Digital forensics analysis based on cybercrime and the study of the rule of law in space governance

IF 1.1 Q3 COMPUTER SCIENCE, THEORY & METHODS Open Computer Science Pub Date : 2023-01-01 DOI:10.1515/comp-2022-0266
Cheng Chen, Bin Dong
{"title":"Digital forensics analysis based on cybercrime and the study of the rule of law in space governance","authors":"Cheng Chen, Bin Dong","doi":"10.1515/comp-2022-0266","DOIUrl":null,"url":null,"abstract":"Abstract With the rapid development of social informatization, the Internet has become an important channel for global information dissemination. The wireless network space and the real space are intertwined and have a significant impact on the political, economic, and cultural aspects of international society. For example, it can effectively solve the problem of information exchange between cities, regions, and countries. Wireless network crime and wireless network space security issues involve the development of information technology in various countries and, more importantly, involve all aspects of national security. In the age of science and technology, the current situation of cybercrime can be expressed by data as follows: the online crime rate is high. According to relevant statistics, nearly 5 million Internet users are involved in various cases every year due to the use of the Internet. This article starts with the digital forensics of wireless network crime and wireless network security management systems and discusses the composition, characteristics, existing problems, and future development directions of the current wireless network security management system. By comparing the wireless network security laws of China and the United States, using the latent Dirichlet allocation (LDA)-Gibbs model and the k-means algorithm to analyze the data, this article provides guidance for future research on wireless network space governance. The combination of digital forensics analysis based on cybercrime and space governance can improve the level of public security work. At present, the world has made some progress in cyberspace, but it still faces severe challenges. In the face of new situations and new measures, it is necessary to strengthen legislation, improve relevant systems, and strengthen supervision capacity. At the same time, it is necessary to establish perfect technical means and safeguards to ensure that this goal can be achieved.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.1000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Open Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/comp-2022-0266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract With the rapid development of social informatization, the Internet has become an important channel for global information dissemination. The wireless network space and the real space are intertwined and have a significant impact on the political, economic, and cultural aspects of international society. For example, it can effectively solve the problem of information exchange between cities, regions, and countries. Wireless network crime and wireless network space security issues involve the development of information technology in various countries and, more importantly, involve all aspects of national security. In the age of science and technology, the current situation of cybercrime can be expressed by data as follows: the online crime rate is high. According to relevant statistics, nearly 5 million Internet users are involved in various cases every year due to the use of the Internet. This article starts with the digital forensics of wireless network crime and wireless network security management systems and discusses the composition, characteristics, existing problems, and future development directions of the current wireless network security management system. By comparing the wireless network security laws of China and the United States, using the latent Dirichlet allocation (LDA)-Gibbs model and the k-means algorithm to analyze the data, this article provides guidance for future research on wireless network space governance. The combination of digital forensics analysis based on cybercrime and space governance can improve the level of public security work. At present, the world has made some progress in cyberspace, but it still faces severe challenges. In the face of new situations and new measures, it is necessary to strengthen legislation, improve relevant systems, and strengthen supervision capacity. At the same time, it is necessary to establish perfect technical means and safeguards to ensure that this goal can be achieved.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于网络犯罪的数字取证分析与空间治理法治研究
摘要随着社会信息化的快速发展,互联网已成为全球信息传播的重要渠道。无线网络空间和现实空间交织在一起,对国际社会的政治、经济和文化方面产生了重大影响。例如,它可以有效地解决城市、地区和国家之间的信息交换问题。无线网络犯罪和无线网络空间安全问题涉及各国信息技术的发展,更重要的是涉及国家安全的方方面面。在科技时代,网络犯罪的现状可以用以下数据来表示:网络犯罪率高。据相关统计,每年有近500万网民因使用互联网而卷入各种案件。本文从无线网络犯罪的数字取证和无线网络安全管理系统入手,讨论了当前无线网络安全系统的组成、特点、存在的问题以及未来的发展方向。通过比较中美两国的无线网络安全法律,使用潜在的狄利克雷分配(LDA)-吉布斯模型和k-means算法对数据进行分析,为未来无线网络空间治理的研究提供指导。将基于网络犯罪的数字取证分析与空间治理相结合,可以提高公共安全工作水平。当前,世界在网络空间方面取得了一些进展,但仍面临严峻挑战。面对新情况新举措,要加强立法,完善相关制度,强化监管能力。同时,有必要建立完善的技术手段和保障措施,以确保实现这一目标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Open Computer Science
Open Computer Science COMPUTER SCIENCE, THEORY & METHODS-
CiteScore
4.00
自引率
0.00%
发文量
24
审稿时长
25 weeks
期刊最新文献
Artificial intelligence-based public safety data resource management in smart cities Application of fingerprint image fuzzy edge recognition algorithm in criminal technology Application of SSD network algorithm in panoramic video image vehicle detection system Data preprocessing impact on machine learning algorithm performance RFID supply chain data deconstruction method based on artificial intelligence technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1