Results 81 to 90 of about 12,718,181 (237)

EviCheck: Digital Evidence for Android [PDF]

open access: yes, 2015
We present EviCheck, a tool for the verification, certification and generation of lightweight fine-grained security policies for Android. It applies static analysis to check the conformance between an application and a given policy. A distinguishing feature of EviCheck is its ability to generate digital evidence: a certificate for the analysis ...
Mohamed Nassim Seghir   +1 more
openaire   +1 more source

On the Creation of Reliable Digital Evidence [PDF]

open access: yes, 2012
Traditional approaches to digital forensics deal with the reconstruction of events within digital devices that were often not built for the creation of evidence. This paper focuses on incorporating requirements for forensic readiness – designing in features and characteristics that support the use of the data produced by digital devices as evidence ...
Nicolai Kuntze   +5 more
openaire   +1 more source

Gender Differences and Digital Learning Games – One Size Does not fit all [PDF]

open access: yes, 2018
The intrinsic motivation demonstrated towards digital games provides the opportunity for its use as a learning tool irrespective of gender differences. This has resulted in the combination of the motivation of games with curricular content referred to as
Bacon, Liz   +2 more
core  

Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework

open access: yesDigital Investigation. The International Journal of Digital Forensics and Incident Response, 2019
In the field of digital forensics it is crucial for any practitioner to possess the ability to make reliable investigative decisions which result in the reporting of credible evidence.
G. Horsman
semanticscholar   +1 more source

PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL

open access: yesIlkom Jurnal Ilmiah, 2019
Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media ...
Muhammad Naim Al Jumah   +2 more
doaj   +1 more source

Perbandingan Tools Forensics pada Fitur TRIM SSD NVMe Menggunakan Metode Live Forensics

open access: yesIT Journal Research and Development, 2020
SSD saat ini memiliki teknologi media penyimpanan yang baru yaitu Solid State Drive Non-volatile Memory Express (SSD NVMe). Selain itu, SSD memiliki fitur bernama TRIM.
Wisnu Pranoto, Imam Riadi, Yudi Prayudi
doaj   +1 more source

Digital Evidence Bags

open access: yes, 2008
This thesis analyses the traditional approach and methodology used to conduct digital forensic information capture, analysis and investigation. The predominant toolsets and utilities that are used and the features that they provide are reviewed. This is used to highlight the difficulties that are encountered due to both technological advances and the ...
openaire   +1 more source

Communication Privacy Management and Digital Evidence in an Intimate Partner Violence Case

open access: yesInternational Journal of Communication, 2019
This article uses a case study of an intimate partner violence criminal case to examine the relationship among communication privacy management, evidence acquisition and retrieval, and the use of digital evidence in criminal court.
Fanny A. Ramirez, Jeffrey Lane
doaj  

The EBAT architecture: An explainable blockchain for legal AI audits

open access: yesÌнформаційні технології та компʼютерна інженерія
The integration of artificial intelligence into high-stakes domains like the justice system presents the “black box problem”, where algorithmic opacity undermines fundamental legal principles and current blockchain-based auditing solutions fail to bridge
O. Shamov
doaj   +1 more source

Automated Inference of Past Action Instances in Digital Investigations

open access: yes, 2014
As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations.
Gladyshev, Pavel, James, Joshua I.
core   +1 more source

Home - About - Disclaimer - Privacy