Results 1 to 10 of about 2,196,975 (184)

Corporate Digital Incident Investigation

open access: yesKvalita Inovácia Prosperita, 2016
Purpose: Information and communication technology are fundamental part of most business entities. Unfortunately, use of these technologies needs to be secured, and in the case that stipulated and legal regulations are not observed, it is very important ...
Jaromír Veber   +2 more
doaj   +3 more sources

Mobile phone encryption as an obstacle in criminal investigation: Review of comparative solutions [PDF]

open access: yesAnali Pravnog Fakulteta u Beogradu, 2021
In detecting criminal offences, the police increasingly rely on electronic evidence. Due to ubiquitous digitization, data in electronic form with probative potential is found in an increasing number of sources.
Pisarić Milana
doaj   +1 more source

Dawn Raids and the Role of Forensic IT in Antitrust Investigations [PDF]

open access: yesYearbook of Antitrust and Regulatory Studies, 2020
While digital markets attract much attention of the antitrust community, important developments also take place in relation to the way antitrust investigations are handled and evidence is preserved.
Jan Polański
doaj   +1 more source

The Language of Deception: Applying Findings on Opinion Spam to Legal and Forensic Discourses

open access: yesLanguages, 2023
Digital forensic investigations are becoming increasingly crucial in criminal investigations and civil litigations, especially in cases of corporate espionage and intellectual property theft as more communication occurs online via e-mail and social media.
Alibek Jakupov   +2 more
doaj   +1 more source

Handwritten Character Recognition Based on Decomposition Extreme Learning Machine [PDF]

open access: yesJisuanji kexue, 2022
Handwritten character recognition(HCR) is an important branch of image recognition,which recognizes the handwritten characters with the data mining and machine learning technologies.Currently,the HCR methods mainly focus on the improvements of different ...
HE Yu-lin, LI Xu, JIN Yi, HUANG Zhe-xue
doaj   +1 more source

PRECEPT:a framework for ethical digital forensics investigations [PDF]

open access: yes, 2020
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able ...
Ferguson, R.I.   +3 more
core   +9 more sources

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

open access: yesJournal of Information Science Theory and Practice, 2023
Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often
Abdullahi Aminu Kazaure   +2 more
doaj   +1 more source

Investigations using digital technology [PDF]

open access: yesE3S Web of Conferences, 2020
Despite the fact that activities of authorized persons in during urgent investigative actions are episodic, the absence of responsibility for successful completion of investigation is unacceptable. In this case, law enforcement agencies are fulfilling a single socially important goal, and this should be realized by the relevant officials. Regarding the
Shuruhnov N.G.   +3 more
openaire   +2 more sources

Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones

open access: yesDrones, 2023
Cyber Security and forensics for Unmanned Aerial Vehicles (UAVs) pose unique requirements, solutions, and challenges. As UAVs become increasingly prevalent for legitimate and illegal use, ensuring their security and data integrity is important. Solutions
Vikas Sihag   +3 more
doaj   +1 more source

Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis

open access: yesJournal of Cybersecurity and Privacy, 2021
The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily.
Moses Ashawa, Sarah Morris
doaj   +1 more source

Home - About - Disclaimer - Privacy