Searching, Copying and Seizing of Computers, Computer Programs and Files
The rapid progress and stunning developments experienced in the technological world very directly impact all areas of life, including the field of law. One of the most striking impacts in the field of criminal procedures is how criminal acts transfer to ...
Neslihan Ateş Benek
doaj +1 more source
This study compares how the laws in the United States and Brazil handle the use of digital evidence from smartphones in initial criminal investigations.
Rafael Francisco França
doaj +1 more source
Analysis of Procedural Problems in Cybercrime Investigations [PDF]
The approach used to investigate cybercrime in developed nations is examined in this article, along with the innovations that might be implemented in Georgia to ensure successful investigations.
Irakli Nadareishvili, Shota Kakulia
doaj +1 more source
Reuse remix recycle: repurposing archaeological digital data [PDF]
Preservation of digital data is predicated on the expectation of its reuse, yet that expectation has never been examined within archaeology. While we have extensive digital archives equipped to share data, evidence of reuse seems paradoxically limited ...
Huggett, Jeremy
core +1 more source
LogExtractor: Extracting digital evidence from android log messages via string and taint analysis
Mobile devices are increasingly involved in crimes. Therefore, digital evidence on mobile devices plays a more and more important role in crime investigations.
Chris Chao-Chun Cheng +3 more
semanticscholar +1 more source
Investigating visualisation techniques for rapid triage of digital forensic evidence [PDF]
This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation.
Bayne, Ethan, Hales, Gavin
core +2 more sources
An investigation of an MPEG-4 embedded spatial digital watermark developed for tamper detection and characterization [PDF]
The widespread adoption of digital video techniques has generated a requirement for authenticity verification in applications such as criminal evidence, insurance claims and commercial databases.
Bull, DR +3 more
core +2 more sources
Snap Forensics: A Tradeoff between Ephemeral Intelligence and Persistent Evidence Collection [PDF]
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever.
Tun, Thein, Yu, Yijun
core +1 more source
Is Cyberchondria a New Transdiagnostic Digital Compulsive Syndrome? A Systematic Review of the Evidence [PDF]
© 2020 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Background.
Caricasole, Valentina +6 more
core +4 more sources
Digital evidence in fog computing systems
Fog Computing provides a myriad of potential societal benefits: personalised healthcare, smart cities, automated vehicles, Industry 4.0, to name just a few.
R. Hegarty, M. Taylor
semanticscholar +1 more source

