Results 41 to 50 of about 2,196,995 (204)

Digital investigation powers and privacy

open access: yesBoom Strafblad, 2021
Digital investigation powers and privacy With the Modernisation of the Code of Criminal Procedure, certain digital investigation powers will for the first time be given a specific statutory basis, such as the search of data carriers, open-source investigation and network searches.
Hirsch Ballin, Marianne, Galič, Maša
openaire   +2 more sources

Part 2:- quality assurance mechanisms for digital forensic investigations: Knowledge sharing and the Capsule of Digital Evidence (CODE)

open access: yesForensic Science International: Reports, 2020
Despite potential numerous benefits, the field-wide sharing of knowledge in digital forensics is arguably still yet to be attained. Achieving this has attracted much practitioner and academic debate, yet solutions to two fundamental hurdles have yet to ...
Graeme Horsman
doaj   +1 more source

Two-Level Blockchain System for Digital Crime Evidence Management

open access: yesSensors, 2021
Digital evidence, such as evidence from CCTV and event data recorders, is highly valuable in criminal investigations, and is used as definitive evidence in trials. However, there are risks when digital evidence obtained during the investigation of a case
Donghyo Kim, Sun-Young Ihm, Yunsik Son
doaj   +1 more source

Market Investigations for Digital Platforms [PDF]

open access: yesSSRN Electronic Journal, 2020
There is a growing international consensus that standard competition law is inadequate for addressing the panoply of competition problems arising in digital platform markets. Alongside a proposal for ex ante regulation in this arena, the European Commission is considering the introduction of a ‘New Competition Tool’ which is broadly modelled on the
openaire   +3 more sources

Gender Differences and Digital Learning Games – One Size Does not fit all [PDF]

open access: yes, 2018
The intrinsic motivation demonstrated towards digital games provides the opportunity for its use as a learning tool irrespective of gender differences. This has resulted in the combination of the motivation of games with curricular content referred to as
Bacon, Liz   +2 more
core  

Position estimation delays in signal injection-based sensorless PMSM drives [PDF]

open access: yes, 2012
The causes of position estimation delays and their effects on the sensorless control of permanent magnet synchronous motor drives are investigated. The position of a permanent magnet synchronous machine is estimated via the injection of high frequency ...
Altomare, A.   +3 more
core   +1 more source

Digital curation skills in the performing arts: an investigation of practitioner awareness and knowledge of digital object management and preservation [PDF]

open access: yes, 2014
This study examines the digital curation awareness and practice of a sample of practitioners from the UK performing arts community. Twelve performance arts practitioners from across the United Kingdom were interviewed to establish understanding of ...
Molloy, Laura
core   +1 more source

Cybercrime Intention Recognition: A Systematic Literature Review

open access: yesInformation
In this systematic literature review, we delve into the realm of intention recognition within the context of digital forensics and cybercrime. The rise of cybercrime has become a major concern for individuals, organizations, and governments worldwide ...
Yidnekachew Worku Kassa   +2 more
doaj   +1 more source

Pengaruh model group investigation berbasis internet terhadap hasil belajar dan kemampuan digital literasi siswa

open access: yesHarmoni Sosial: Jurnal Pendidikan IPS, 2017
Tujuan penelitian ini adalah untuk menganalisis: (1) perbedaan antara siswa yang mengikuti pembelajaran group investigation berbasis internet dengan siswa yang mengikuti pembelajaran group investigation berbasis perpustakaan terhadap peningkatan hasil ...
Muh Sai
doaj   +1 more source

Dark clouds on the horizon:the challenge of cloud forensics [PDF]

open access: yes, 2018
We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing.
Ferguson, R. Ian   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy