To see the other types of publications on this topic, follow the link: Preventive forensics.

Journal articles on the topic 'Preventive forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Preventive forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Narang*, Deepak, Reena Kulshreshtra, Fatima Khan, et al. "Microbes in forensic medicine: a microbiologist perspective." International Journal of Bioassays 5, no. 10 (2016): 4913. http://dx.doi.org/10.21746/ijbio.2016.10.004.

Full text
Abstract:
Microbial forensics is a naïve branch that involves multi-disciplinary approach to detection, tracing and evidencing the bio crime, with a predominant microbiological approach by studying evidence from inadvertent microorganism or its toxins released in bioterrorism act, biocrime, or for attribution purposes using advanced molecular techniques. Methods for identification and attribution of potential microbial weapons is challenging and forensic microbiological investigations involves crime scene investigation, chain of custody practices, evidence collection, handling and preservation, evidence
APA, Harvard, Vancouver, ISO, and other styles
2

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also co
APA, Harvard, Vancouver, ISO, and other styles
3

Paracha, Muhammad Ali, Syed Usman Jamil, Khurram Shahzad, Muhammad Arif Khan, and Abdul Rasheed. "Leveraging AI for Network Threat Detection—A Conceptual Overview." Electronics 13, no. 23 (2024): 4611. http://dx.doi.org/10.3390/electronics13234611.

Full text
Abstract:
Network forensics is commonly used to identify and analyse evidence of any illegal or unauthorised activity in a given network. The collected information can be used for preventive measures against potential cyber attacks and serve as evidence acceptable in legal proceedings. Several conventional tools and techniques are available to identify and collect such pieces of evidence; however, most of them require expensive commercial resources, longer investigation times, and costly human expertise. Due to modern networks’ diverse and heterogeneous nature, forensic operations through conventional m
APA, Harvard, Vancouver, ISO, and other styles
4

Raman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (2021): 319–27. http://dx.doi.org/10.18280/isi.260309.

Full text
Abstract:
With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a compreh
APA, Harvard, Vancouver, ISO, and other styles
5

Kęskiewicz, Anna. "INTRODUCTION TO FORENSICS - APPLICATION OF NATURAL SCIENCES." International Journal of Legal Studies ( IJOLS ) 4, no. 2 (2018): 185–202. http://dx.doi.org/10.5604/01.3001.0013.0014.

Full text
Abstract:
A well-known forensic material used in forensic technique is carbon monoxide on environment. In literature an important element that makes it difficult to assess the circumstances of fatal poisoning is the individual way of reacting the body to the action of carbon monoxide. Often staying in the same conditions cause that some people are poisoned while others alive. ''Introduction to forensics - application of natural sciences '' is a scientific presentation in order to disseminate preventive methods. The policy on environment is undoubtedly a theme to these important research methods. In orde
APA, Harvard, Vancouver, ISO, and other styles
6

Batiuk, O. V., and O. О. Novykova. "METHODOLOGY OF FORENSIC PREVENTION OF CRIMES AGAINST THE FOUNDATIONS OF NATIONAL SECURITY." Kyiv Law Journal, no. 4 (January 15, 2024): 123–31. http://dx.doi.org/10.32782/klj/2023.4.18.

Full text
Abstract:
Abstract. In the provisions of the scientific article, the authors conduct a scientific study and formulate scientific theoretical provisions in the field of forensic science on the concept of the methodology of forensic prevention of crimes against the foundations of national security, its sources, techniques, special methods, forms and purposes of application of the methodology of forensic prevention of crimes against the foundations of national security. On this basis, the authors propose to fix in the theoretical provisions of the science of forensics such a definition as the methodology o
APA, Harvard, Vancouver, ISO, and other styles
7

Mittal, Ankit, Sandeep Kumar, Jitin Jitin, Gaurav Sharma, and Yogender Malik. "ANATOMICAL DISTRIBUTION AND TRENDS IN HOMICIDAL INJURIES: A MORTUARY BASED STUDY." International Journal of Advanced Research 13, no. 03 (2025): 1388–92. https://doi.org/10.21474/ijar01/20693.

Full text
Abstract:
Homicide, a neutral term encompassing all instances of one person killing another, contrasts with the specific legal definition of murder, which necessitates intent and other jurisdictional criteria. Trauma forensics plays a pivotal role in analyzing injuries associated with homicidal deaths, which vary across cultures and depend on factors such as access to weapons and societal dynamics. This retrospective study investigated the patterns of injuries in autopsies conducted on alleged homicide victims over one year, aiming to enhance forensic interpretation and support accurate representation o
APA, Harvard, Vancouver, ISO, and other styles
8

Muria, Risky Mezi, Arif Muntasa, Muhammad Yusuf, and Ardi Hamzah. "Studi Litelatur: Peningkatan Kinerja Digital Forensik Dan Pencegahan Cyber Crime." Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) 3, no. 1 (2022): 12–20. http://dx.doi.org/10.31102/jatim.v3i1.1422.

Full text
Abstract:
The more complex a problem that arises due to an ease in information technology makes cyberattacks increasingly dangerous and dangerous for systems within a country or entity. Crimes thatarise must be detected and a preventive action taken immediately so that no party is harmed for atechnological crime. This study aims to find various methods to review and investigate cyberattacks for security in digital forensics and can provide input and additional insight to all partiesincluding investigators or practitioners and users in the field of digital forensics about variousmethods that can be used
APA, Harvard, Vancouver, ISO, and other styles
9

Kalyniuk, Natalia, and Kateryna Melnykova. "Legal aspects of the application of Artificial Intelligence in jurisprudence: the experience of Ukraine." Visegrad Journal on Human Rights, no. 2 (July 15, 2024): 61–66. http://dx.doi.org/10.61345/1339-7915.2024.2.11.

Full text
Abstract:
The aim of the work is to study and analyze the role of artificial intelligence in jurisprudence in the context of the European integration of Ukraine. The methodological basis of the study is the dialectical method of scientific knowledge, since with its help the genesis of the development of artificial intelligence in society in general, including in jurisprudence, interaction with other elements of the legal system of Ukraine, prospects for development in domestic criminology, etc. was revealed. The anthropological approach helped reveal the importance of reforming domestic criminology in t
APA, Harvard, Vancouver, ISO, and other styles
10

Shivdas, Sajin. "Introduction to Digital Forensics." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 833–36. http://dx.doi.org/10.22214/ijraset.2023.55258.

Full text
Abstract:
Abstract: Crimes committed using computers are increasing rapidly, posing a challenge to law enforcement. Investigations including cybercrime, terrorism, and civil litigation all make use of digital forensics today. Because of the ever-increasing sophistication of modern technology, forensic investigations of this sort can quickly become difficult and time-consuming. In order to successfully retrieve meaningful digital evidence during such investigations, however, a standard framework for digital forensic professionals to follow must be developed. All appropriate steps that a digital forensic
APA, Harvard, Vancouver, ISO, and other styles
11

Tyler, Joshua H., Donald R. Reising, Thomas Cooke, and Anthony Murphy. "Power Signal Histograms—A Method of Power Grid Data Compression on the Edge for Real-Time Incipient Fault Forensics." Applied Sciences 14, no. 21 (2024): 9958. http://dx.doi.org/10.3390/app14219958.

Full text
Abstract:
Across the power grid infrastructure, deployed power transmission systems are susceptible to incipient faults that interrupt standard operations. These incipient faults can range from being benign in impact to causing massive hardware damage and even loss of life. The power grid is continuously monitored, and incipient faults are recorded by Digital Fault Recorders (DFRs) to mitigate such outcomes. DFR-recorded data allow for power quality forensics and event analysis, but this ability comes at the cost of high data storage and data transmission requirements. It is common for data older than t
APA, Harvard, Vancouver, ISO, and other styles
12

Filipenko, Nataliia, and Hanna Spitsyna. "Development Strategy of International Cooperation of Forensic Science Institutions of Ukraine with Foreign Experts in Prevention of Terrorist Attacks on Critical Infrastructure." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 2, no. 23 (2022): 83–95. http://dx.doi.org/10.25143/socr.23.2022.2.083-095.

Full text
Abstract:
The issue of using modern foreign experience of preventive activity in criminological work of forensic science institutions of Ukraine has been considered in this study. Peculiarities of the main organisational forms of forensic science activity have been analysed through specialised (forensic science) institutions and through specific specialists, namely: forensic experts (for example, practice of the institute of sworn experts: specialists who took the oath or received a license for forensic examination). Analysis of international standards used in forensic science activity has been carried
APA, Harvard, Vancouver, ISO, and other styles
13

Baroto, Wishnu Agung. "Advancing Digital Forensic through Machine Learning: An Integrated Framework for Fraud Investigation." Asia Pacific Fraud Journal 9, no. 1 (2024): 1–16. http://dx.doi.org/10.21532/apfjournal.v9i1.346.

Full text
Abstract:
The rise of cybercrime and cyber-related crime encourages efficient digital forensic investigations more crucial than ever before. Traditional investigation methods can be time-consuming, costly, and resource-intensive, while machine learning algorithms have the potential to reduce the complexity by promoting automation and investigation capabilities. This study begins with an analysis of digital forensics framework using a document analysis methodology. Moreover, exploring current practice and potential implementation of machine learning in digital forensics for fraud investigation is demonst
APA, Harvard, Vancouver, ISO, and other styles
14

Tenishev, A. P. "Antitrust forensics: concept and content." Russian competition law and economy, no. 1 (March 30, 2020): 38–41. http://dx.doi.org/10.32686/2542-0259-2020-1-38-41.

Full text
Abstract:
Effective investigation of antitrust offenses, including crimes, is an urgent task that requires not only deep scientific justification, but also the development of a set of practical recommendations. Regularities of the mechanism for committing antitrust offenses (including crimes), the occurrence of information about the antitrust offense (crime) and its participants, the collection, research and use of evidence and special means and methods of judicial research and prevention of violations of antitrust laws based on these knowledges at present do not fit into the framework of a private fore
APA, Harvard, Vancouver, ISO, and other styles
15

Bolshakov, V., V. Svytenko, and Yu Maznychenko. "FORENSIC ASPECTS OF USING CERTAIN TECHNICAL MEANS OF ACTIVE SELF-DEFENSE." Criminalistics and Forensics, no. 66 (2021): 481–92. http://dx.doi.org/10.33994/kndise.2021.66.36.

Full text
Abstract:
The article is devoted to the forensic aspects of ensuring necessary defense through the use by law enforcement officials of physical pressure of limited influence, special means (including non-lethal action) and firearms of increased efficiency. The authors, based on the results of forensic practice, assessed the effectiveness of the actions of law enforcement officers to prevent the excess of necessary defense during covert investigative (search) activities. A systematic analysis of recent studies and publications on this issue showed that in the modern global world, the main task of forensi
APA, Harvard, Vancouver, ISO, and other styles
16

Ampong, David Nana. "Landmarks of pharmacogenomics and some considerations for clinical practice." Therapeutic Advances in Psychopharmacology 9 (January 2019): 204512531989665. http://dx.doi.org/10.1177/2045125319896650.

Full text
Abstract:
Since the completion of the Human Genome Project 28 years ago, myriad genomics applications have risen in areas such as agriculture, livestock, infectious agents, forensics, bioenergy, ancestry, health, disease, and medicine. This was driven partly by the US government’s ability to use a unique program to facilitate genome sequencing to the point where the cost of sequencing a whole human genome is not prohibitive. However, application of this knowledge of the double helix twisted DNA at the bedside in psychiatric clinical practice has little to report, despite US Food and Drug Administration
APA, Harvard, Vancouver, ISO, and other styles
17

Nurizki, Andhika Raka, and Ade Adhari. "Analysis of Legal Protection Strategy by Sub-Directorate II of Property of the Criminal Investigation Unit of the Indonesian National Police against the Mafia of Forgery of Ownership Certificates." International Journal of Science and Society 7, no. 2 (2025): 373–85. https://doi.org/10.54783/ijsoc.v7i2.1446.

Full text
Abstract:
The rampant practice of land document forgery has caused public unrest and disrupted legal certainty over land ownership. This study aims to analyze the legal protection strategies implemented by Subdirectorate II of Property, Criminal Investigation Agency of the Indonesian National Police in handling cases involving the mafia of land ownership certificate forgery. This research uses an empirical legal research method with a descriptive qualitative approach, utilizing data collection techniques such as in-depth interviews, documentation studies, and observation. The results of the study indica
APA, Harvard, Vancouver, ISO, and other styles
18

Godana, Hillary, Samson Wokabi Mwangi, and Panuel Mwaeke. "Security Managers’ Perspectives on Challenges Facing Commercial Banks in Preventing Frauds in Nairobi City County, Kenya." Advances in Social Sciences Research Journal 9, no. 12 (2022): 1–12. http://dx.doi.org/10.14738/assrj.912.13539.

Full text
Abstract:
This paper uses data collected for an MA Thesis on Security Managers’ perspectives on challenges facing Commercial Banks in Preventing Frauds in Nairobi County, Kenya. The study was motivated by continued rise of frauds in commercial banks in the county, despite the extensive mitigation measures put in place to deter frauds. The study established the nature of frauds prevalent in Kenya commercial banks in Nairobi County, assessed the determinants of fraud in Kenya commercial banks, determined Bank Security Managers Capacity in fraud prevention, and finally examined Security Managers perception
APA, Harvard, Vancouver, ISO, and other styles
19

Ogbaini, Aliu Clement, Afam Augustine Akpor, Ransome Oboh, John Edewor Oputa, and Vine Bello Marvis. "The Role of Forensic Accounting in Fraud Detection and Prevention in Nigerian Public Sector: A Case Study of Lagos, Nigeria." Pedagogik: Jurnal Pendidikan 19, no. 1 (2024): 71–83. http://dx.doi.org/10.33084/pedagogik.v19i1.7005.

Full text
Abstract:
This study investigated the role of forensic accounting in fraud detection and prevention in the Nigerian Public Sector, Lagos State Government was used as a case study. The study aimed to assess the impact of forensic accounting on fraud detection and prevention in the Lagos State Government and recommend strategies for fraud prevention in the Nigerian Public Sector. A sample of 60 Certified Accountants was selected using purposive sampling techniques and secondary data from past financial statements. The findings were analyzed using frequency distribution tables, simple percentages and chi-s
APA, Harvard, Vancouver, ISO, and other styles
20

Sawarkar, Ankush D., and Anjali Deepak Hazar. "IoT Forensic Cyber Activities Detection and Prevention with Automated Machine Learning Model." Journal of Sensors, IoT & Health Sciences 2, no. 2 (2024): 1–15. http://dx.doi.org/10.69996/jsihs.2024006.

Full text
Abstract:
The Internet of Things (IoT) has been deployed in a vast range of applications with exponential increases in data size and complexity. Existing forensic techniques are not effective for the accuracy and detection rate of security issues in IoT forensics. Cyber forensic comprises huge volume constraints that are processing huge volumes of data in the Information and Communication Technology (ICT) comprised of IoT devices and platforms. Trust blockchain is effective technology those are utilized to assess the tamper-proof records in all transaction in the IoT environment. With the implementation
APA, Harvard, Vancouver, ISO, and other styles
21

Sabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.

Full text
Abstract:
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forens
APA, Harvard, Vancouver, ISO, and other styles
22

Foluke Ekundayo. "Big data and machine learning in digital forensics: Predictive technology for proactive crime prevention." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 2692–709. https://doi.org/10.30574/wjarr.2024.24.2.3659.

Full text
Abstract:
The integration of big data analytics and machine learning [ML] has transformed digital forensics, enabling predictive technologies that proactively prevent cybercrimes and enhance crime investigation processes. As cyber threats grow in scale and complexity, traditional forensic methods face limitations in scalability, efficiency, and accuracy. Big data platforms, such as Hadoop and Spark, combined with advanced ML techniques, offer revolutionary approaches to address these challenges. By analysing vast datasets—including network traces, file metadata, and logs—big data enables the identificat
APA, Harvard, Vancouver, ISO, and other styles
23

Foluke, Ekundayo. "Big data and machine learning in digital forensics: Predictive technology for proactive crime prevention." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 2692–709. https://doi.org/10.5281/zenodo.15142830.

Full text
Abstract:
The integration of big data analytics and machine learning [ML] has transformed digital forensics, enabling predictive technologies that proactively prevent cybercrimes and enhance crime investigation processes. As cyber threats grow in scale and complexity, traditional forensic methods face limitations in scalability, efficiency, and accuracy. Big data platforms, such as Hadoop and Spark, combined with advanced ML techniques, offer revolutionary approaches to address these challenges. By analysing vast datasets—including network traces, file metadata, and logs—big data enables the
APA, Harvard, Vancouver, ISO, and other styles
24

Dkhar, Wallamkupar, Benjamin F. Lyngdoh, and Paramjeet Kumar. "Forensic Accounting: A Strategy for Preventing and Detecting Financial Fraud in The Digital Era." International Journal of Accounting and Economics Studies 12, no. 2 (2025): 282–91. https://doi.org/10.14419/z7g9we35.

Full text
Abstract:
This study aims to explore the evolving landscape of forensic accounting practices in the context of preventing and detecting financial fraud in this digital era. The role of a forensic accountant has become enormously critical in navigating fraudulent and malpractices activities, particularly with the proliferation of technology and increasing complexities in financial transactions. Our study investigates and highlights the latest techniques, tools, and methodologies employed in forensic accounting to unearth fraudulent schemes, including data analytics, digital forensics, and advanced forens
APA, Harvard, Vancouver, ISO, and other styles
25

Amparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.

Full text
Abstract:
Computer and Internet-based crimes are widespread problems that affect a vast number of individuals. Combating such criminals has become a difficult task for competent authorities, as it has enabled a new wave of criminal activity. This phenomenon has drew the attention of security and justice systems all over the world, and these institutions must now deal with the task of reforming and redefining the laws and methodologies used to investigate computer-related criminal activity (Garfinkel, 2010). On the other hand cybercriminals are also making use of existing technologies or systems and new
APA, Harvard, Vancouver, ISO, and other styles
26

Smirnova, S. A., G. G. Omel’yanyuk, V. V. Gulevskaya, T. V. Perfilova, and M. V. Nikulina. "Wildlife Forensics: Current State and Development Perspectives in the Russian Federation." Theory and Practice of Forensic Science 15, no. 1 (2020): 84–93. http://dx.doi.org/10.30764/1819-2785-2020-1-84-93.

Full text
Abstract:
The article notes the necessary preconditions for building a new direction of expert activity in the system of the Russian Ministry of Justice the wildlife forensics. Close attention is paid to the objects of this type of forensic research; typical questions raised before the expert are enumerated; relevant examples from expert practice are given. The author also considers the application of expert prevention activities in wildlife forensics to avoid violations leading to the extinction of rare species of plants and animals. The article also explains the prospects of implementation of DNA test
APA, Harvard, Vancouver, ISO, and other styles
27

Elisa Khoeriyah Sukawanda and Cris Kuntadi. "Faktor-Faktor Yang Mempengaruhi Upaya Pencegahan Dan Pengungkapan Fraud: Peran Penting Akuntansi Forensik, Dan Audit Investigasi." Journal of Islamic Economics and Finance 2, no. 2 (2024): 207–21. http://dx.doi.org/10.59841/jureksi.v2i2.1159.

Full text
Abstract:
Fraud is not a new disease in the global economy. This crime can even cause extraordinary losses to the business world, the country and the world. According to the ACFE, fraud costs businesses 5% of their total revenue each year. Therefore, preventative and disclosure measures are also important to address this serious problem. One of them is forensic accounting and investigative auditing. However, because it is a new field, few people understand forensic accounting and investigative auditing, still have questions about fraud, and do not know techniques for preventing and detecting fraud. This
APA, Harvard, Vancouver, ISO, and other styles
28

Nikitina, I. E. "Current Issues in Justice and Home Affairs Cooperation between EU Member States Pertaining to Forensic Services and Investigative Operations." Theory and Practice of Forensic Science 12, no. 3 (2017): 110–18. http://dx.doi.org/10.30764/1819-2785-2017-12-3-110-118.

Full text
Abstract:
The paper discusses the EU's decision to establish the first supranational law enforcement body – the European Public Prosecutor's Office (EPPO) – and further articulates the notion of “supranationalism”. The author argues for the need to develop a strategic plan for interaction between the Prosecutor General's Office of the Russian Federation and the EPPO to ensure effective oversight over the practice of forensic science and criminalistics, lawfulness of the actions of preliminary investigation units conducting forensic and search operations, and the use of specialized knowledge in transnati
APA, Harvard, Vancouver, ISO, and other styles
29

González Arias, Rafael, Javier Bermejo Higuera, J. Javier Rainer Granados, Juan Ramón Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Systematic Review: Anti-Forensic Computer Techniques." Applied Sciences 14, no. 12 (2024): 5302. http://dx.doi.org/10.3390/app14125302.

Full text
Abstract:
The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, togethe
APA, Harvard, Vancouver, ISO, and other styles
30

T M Bhraguram. "An Object Based Decision Support Protocol for Multi- Constraint Agile Digital Forensics Investigation." Communications on Applied Nonlinear Analysis 31, no. 4s (2024): 311–28. http://dx.doi.org/10.52783/cana.v31.854.

Full text
Abstract:
The recent scenarios expressing live digital forensics and its applications in security domain with multiple constraint-based analysis. Many digital forensic tools available in the market helps to make a good analysis of various digital forensic situations but the awareness of the situation-based decision making is still an unsolvable issue in many critical forensic cases. As the digital forensic domain increases its scope to various business and computer related industries, leading market investors and the employees are much aware about the digital crimes and its prevention. Here in this arti
APA, Harvard, Vancouver, ISO, and other styles
31

Ball, J., I. Dimayuga, I. Summerell, et al. "CANADIAN NATIONAL NUCLEAR FORENSICS CAPABILITY PROJECT." AECL Nuclear Review 4, no. 1 (2015): 1–7. http://dx.doi.org/10.12943/anr.2015.00043.

Full text
Abstract:
Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and D
APA, Harvard, Vancouver, ISO, and other styles
32

Setyo Prihanto, Ahmad Hasan Muzaky, and Bima Widhi Yuliantoro. "The Role of Forensic Accounting in Combating Financial Fraud in the Digital Age." Harmoni Economics: International Journal of Economics and Accounting 1, no. 2 (2024): 16–22. http://dx.doi.org/10.70062/harmonieconomics.v1i2.29.

Full text
Abstract:
Financial fraud has become a persistent issue with the rise of online transactions and digital platforms. This paper explores the evolving role of forensic accountants in identifying and preventing fraud in the digital age. Through case studies and recent examples of financial crimes, the study evaluates the effectiveness of forensic accounting techniques such as data analytics, digital forensics, and cyber risk assessment. The paper also discusses the regulatory landscape and suggests strategies for improving fraud detection through technological innovation in accounting.
APA, Harvard, Vancouver, ISO, and other styles
33

Seema, Bagchi (Chattaraj), Chakrabortty Ashutosh, K. Kuila D., and Chandra Lahiri Sujit. "Comparison of the composition profiles of the low explosives in India from forensic exhibits and a brief discussion on preventive forensic techniques." Journal of Indian Chemical Society 93, Jul 2016 (2016): 889–906. https://doi.org/10.5281/zenodo.5639449.

Full text
Abstract:
Central Forensic Science Laboratory, Government of India, 30, Gorachand Road, Kolkata-700 014, India E-mail : bagchiseema@gmail.com, sujitclahiri@yahoo.com Fax : 91-33-22849442 Geological Survey of India, Government of India, Kolkata-700 069, India <em>E-mail</em> : cashu@rediffmail.com Chemical Examination Laboratory, Excise Department, Government of West Bengal, Kolkata-700 046, India <em>E-mail</em> : kuiladk@rediffmail.com More than 1650 pre blast and post blast exhibits were analyzed using routine analytical procedures supplemented by advanced analytical techniques like Ion-Chromatography
APA, Harvard, Vancouver, ISO, and other styles
34

Kucherenko, D. S. "Preconditions for the formation of the company's information security system." Quality. Innovation. Education, no. 2 (2021): 93–101. http://dx.doi.org/10.31145/1999-513x-2021-2-93-101.

Full text
Abstract:
The article discusses the problems of managing the information security of the enterprise in a changing business climate. The description, shortcomings and advantages of the existing asS TP security system are given. The specifics of the company's procedural and technological security capabilities have been revealed. The enterprise's IT infrastructure has been identified in the information security and cyber defense format, consisting of three components: the servers of applications that deliver business applications; database servers that contain business data and system administration channe
APA, Harvard, Vancouver, ISO, and other styles
35

Supriatna, Nono, and R. Nelly Nur Apandi. "PENGEMBANGAN SILABUS AKUNTANSI FORENSIK BAGI MAHASISWA PROGRAM STUDI AKUNTANSI." Jurnal Riset Akuntansi dan Keuangan 5, no. 2 (2017): 1495–500. https://doi.org/10.17509/jrak.v5i2.8801.

Full text
Abstract:
Abstract. This research aims to develop a syllabus used in the forensic accounting program accounting studies in S1. The study is conducted by collecting, examining and developing forensic accounting course syllabi that are already used in some universities in Indonesia and overseas. This research used qualitative methodology. This research used depth interview with a participant who expert in accounting forensic and auditing. This study illustrates that the lecture material includes a material that consists of the definition of forensic accounting, the forensic accounting profession and its r
APA, Harvard, Vancouver, ISO, and other styles
36

Filipenko, N., O. Uhrovetskyi, and O. Sharapova. "THEORETICAL BASES OF EXPERT PREVENTION: CONCEPT AND TASKS." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (2019): 151–62. http://dx.doi.org/10.32353/khrife.2.2019.11.

Full text
Abstract:
The article analyzes conceptual foundations, views and ideas concerning the essence of expert prevention. The relationship between the concepts of «prevention» and «prevention», which is in contact with each other, is investigated, because one of the main problems of the criminal investigation of the phenomenon of expert prevention is the ambiguity of both scientific understanding and the practical application of the corresponding conceptual-categorical apparatus. It is emphasized that the essence of expert prevention is the influence of the relevant subjects on crime through the use of specia
APA, Harvard, Vancouver, ISO, and other styles
37

Kamble, Prof Tulshiram, Dr Pushpendu Rakshit, and Dr Bajrang Lal. "Assessing Cybersecurity Awareness And Issues Among Citizens Of Navi Mumbai And Panvel Zone." International Journal of Environmental Sciences 11, no. 9s (2025): 544–51. https://doi.org/10.64252/h4wamj83.

Full text
Abstract:
The government’s demonetization initiative, along with its vision to transform India into a cashless economy, has brought a significant shift in payment behaviour, accelerating the adoption of digital payment systems. This shift was further catalysed by the COVID-19 pandemic, which drastically reduced physical transactions and increased reliance on digital modes such as E-wallets. Although traditionally Indian consumers preferred cash-on-delivery methods, the pandemic has prompted a rapid rise in mobile wallet usage due to convenience and safety. The diffusion of mobile payment systems is high
APA, Harvard, Vancouver, ISO, and other styles
38

Abdon, Aaron Lensmer M., Judilee Christian M. Ang, Keinaz N. Domingo, and Jerome E. Gutierrez. "Automated Windows-Based Timelining Tool for Memory and Disk Image Analysis: Leveraging Timsort Algorithm with WinPmem, FTK Imager, Volatility 3 and The Sleuth Kit." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 16–22. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.002.

Full text
Abstract:
As technology evolves, so does the threat of cyberattacks – making Digital Forensics crucial for damage control and prevention. This paper aims to address the inefficiencies faced by investigators in a forensic setting by automating the processes necessary for disk and memory image acquisition, forensic artifact parsing, and timeline generation. Leveraging publicly available tools such as: WinPmem, FTK Imager, Volatility 3 (VOL3), and The Sleuth Kit (TSK), the developed Python script is then able to provide for a clearer insight into the series of events that have transpired during a cyber inc
APA, Harvard, Vancouver, ISO, and other styles
39

Ahmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. "IoT Forensics: Current Perspectives and Future Directions." Sensors 24, no. 16 (2024): 5210. http://dx.doi.org/10.3390/s24165210.

Full text
Abstract:
The Internet of Things forensics is a specialised field within digital forensics that focuses on the identification of security incidents, as well as the collection and analysis of evidence with the aim of preventing future attacks on IoT networks. IoT forensics differs from other digital forensic fields due to the unique characteristics of IoT devices, such as limited processing power and connectivity. Although numerous studies are available on IoT forensics, the field is rapidly evolving, and comprehensive surveys are needed to keep up with new developments, emerging threats, and evolving be
APA, Harvard, Vancouver, ISO, and other styles
40

Kasum, Josip, Marko Pilić, Nebojša Jovanović, and Harrison Pienaar. "Model of Forensic Hydrography." Transactions on Maritime Science 8, no. 2 (2019): 246–52. http://dx.doi.org/10.7225/toms.v08.n02.010.

Full text
Abstract:
Forensic science plays a vital role in the work of judicial bodies. The contents, knowledge, and specialized expertise permit the identification of facts essential to law enforcement and judicial disputes. Hydrography is an applied science that concerns the physical description, measurement, mapping, and predictions of marine and terrestrial water features (ocean, seas, rivers, lakes, and coastal areas). A variety of economic and other activities take place in water resources. In order to reduce incidents and losses, it is extremely important to operate with accurate hydrographic data. In addi
APA, Harvard, Vancouver, ISO, and other styles
41

Nuzhdin, Andrey. "Technical and Forensic Support for the Prevention of Penitentiary Crimes." Russian Journal of Criminology 15, no. 6 (2021): 797–806. http://dx.doi.org/10.17150/2500-4255.2021.15(6).797-806.

Full text
Abstract:
Crimes committed by convicts serving criminal punishments present an urgent social problem. Although inmates are isolated and under constant control, the number of penitentiary crimes is growing. The identification of the whole complex of circumstances contributing to penitentiary crimes and their elimination are a guarantee of successful work on preventing crimes of this type. The potential of modern achievements in science and technology should be actively used in preventive work. Many legal scholars stress that the possibilities of using technical means, techniques and methods in the proces
APA, Harvard, Vancouver, ISO, and other styles
42

ARON, Ioan. "Criminal expertise of traffic accidents." SERIES VII - SOCIAL SCIENCES AND LAW 13(62), no. 2 (2021): 13–20. http://dx.doi.org/10.31926/but.ssl.2020.13.62.4.2.

Full text
Abstract:
The processes of extension and globalization of the criminal phenomenon determine the judicial bodies to reconsider the approach of the methods of finding and preventing crimes. An important place in this context is occupied by forensic expertise, based on the knowledge of maternal science, forensics, but also on technical, natural, legal sciences and of course procedural norms, which determine the principles and conditions for correct resolution of issues of interest to the judiciary.
APA, Harvard, Vancouver, ISO, and other styles
43

Mitrofanova, A. A. "On the Essence and Content of Forensic Crime Prevention: Theoretical and Practical Aspects." Courier of Kutafin Moscow State Law University (MSAL)), no. 6 (August 29, 2024): 153–62. http://dx.doi.org/10.17803/2311-5998.2024.118.6.153-162.

Full text
Abstract:
The problem of determining the essence and content of the concept of «forensic crime prevention» and its relationship with other related concepts is analyzed. One of the means of forensic crime prevention is to identify, during criminal proceedings, circumstances that contributed to the commission of a crime, with subsequent submission to the relevant organization or official of a proposal to take measures to eliminate these circumstances or other violations of the law. The work notes the difficulties that arise in practice when implementing this form of preventive activity of the investigator
APA, Harvard, Vancouver, ISO, and other styles
44

Afrogha Nelson. "Forensic Accounting Practice and Fraud Management in Nigeria Public Sector Entities." Journal of Information Systems Engineering and Management 10, no. 48s (2025): 1239–55. https://doi.org/10.52783/jisem.v10i48s.9754.

Full text
Abstract:
Fraud and financial crimes remain persistent challenges undermining the effectiveness and credibility of Nigeria’s public sector institutions. Despite the adoption of conventional auditing and internal control mechanisms, the frequency and scale of financial mismanagement indicate that traditional approaches are insufficient to address the growing sophistication of fraud. This study investigates the impact of forensic accounting practices on fraud management in Nigerian public sector entities. Specifically, it explores the role of forensic tools internal control systems, investigative accounti
APA, Harvard, Vancouver, ISO, and other styles
45

Makushkina, Oxana, and Svetlana Polubinskaya. "Prevention of Dangerous Acts of Persons with Mental Disorders: Organization, Statistics, Trends." Russian Journal of Criminology 13, no. 5 (2019): 791–802. http://dx.doi.org/10.17150/2500-4255.2019.13(5).791-802.

Full text
Abstract:
Dangerous and violent acts of mentally disordered persons that pose a threat to the health and lives of people around them frequently attract the media attention and become a subject of public debates. Prevention of such actions is one of the most important tasks of the psychiatric care system. This article describes the organization of psychiatric prevention at federal and regional levels, involving all medical organizations that provide outpatient and inpatient psychiatric care. The primary focus is on forensic psychiatric prevention of dangerous behavior of the mentally ill. One of the form
APA, Harvard, Vancouver, ISO, and other styles
46

Pośpiech, Ewelina, Paweł Teisseyre, Jan Mielniczuk, and Wojciech Branicki. "Predicting Physical Appearance from DNA Data—Towards Genomic Solutions." Genes 13, no. 1 (2022): 121. http://dx.doi.org/10.3390/genes13010121.

Full text
Abstract:
The idea of forensic DNA intelligence is to extract from genomic data any information that can help guide the investigation. The clues to the externally visible phenotype are of particular practical importance. The high heritability of the physical phenotype suggests that genetic data can be easily predicted, but this has only become possible with less polygenic traits. The forensic community has developed DNA-based predictive tools by employing a limited number of the most important markers analysed with targeted massive parallel sequencing. The complexity of the genetics of many other appear
APA, Harvard, Vancouver, ISO, and other styles
47

Serketzis, Nikolaos, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, and George J. Pangalos. "Actionable threat intelligence for digital forensics readiness." Information & Computer Security 27, no. 2 (2019): 273–91. http://dx.doi.org/10.1108/ics-09-2018-0110.

Full text
Abstract:
PurposeThe purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.Design/methodology/approachThis paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.FindingsWhile threat intelligence exchange steadily becom
APA, Harvard, Vancouver, ISO, and other styles
48

Daniels, Samuel Opoku. "Mobile/Telephone Contacts and Calls In Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 315–20. http://dx.doi.org/10.22624/aims/crp-bk3-p50.

Full text
Abstract:
When tackling and preventing crime, the analysis of mobile or tele phone data, particularly contacts and calls among crime actors plays a significant role in both civil and criminal cases. Forensic analyst and investigators are able to reconstruct illegal and suspicious activities between specific individuals on the basis of the relationships connecting those individuals. This paper discusses mobile / tele phone contacts and calls in forensic analysis. By analysing the contacts and call log data among individuals related to a criminal activity, forensic analysts and investigators get a proper
APA, Harvard, Vancouver, ISO, and other styles
49

Mendoza and Schwarze. "Sequential Disaster Forensics: A Case Study on Direct and Socio-Economic Impacts." Sustainability 11, no. 21 (2019): 5898. http://dx.doi.org/10.3390/su11215898.

Full text
Abstract:
Disaster damages and losses have been increasing in recent decades, highlighting the need to learn from past events. Only a better understanding of the fundamental causes of disasters and their impacts on society can lead to effective prevention and reduction of disaster risk. In this context, disaster forensics focuses on the analysis and interaction of risk factors (i.e., hazard, exposure and vulnerability) and the identification of underlying causes, in order to tackle them through dedicated action. In this work, we explore the results of disaster forensics through a case study of subsequen
APA, Harvard, Vancouver, ISO, and other styles
50

Berezhnov, S. P., H. I. Petrashenko, N. V. Kurdil, et al. "Modern Model of Education and Training Center Preparation of Experts in the Field of Chemical, Biological, Radiation and Nuclear Safety (Results of the first Chemical Safety Training under Project 57: Strengthening Crime Scene Forensics Capabilities in Investigating CBRN Incidents. Ukraine, Kyiv, July 2019)." Ukrainian Journal of Modern Toxicological Aspects 89, no. 2 (2020): 20–26. http://dx.doi.org/10.33273/2663-4570-2020-89-2-20-26.

Full text
Abstract:
Minimizing the effects of chemical, biological, radiation and nuclear (CBRN) incidents requires the simultaneous efforts of different specialists not only within one state, so recently international projects have been chosen for the purpose of developing and implementing not only national measures to minimize CBRN threats, but also coordination at the international level. The Aim of the Research. Substantiation of the relevance of a permanent international training center organization for the training of specialists in the field of CBRN security (direction — chemical security) for the needs of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!