CYBERCRIMES, LAW, AND CYBER FORENSICS: COMPARATIVE STUDY OF INDIAN, BRITISH, AND AMERICAN CONTEXTS

Sayed Aheed
{"title":"CYBERCRIMES, LAW, AND CYBER FORENSICS: COMPARATIVE STUDY OF INDIAN, BRITISH, AND AMERICAN CONTEXTS","authors":"Sayed Aheed","doi":"10.55041/isjem01520","DOIUrl":null,"url":null,"abstract":"New forms of crime have emerged with the rising prevalence of computer misuse. Some of them include the use of cutting-edge tools and methods for criminal conspiracy. From spreading fraud through email to stealing and reselling intellectual property, cybercrime covers a lot of ground. The domain of computer science known as \"cyber forensics\" is considered to be among the most essential subfields. It is concerned with the investigation of cybercrime. The concept of cyber forensics is broken down into its parts by the author in this paper. This paper focuses on the significance of the topic as well as some of the methods and instruments that are used by cyber forensic investigators. The objective of cyber forensics is to conduct an examination of electronic content in a manner that is forensically sound with the goals of preserving, recovering, analyzing, identifying, and presenting facts and views about digital information. Cyber forensics evidence undergoes the same processes as other digital evidence and serves as supporting evidence in judicial proceedings. Cyber forensics is often linked to the investigation of cybercrime, but it may also be utilized in legal actions involving private parties. This paper demonstrates the necessity for further investigation into how cyber forensics might be used to enhance the identification of cybercrime. This research will help fill in some of the gaps in our knowledge of how cyber forensics investigations are conducted in India and explore cyber security policy in the United Kingdom, the United States, and India to identify both similarities and differences. Keywords: Cybercrime, Cyber Forensics, Policy","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"55 7","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Scientific Journal of Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55041/isjem01520","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

New forms of crime have emerged with the rising prevalence of computer misuse. Some of them include the use of cutting-edge tools and methods for criminal conspiracy. From spreading fraud through email to stealing and reselling intellectual property, cybercrime covers a lot of ground. The domain of computer science known as "cyber forensics" is considered to be among the most essential subfields. It is concerned with the investigation of cybercrime. The concept of cyber forensics is broken down into its parts by the author in this paper. This paper focuses on the significance of the topic as well as some of the methods and instruments that are used by cyber forensic investigators. The objective of cyber forensics is to conduct an examination of electronic content in a manner that is forensically sound with the goals of preserving, recovering, analyzing, identifying, and presenting facts and views about digital information. Cyber forensics evidence undergoes the same processes as other digital evidence and serves as supporting evidence in judicial proceedings. Cyber forensics is often linked to the investigation of cybercrime, but it may also be utilized in legal actions involving private parties. This paper demonstrates the necessity for further investigation into how cyber forensics might be used to enhance the identification of cybercrime. This research will help fill in some of the gaps in our knowledge of how cyber forensics investigations are conducted in India and explore cyber security policy in the United Kingdom, the United States, and India to identify both similarities and differences. Keywords: Cybercrime, Cyber Forensics, Policy
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络犯罪、法律和网络取证:印度、英国和美国背景下的比较研究
随着计算机滥用的日益普遍,出现了新的犯罪形式。其中一些包括使用尖端工具和方法进行犯罪阴谋。从通过电子邮件传播欺诈信息,到窃取和转售知识产权,网络犯罪涉及的领域非常广泛。被称为 "网络取证 "的计算机科学领域被认为是最重要的子领域之一。它关注网络犯罪的调查。作者在本文中将网络取证的概念细分为多个部分。本文重点介绍了这一主题的意义以及网络取证调查人员使用的一些方法和工具。网络取证的目的是以取证合理的方式对电子内容进行检查,其目标是保存、恢复、分析、识别和呈现有关数字信息的事实和观点。网络取证证据与其他数字证据经过相同的程序,可作为司法程序中的辅助证据。网络取证通常与网络犯罪调查有关,但也可用于涉及私人当事方的法律诉讼。本文表明,有必要进一步调查如何利用网络取证加强对网络犯罪的识别。这项研究将有助于填补我们对印度如何进行网络取证调查的一些知识空白,并探讨英国、美国和印度的网络安全政策,以找出其中的异同。关键词网络犯罪 网络取证 政策
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
International trade and performance of firms- Trade dynamics of import export and productivity Effect Of Jeera Powder on the Sensory Attribute Of Carbonated RTS Functional Millet Based Whey Beverage Impact of Artificial Intelligence on Marketing strategies with reference to MNCs ANALYSIS OF INTERNATIONAL TRADE IN INDIA POST COVID-19 Tax Implications of Real Estate Investments: A Comprehensive Analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1