime scenes, also known as the binary artifacts stored on computers, mobile devices, tablets and the internet, through an ...
T. Holt +2 more
semanticscholar +1 more source
Unification of digital evidence from disparate sources (Digital Evidence Bags)
Digital Investigation, 2005This paper outlines a new approach to the acquisition and processing of digital evidence obtained from disparate digital devices and sources. To date the capture of digital based evidence has always been in its entirety from the source device and different methods and containers (file types) are used for different types of digital device (e.g. computer,
openaire +1 more source
2019
The main task of a computer forensics investigator is to acquire and analyze computing devices’ memory images. In a nutshell, a memory image—widely known as a forensic image—is a static snapshot of all or part of the data on a computing devices’ secondary storage (e.g., HDD, SSD), attached storage device (e.g., USB thumb drive, external hard drive ...
openaire +1 more source
The main task of a computer forensics investigator is to acquire and analyze computing devices’ memory images. In a nutshell, a memory image—widely known as a forensic image—is a static snapshot of all or part of the data on a computing devices’ secondary storage (e.g., HDD, SSD), attached storage device (e.g., USB thumb drive, external hard drive ...
openaire +1 more source
2017
In the last decades, the number of digital devices (Yeh and Xing, 2016) has grown exponentially. Digital devices range from mobile phones, computers, car electronics and the like including any instruments containing digital components of evidentiary value.
openaire +3 more sources
In the last decades, the number of digital devices (Yeh and Xing, 2016) has grown exponentially. Digital devices range from mobile phones, computers, car electronics and the like including any instruments containing digital components of evidentiary value.
openaire +3 more sources
The effect of enterprise digital transformation on audit efficiency—Evidence from China
Technological forecasting & social changeThe digital transformation of enterprises is the key to conforming to the trends of the times and realizing reform and innovation. Digital transformation will change the enterprise risk and information environment, and also bring challenges to the audit ...
Aolin Leng, Yue Zhang
semanticscholar +1 more source
2019
In the previous chapter, we’ve covered how to capture/create a forensic image of both RAM and hard drive memories. Now, we are ready to move on to the next part of forensic work, which is analyzing acquired images for interesting leads.
openaire +1 more source
In the previous chapter, we’ve covered how to capture/create a forensic image of both RAM and hard drive memories. Now, we are ready to move on to the next part of forensic work, which is analyzing acquired images for interesting leads.
openaire +1 more source

