To see the other types of publications on this topic, follow the link: Digital evidence.

Dissertations / Theses on the topic 'Digital evidence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Digital evidence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Turner, Philip Bryan. "Digital Evidence Bags." Thesis, Oxford Brookes University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490497.

Full text
Abstract:
This thesis analyses the traditional approach and methodology used to conduct digital forensic information capture, analysis and investigation. The predominant toolsets and utilities that are used and the features that they provide are reviewed. This is used to highlight the difficulties that are encountered due to both technological advances and the methodologies employed. It is suggested that these difficulties are compounded by the archaic methods and proprietary formats that are used. An alternative framework for the capture and storage of information used in digital forensics is defined n
APA, Harvard, Vancouver, ISO, and other styles
2

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16507/1/Bradley_Schatz_Thesis.pdf.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process.
APA, Harvard, Vancouver, ISO, and other styles
3

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16507/.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process. T
APA, Harvard, Vancouver, ISO, and other styles
4

Shanmugam, Karthikeyan. "Validating digital forensic evidence." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7651.

Full text
Abstract:
This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the detection and gathering of evidence related to electronic crimes. What makes the computer forensics field similar to other forensic fields is that considerable emphasis is placed on the validity of the digital evidence. It is not just the methods used to collect the evidence that is a concern. What is also a problem is that perpetrators of digital crimes may be engaged in what is called anti-forensics. Digital forensic evidence techn
APA, Harvard, Vancouver, ISO, and other styles
5

Brady, Owen Defries. "Exploiting digital evidence artefacts : finding and joining digital dots." Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/exploiting-digital-evidence-artefacts(4d89b494-1d12-4c20-b464-4e92fddd421f).html.

Full text
Abstract:
As digital evidence becomes increasingly significant to criminal investigations, so does the importance of adopting the most effective approach to examining it. An ineffective exami-nation can result in evidence not being identified. Even if evidence is noted, connections may not be made between the disparate values. This thesis proposes a new classification system to gauge, select and compare digital evidence from a variety of sources. It performs this using a type of model called an ontology. This is used to map the potential location of evidence on digital devices - applying a code to each
APA, Harvard, Vancouver, ISO, and other styles
6

Olsson, Jens. "Digital Evidence with Emphasis on Time." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3774.

Full text
Abstract:
Computer Forensics is mainly about investigating crimes where computers has been involved. There are many tools available to aid the investigator with this task. We have created a prototype of a completely new type of tool where all evidences are indexed by its time variable and plotted on a timeline. We believed that this way would make it easier and more intuitive to find coherent evidence and would make it faster to work with for the investigator. We have performed a user test where a group of people has evaluated our prototype tool against a modern commercial computer forensic tool and the
APA, Harvard, Vancouver, ISO, and other styles
7

Muñoz, Acevedo Angela. "Public policy in the digital age : evidence from telecommunications and digital platforms." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT006.

Full text
Abstract:
Cette thèse de doctorat étudie des questions de politique publique dans le contexte de la transformation numérique de l'économie mondiale. Elle examine des situations nouvelles et des interventions publiques sur les secteurs des télécommunications et du numérique affectant la mobilité des personnes et leur intégration dans l'économie numérique. Elle est divisée en trois chapitres. Le premier chapitre évalue l'impact de la régulation de l'itinérance internationale mise en œuvre dans l'Union européenne sur les revenus et les prix de détail des opérateurs de téléphonie mobile. Les résultats suggè
APA, Harvard, Vancouver, ISO, and other styles
8

Kessler, Gary Craig. "Judges' Awareness, Understanding, and Application of Digital Evidence." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/196.

Full text
Abstract:
As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges' relationship with digital evidence. This study addressed judges' awareness, knowledge, and perceptions of digital evidence, using grounded theory meth
APA, Harvard, Vancouver, ISO, and other styles
9

Yildirim, Idris. "The Information-Seeking Behavior of Digital Evidence Examiners." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68068/.

Full text
Abstract:
The current research sought to gain in-depth insights into the information-seeking behavior of Turkish National Police digital evidence examiners (DEEs); to explore the information sources that DEEs use and the factors affecting their decisions about source selection. Factors that affect information source selection and use by DEEs are: accreditation, workload, type of information, time, cost, availability, reliability/scientific importance, up-to-date data, prior experience with the source, relevance, interactivity and importance. The Internet was the information source most commonly used by
APA, Harvard, Vancouver, ISO, and other styles
10

Delport, Waldo. "Forensic evidence isolation in clouds." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/33490.

Full text
Abstract:
Cloud computing is gaining acceptance and also increasing in popularity. Organisations often rely on cloud resources as an effective replacement for their `in-house' computer systems. In the cloud, virtual resources are provided from a larger pool of resources, these resources being available to multiple different clients. When something suspicious happens within a digital environment, a digital forensic investigation may be conducted to gather information about the event. When conducting such an investigation digital forensic procedures are followed. These procedures involve the ste
APA, Harvard, Vancouver, ISO, and other styles
11

Angelopoulou, Olga. "Analysis of digital evidence in identity theft investigations." Thesis, University of South Wales, 2010. https://pure.southwales.ac.uk/en/studentthesis/analysis-of-digital-evidence-in-identity-theft-investigations(87649de4-e445-49c3-bcba-8297ee5ef684).html.

Full text
Abstract:
Identity Theft could be currently considered as a significant problem in the modern internet driven era. This type of computer crime can be achieved in a number of different ways; various statistical figures suggest it is on the increase. It intimidates individual privacy and self assurance, while efforts for increased security and protection measures appear inadequate to prevent it. A forensic analysis of the digital evidence should be able to provide precise findings after the investigation of Identity Theft incidents. At present, the investigation of Internet based Identity Theft is perform
APA, Harvard, Vancouver, ISO, and other styles
12

Omeleze, Stacey Angela. "Digital forensic evidence acquisition to mitigate neighbourhood crime." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62787.

Full text
Abstract:
Mobile devices form an integral part of our daily lives and have the potential to be used as tools to curb crime. In recent years, many criminal activities have gone unsolved due to a lack of sufficient evidence to convict the perpetrators. Together with recent developments and advances in research, technology such as mobile devices (popularly known as ’smart phones’) is now capable of acting as devices for capturing real-time potential digital evidence. The continued advancement in the features of mobile devices such as photos, as well as video and voice-recording options, has enhanced their
APA, Harvard, Vancouver, ISO, and other styles
13

VACIAGO, GIUSEPPE EMILIANO. "Digital evidence: profili tecnico-giuridiche e garanzie dell'imputato." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2011. http://hdl.handle.net/10281/20472.

Full text
Abstract:
The key areas of interest dealt with this PHD thesis are digital forensics best practices in the context of cybercrime investigations. Over the coming years, a crucial issue in dealing with cybercrime will be the delicate balance that must necessarily be found in order to protect the fundamental rights of "digital citizens". The output of this work involves analyzing the context of digital investigation in Europe and in the United States and identifying the technical and legal solutions that enable a more satisfactory balance to be achieved between the legitimate demands of cybercrime preven
APA, Harvard, Vancouver, ISO, and other styles
14

Ademu, Inikpi. "A comprehensive digital forensics investigation model and guidelines for establishing admissible digital evidence." Thesis, University of East London, 2013. http://roar.uel.ac.uk/3992/.

Full text
Abstract:
Technology systems are attacked by offenders using digital devices and networks to facilitate their crimes and hide their identities, creating new challenges for digital investigators. Malicious programs that exploit vulnerabilities also serve as threats to digital investigators. Since digital devices such as computers and networks are used by organisations and digital investigators, malicious programs and risky practices that may contaminate the integrity of digital evidence can lead to loss of evidence. For some reasons, digital investigators face a major challenge in preserving the integrit
APA, Harvard, Vancouver, ISO, and other styles
15

Arora, Rashmi. "Digital financial services, gendered digital divide and financial inclusion: Evidence from South Asia." Routledge, 2020. http://hdl.handle.net/10454/18320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Solanke, Abiodun Abdullahi <1983&gt. "Digital Forensics AI: on Practicality, Optimality, and Interpretability of Digital Evidence Mining Techniques." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2022. http://amsdottorato.unibo.it/10400/1/SOLANKE-ABIODUN-ABDULLAHI-Tesi.pdf.

Full text
Abstract:
Digital forensics as a field has progressed alongside technological advancements over the years, just as digital devices have gotten more robust and sophisticated. However, criminals and attackers have devised means for exploiting the vulnerabilities or sophistication of these devices to carry out malicious activities in unprecedented ways. Their belief is that electronic crimes can be committed without identities being revealed or trails being established. Several applications of artificial intelligence (AI) have demonstrated interesting and promising solutions to seemingly intractable societ
APA, Harvard, Vancouver, ISO, and other styles
17

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO, and other styles
18

Cassidy, Regis H. Friend. "Automating case reports for the analysis of digital evidence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCassidy.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Willassen, Svein Yngvar. "Methods for Enhancement of Timestamp Evidence in Digital Investigations." Doctoral thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-2145.

Full text
Abstract:
<p>This work explores how the evidential value of digital timestamps can be enhanced by taking a hypothesis based approach to the investigation of digital timestamps. It defines the concepts of clock hypotheses, timestamps and causality in digital systems. These concepts are utilized to develop methods that can be used in an investigation to test a clock hypothesis for consistency with timestamps found in an actual investigation, given causality between specific events occurring in the investigated system. Common storage systems are explored for the identification of causality between the eve
APA, Harvard, Vancouver, ISO, and other styles
20

Yesilyurt, Hamdi. "The response of American police agencies to digital evidence." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4725.

Full text
Abstract:
Little is known about the variation in digital forensics practice in the United States as adopted by large local police agencies. This study investigated how environmental constraints, contextual factors, organizational complexity, and organizational control relate to the adoption of digital forensics practice. This study integrated 3 theoretical perspectives in organizational studies to guide the analysis of the relations: institutional theory, contingency theory, and adoption-of-innovation theory. Institutional theory was used to analyze the impact of environmental constraints on the adoptio
APA, Harvard, Vancouver, ISO, and other styles
21

Mohammed, Hussam J. "Automated identification of digital evidence across heterogeneous data resources." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12839.

Full text
Abstract:
Digital forensics has become an increasingly important tool in the fight against cyber and computer-assisted crime. However, with an increasing range of technologies at people's disposal, investigators find themselves having to process and analyse many systems with large volumes of data (e.g., PCs, laptops, tablets, and smartphones) within a single case. Unfortunately, current digital forensic tools operate in an isolated manner, investigating systems and applications individually. The heterogeneity and volume of evidence place time constraints and a significant burden on investigators. Exampl
APA, Harvard, Vancouver, ISO, and other styles
22

Bednar-Schadle, Teresa. "Misinterpretation of Digital Evidence| Recommendations to Improve Data Integrity." Thesis, Utica College, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423713.

Full text
Abstract:
<p> The criminal justice system struggles to remain current with modern technology, and the result is the conviction of innocent victims due to the misinterpretation of digital forensic data. It is common for criminal trials to rely on digital evidence and not uncommon the guilty acquitted based on digital evidence. The research contained in this report covered some of the factors contributing to the misinterpretation of digital forensic data. Among the contributing factors are lack of professional and ethical standards governing digital forensic investigators, inadequate training, outdated eq
APA, Harvard, Vancouver, ISO, and other styles
23

Mazzon, Federica <1995&gt. "Smart and digital agrifood: evidence from six case studies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/15348.

Full text
Abstract:
The purpose of this dissertation is to study the changes brought about by new technologies in terms of productivity, strategy formulation and organization management in the agrifood sector. In order to achieve this objective, I selected six companies belonging to different sectors, from wine to dairy products. I developed the case studies by interviewing the owners, the employees and the technicians working within the companies. My questions were mainly addressed to find out why they have decided to invest in advanced technologies, the changes involved by technology and the future prospective.
APA, Harvard, Vancouver, ISO, and other styles
24

Jordaan, Jason. "An examination of validation practices in relation to the forensic acquisition of digital evidence in South Africa." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1016361.

Full text
Abstract:
The acquisition of digital evidence is the most crucial part of the entire digital forensics process. During this process, digital evidence is acquired in a forensically sound manner to ensure the legal admissibility and reliability of that evidence in court. In the acquisition process various hardware or software tools are used to acquire the digital evidence. All of the digital forensic standards relating to the acquisition of digital evidence require that the hardware and software tools used in the acquisition process are validated as functioning correctly and reliably, as this lends credib
APA, Harvard, Vancouver, ISO, and other styles
25

Chan, Janet Bick Lai Art College of Fine Arts UNSW. "Mounting evidence: Traces of things to come." Publisher:University of New South Wales. Art, 2009. http://handle.unsw.edu.au/1959.4/42058.

Full text
Abstract:
This thesis documents a project that investigates the nature of painting in the digital age. Accounts of ??what painting is?? have focused on the quality of its product, its production process, and its relationship with the artworld. This thesis describes how the student has developed a form of digital painting practice that consciously engages with and reconstructs the aesthetic space once occupied by Chinese landscape painting. The works combine both realist and surrealist techniques in a way that transgresses the processes and conventions of traditional Chinese painting while at the same ti
APA, Harvard, Vancouver, ISO, and other styles
26

Dodrill, Charles A. "Protecting Digital Evidence during Natural Disasters| Why It Is Important." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10788395.

Full text
Abstract:
<p> The safeguarding of digital evidence, valuable corporate proprietary intellectual property and related original objects on which it resides, such as cell phones, tablets, external drives and laptops, becomes a more complex challenge when a natural disaster is imminent. Natural devastation disrupts the investigative and legal process, often destroying the evidentiary elements required to serve justice. Traditional methods such as backups to external drives, and copies as well as cloud storage options, are inadequate to serve the requirements of evidence-gathering and chain of custody docume
APA, Harvard, Vancouver, ISO, and other styles
27

Kadnarova, Radoslava. "Conceptualising digital nomadic practice : evidence from a technology-intensive firm." Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/86753/.

Full text
Abstract:
This thesis studies how individuals use digital media to manage connectivity and accomplish work across digital and physical spaces in modern organisations, ultimately conceptualising this new type of work as a new digital nomadic practice. Increased digitisation and the need for more flexible work styles have pressured organisations to adopt new digital media and to redesign their workplaces. Existing research provides some theoretical understanding of this phenomena, however it is scattered across multiple disciplines and lack a broader all-encompassing view of the concept. This study addres
APA, Harvard, Vancouver, ISO, and other styles
28

McCutcheon, James. "Validation of forensic images for assurance of digital evidence integrity." Thesis, McCutcheon, James (2014) Validation of forensic images for assurance of digital evidence integrity. Honours thesis, Murdoch University, 2014. https://researchrepository.murdoch.edu.au/id/eprint/24962/.

Full text
Abstract:
The reliability of digital evidence is an important consideration in legal cases requiring sound validation. To ensure its reliability, digital evidence requires the adoption of reliable processes for the acquisition, preservation, and analysis of digital data. To undertake these tasks, the courts expect digital forensic practitioners to possess specialised skills, experience, and use sound forensic tools and processes. The courts require that the reliability of digital evidence can be verified with supporting documentation; notably acquisition process logs and a chain of custody register, con
APA, Harvard, Vancouver, ISO, and other styles
29

Raghavan, Sriram. "A framework for identifying associations in digital evidence using metadata." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/72659/1/Sriram_Raghavan_Thesis.pdf.

Full text
Abstract:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata acros
APA, Harvard, Vancouver, ISO, and other styles
30

Kohn, Michael Donovan. "Integrated digital forensic process model." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/25433.

Full text
Abstract:
The Information and Communications Technology (ICT) environment constitutes an integral part of our daily lives. Individual computer users and large corporate companies are increasingly dependent on services provided by ICT. These services range from basic communication to managing large databases with corporate client information. Within these ICT environments something is bound to go wrong for a number of reasons, which include an intentional attack on information services provided by an organisation. These organisations have in turn become interested in tracing the root cause of such an inc
APA, Harvard, Vancouver, ISO, and other styles
31

Saleem, Shahzad. "Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-116581.

Full text
Abstract:
Scientific development and progress in the fields of computer science, information technology and their related disciplines, have transformed our world into a “digital world”. Omnipresent digital devices and e-services running on numerous versions of pervasive e-infrastructures generate a wealth of electronically stored information (ESI) from which we can extract a great deal of potential digital evidence. Digital evidence is sometimes even more revealing than its traditional counterpart, but at the same time it is very fragile and volatile in nature. Preserving the integrity of digital eviden
APA, Harvard, Vancouver, ISO, and other styles
32

Logarajah, Saravanarajah. "Confronting the new frontier of evidence: Are the current rules of evidence in Western Australia capable of dealing effectively with digital evidence?" Thesis, Logarajah, Saravanarajah (2015) Confronting the new frontier of evidence: Are the current rules of evidence in Western Australia capable of dealing effectively with digital evidence? Honours thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/41659/.

Full text
Abstract:
Digital evidence may be retrieved from mobile phone logs, messages posted on social media websites, information stored on computer hard drives and electronic mail messages. We use information and communications technology driven by digital technology every time we make a call with our mobile phones or withdraw money from an automated teller machine. The growing use of information and communications technology has led to the creation of an abundance of digital material that may become relevant as evidence in a legal dispute. There are numerous differences between digital evidence and hardco
APA, Harvard, Vancouver, ISO, and other styles
33

Stanfield, Allison R. "The authentication of electronic evidence." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93021/1/Allison_Stanfield_Thesis.pdf.

Full text
Abstract:
This thesis examines whether the rules for of evidence, which were developed around paper over centuries, are adequate for the authentication of electronic evidence. The history of documentary evidence is examined, and the nature of electronic evidence is explored, particularly recent types of electronic evidence such as social media and 'the Cloud'. The old rules are then critically applied to the varied types of electronic evidence to determine whether or not these old rules are indeed adequate.
APA, Harvard, Vancouver, ISO, and other styles
34

Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.

Full text
Abstract:
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly because forensic investigations are based on artifacts left oncomputers and other digital devices. In recent times, perpetrators of computer crimesare getting abreast of the digital forensics dynamics hence, capacitated to use someanti-forensics measures and techniques to obfuscate the investigation processes.Incases where such techniques are employed, it becomes extremely difficult, expensive and time consuming to carry out an effective investigation. This might causea digital forensics expert t
APA, Harvard, Vancouver, ISO, and other styles
35

Hargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling
APA, Harvard, Vancouver, ISO, and other styles
36

Svenblad, Tobias. "An Analysis of Using Blockchains for Processing and Storing Digital Evidence." Thesis, Högskolan Dalarna, Datateknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:du-27855.

Full text
Abstract:
A review of digital forensics today shows that it could be exposed to threats jeopardizing the digital evidence integrity. There are several techniques to countermeasure this risk, one of which is the method that involves the use of blockchains. Blockchains use an advanced system to keep the data within it persistent and transparent, which makes it a natural candidate for everything integrity-sensitive. Several blockchain techniques and infrastructures have been described in this study, based on previous studies and other literature work. Interviews and experiments made a comparison between tr
APA, Harvard, Vancouver, ISO, and other styles
37

Calissendorff, Philip, and Niklas Lögdal. "Digital platforms challenges and opportunities : Evidence from a traditional market sector." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149506.

Full text
Abstract:
Digital platforms are becoming more and more established in the current digital age and with it come many new business ideas, models and more. This has lead to several disciplines and industries taking an interest in them and sought to build one themselves. However, little is known about how the context of a digital platform can affect its launch. Existing research todays focuses on general strategies for launching a platform but we argue that context matters and that it changes the challenges and opportunities for the platform. This thesis aims to fill this gap for traditional industries that
APA, Harvard, Vancouver, ISO, and other styles
38

Hargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling
APA, Harvard, Vancouver, ISO, and other styles
39

De, Maio Giancarlo. "On the evolution of digital evidence: novel approaches for cyber investigation." Doctoral thesis, Universita degli studi di Salerno, 2014. http://hdl.handle.net/10556/1443.

Full text
Abstract:
2012-2013<br>Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to access it. We develop relationships on social networks and entrust sensitive documents to online services. Desktop applications are being replaced by fully-fledged web-applications that can be accessed from any devices. This is possible thanks to new web technologies that are being introduced at a very fast pace. However, these advances come at a price. Today, the web is the principal means used by cyber-criminals to perform attacks against people and organizations. In a context where informa
APA, Harvard, Vancouver, ISO, and other styles
40

FLOREDDU, PAOLA BARBARA. "Digital strategies for market dominance: empirical evidence from the insurance industry." Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266543.

Full text
Abstract:
Internet, Web 2.0 and digital and mobile technologies have fundamentally changed the way firms perform, conceive, develop and deliver services, leading to the development of personalized relationships with customers, increasing quality, improving lead time, and enabling more customization at a lower cost. These channel proliferation has increased the complexity of firms’ operations because it opens up new customer contact points. In today's rapidly changing environment, firms need to diversify, adapt, and even reinvent themselves to match evolving market and technological conditions and to tu
APA, Harvard, Vancouver, ISO, and other styles
41

Rübsamen, Thomas. "Evidence-based accountability audits for cloud computing." Thesis, University of Plymouth, 2016. http://hdl.handle.net/10026.1/6702.

Full text
Abstract:
Cloud computing is known for its on-demand service provisioning and has now become mainstream. Many businesses as well as individuals are using cloud services on a daily basis. There is a big variety of services that ranges from the provision of computing resources to services such as productivity suites and social networks. The nature of these services varies heavily in terms of what kind of information is being out-sourced to the cloud provider. Often, that data is sensitive, for instance when PII is being shared by an individual. Also, businesses that move (parts of) their processes to the
APA, Harvard, Vancouver, ISO, and other styles
42

Rule, Samantha Elizabeth. "A Framework for using Open Source intelligence as a Digital Forensic Investigative tool." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017937.

Full text
Abstract:
The proliferation of the Internet has amplified the use of social networking sites by creating a platform that encourages individuals to share information. As a result there is a wealth of information that is publically and easily accessible. This research explores whether open source intelligence (OSINT), which is freely available, could be used as a digital forensic investigative tool. A survey was created and sent to digital forensic investigators to establish whether they currently use OSINT when performing investigations. The survey results confirm that OSINT is being used by digital fore
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Baoping. "Intelligent Fusion of Evidence from Multiple Sources for Text Classification." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/28198.

Full text
Abstract:
Automatic text classification using current approaches is known to perform poorly when documents are noisy or when limited amounts of textual content is available. Yet, many users need access to such documents, which are found in large numbers in digital libraries and in the WWW. If documents are not classified, they are difficult to find when browsing. Further, searching precision suffers when categories cannot be checked, since many documents may be retrieved that would fail to meet category constraints. In this work, we study how different types of evidence from multiple sources can be inte
APA, Harvard, Vancouver, ISO, and other styles
44

Giudice, Oliver. "Digital Forensics Ballistics: Reconstructing the source of an evidence exploiting multimedia data." Doctoral thesis, Università di Catania, 2017. http://hdl.handle.net/10761/3896.

Full text
Abstract:
The Forensic Science (sometimes shortened to Forensics) is the application of technical and scientific methods to the justice, investigation and evidence discovery domain. Specifically finding evidences can be trivial and in many fields is achieved with methods that exploits manual processes and the experience of the forensics examiner. Though human factor can be often discussed and the evidences collected and found without repeatable and scientific methods could be of no use in tribunal. For these reasons this thesis focus on the investigation and development of classification engine able to
APA, Harvard, Vancouver, ISO, and other styles
45

Sonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.

Full text
Abstract:
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether
APA, Harvard, Vancouver, ISO, and other styles
46

Thompson, Marcus A. "An exploratory forensic acquisition and analysis of digital evidence on the Amazon Kindle." Thesis, Purdue University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1565358.

Full text
Abstract:
<p> The Amazon Kindle is becoming a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData's Forensic Toolkit Imager before and after each Kindle was p
APA, Harvard, Vancouver, ISO, and other styles
47

Alfaize, Najah Abdulaziz. "The impact of culture and religion on digital forensics : the study of the role of digital evidence in the legal process in Saudi Arabia." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/13124.

Full text
Abstract:
This work contributes to the multi-disciplinary community of researchers in computer science, information technology and computer forensics working together with legal enforcement professionals involved in digital forensic investigations. It is focused on the relationship between scientific approaches underpinning digital forensics and the Islamic law underpinning legal enforcement. Saudi Arabia (KSA) is studied as an example of an Islamic country that has adopted international guidelines, such as ACPO, in its legal enforcement procedures. The relationship between Islamic law and scientific AC
APA, Harvard, Vancouver, ISO, and other styles
48

Vaz, Denise Provasi. "Provas digitais no processo penal: formulação do conceito, definição das características e sistematização do procedimento probatório." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/2/2137/tde-28052013-153123/.

Full text
Abstract:
O desenvolvimento de novas tecnologias e a formação da sociedade da informação, a partir do Século XX, acarretaram novos hábitos pessoais e sociais e transformações no processamento e arquivamento das informações. O tratamento e o registro de fatos e ideias passaram a ser feitos de maneira digital, com o uso de dispositivos eletrônicos que operam no sistema binário. Esse novo panorama trouxe diversos reflexos para o processo penal, principalmente relacionados à prova. Entretanto, a legislação e a jurisprudência não acompanharam o avanço tecnológico, abrindo-se um vazio normativo em matéria de
APA, Harvard, Vancouver, ISO, and other styles
49

Necaise, Nathan Joseph. "Empirical analysis of disk sector prefixes for digital forensics." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-03282007-151218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Weilbach, William Thomas. "Practical application of distributed ledger technology in support of digital evidence integrity verification processes." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/61872.

Full text
Abstract:
After its birth in cryptocurrencies, distributed ledger (blockchain) technology rapidly grew in popularity in other technology domains. Alternative applications of this technology range from digitizing the bank guarantees process for commercial property leases (Anz and IBM, 2017) to tracking the provenance of high-value physical goods (Everledger Ltd., 2017). As a whole, distributed ledger technology has acted as a catalyst to the rise of many innovative alternative solutions to existing problems, mostly associated with trust and integrity. In this research, a niche application of this technol
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!