首页 > 最新文献

Journal of Digital Forensics Security and Law最新文献

英文 中文
Identity Management and Security 身份管理和安全
IF 0.3 Pub Date : 2019-10-01 DOI: 10.1017/9781780688909.007
J. Schroers
{"title":"Identity Management and Security","authors":"J. Schroers","doi":"10.1017/9781780688909.007","DOIUrl":"https://doi.org/10.1017/9781780688909.007","url":null,"abstract":"","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75407990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National and Public Security within and beyond the Police Directive 国家和公共安全在警察指令之内和之外
IF 0.3 Pub Date : 2019-07-07 DOI: 10.1017/9781780688909.003
Plixavra Vogiatzoglou, Stefano Fantin
During the drafting of Directive (EU) 2016/680 the major European data protection supervisory bodies raised their concerns as regards the scope of the directive, and in particular the purpose of safeguarding public security within. The directive does not further define the notion of public security, while explicitly juxtaposing the concept vis-a-vis national security, as the latter is excluded from the scope of application of EU legislation. Several months after the official deadline for the national transposition of the directive, this question has not been given any more thought. This chapter will thus seek to clarify the scope of the directive and the meaning of public security within, first through its contraposition with the equally nebulous concept of national security, and then through the definition of competent authorities, as formulated in the text of the directive and transposed into national law.
在起草指令(EU) 2016/680期间,主要的欧洲数据保护监督机构提出了他们对指令范围的担忧,特别是保护公共安全的目的。该指令没有进一步定义公共安全的概念,但明确地将这一概念与国家安全并列,因为后者被排除在欧盟立法的适用范围之外。在国家指令转换的官方截止日期过去几个月后,这个问题还没有得到更多的考虑。因此,本章将设法澄清该指令的范围和其中公共安全的含义,首先通过它与同样模糊的国家安全概念的对照,然后通过在该指令的案文中制定并转化为国家法律的主管当局的定义。
{"title":"National and Public Security within and beyond the Police Directive","authors":"Plixavra Vogiatzoglou, Stefano Fantin","doi":"10.1017/9781780688909.003","DOIUrl":"https://doi.org/10.1017/9781780688909.003","url":null,"abstract":"During the drafting of Directive (EU) 2016/680 the major European data protection supervisory bodies raised their concerns as regards the scope of the directive, and in particular the purpose of safeguarding public security within. The directive does not further define the notion of public security, while explicitly juxtaposing the concept vis-a-vis national security, as the latter is excluded from the scope of application of EU legislation. Several months after the official deadline for the national transposition of the directive, this question has not been given any more thought. This chapter will thus seek to clarify the scope of the directive and the meaning of public security within, first through its contraposition with the equally nebulous concept of national security, and then through the definition of competent authorities, as formulated in the text of the directive and transposed into national law.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90976949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Criminal Profiling and Non-Discrimination: On Firm Grounds for the Digital Era? 犯罪侧写与非歧视:数字时代的坚实基础?
IF 0.3 Pub Date : 2019-07-01 DOI: 10.1017/9781780688909.004
Laurens Naudts
Big data analytics allow law enforcement agencies to build profiles of individuals, and groups of individuals, in order to guide the decisions they need to make for the prediction, prevention, detection and combat of crime. This chapter analyses the role of non-discrimination law, and more specifically the legal discourse on non-discrimination grounds, as a lens to evaluate the use of (group) profiles for security purposes. The chapter will first explore the Law Enforcement Directive (Directive 2016/680) to ascertain the legal limits of profiling from a data protection perspective. Mainly aimed towards safeguarding the fundamental rights to privacy and data protection, data protection laws nonetheless remain sensitive towards the potential discriminatory nature of personal data processing. In the chapter’s second section, it will be ascertained, through an analysis of the European Court of Human Rights’ (ECtHR) case law, to what extent the use of profiles, as they are deployed to differentiate amongst individuals or groups of individuals, can be considered problematic from a non-discrimination perspective. The chapter therefore aims to identify the key criteria developed by the ECtHR for new differentiation grounds to engage the European Convention on Human Rights’ non-discrimination clause. The legal analysis will be juxtaposed to the risks big data analytics pose to the fundamental rights of equality and non-discrimination. It will be argued that in order to adequately respond to the new threats of technology, both a return to a procedural and instrumental conception of equality and non-discrimination, and a thorough insight into the data and tools used by criminal authorities, might be needed.
大数据分析使执法机构能够建立个人和个人群体的档案,以指导他们做出预测、预防、侦查和打击犯罪所需的决策。本章分析了非歧视法律的作用,更具体地说,是关于非歧视理由的法律论述,作为评估出于安全目的使用(群体)档案的一个视角。本章将首先探讨执法指令(指令2016/680),以从数据保护的角度确定分析的法律限制。数据保护法的主要目的是维护隐私和数据保护的基本权利,但对个人数据处理的潜在歧视性仍然敏感。在本章的第二节中,将通过对欧洲人权法院判例法的分析来确定,从非歧视的角度来看,在何种程度上使用个人档案来区分个人或个人群体是有问题的。因此,本章旨在确定欧洲人权法院为引入《欧洲人权公约》的不歧视条款而制定的新的区别依据的关键标准。法律分析将与大数据分析对平等和非歧视基本权利构成的风险并列。有人认为,为了对技术的新威胁作出适当反应,可能需要回到平等和不歧视的程序性和工具性概念,并彻底了解刑事当局使用的数据和工具。
{"title":"Criminal Profiling and Non-Discrimination: On Firm Grounds for the Digital Era?","authors":"Laurens Naudts","doi":"10.1017/9781780688909.004","DOIUrl":"https://doi.org/10.1017/9781780688909.004","url":null,"abstract":"Big data analytics allow law enforcement agencies to build profiles of individuals, and groups of individuals, in order to guide the decisions they need to make for the prediction, prevention, detection and combat of crime. This chapter analyses the role of non-discrimination law, and more specifically the legal discourse on non-discrimination grounds, as a lens to evaluate the use of (group) profiles for security purposes. The chapter will first explore the Law Enforcement Directive (Directive 2016/680) to ascertain the legal limits of profiling from a data protection perspective. Mainly aimed towards safeguarding the fundamental rights to privacy and data protection, data protection laws nonetheless remain sensitive towards the potential discriminatory nature of personal data processing. In the chapter’s second section, it will be ascertained, through an analysis of the European Court of Human Rights’ (ECtHR) case law, to what extent the use of profiles, as they are deployed to differentiate amongst individuals or groups of individuals, can be considered problematic from a non-discrimination perspective. The chapter therefore aims to identify the key criteria developed by the ECtHR for new differentiation grounds to engage the European Convention on Human Rights’ non-discrimination clause. The legal analysis will be juxtaposed to the risks big data analytics pose to the fundamental rights of equality and non-discrimination. It will be argued that in order to adequately respond to the new threats of technology, both a return to a procedural and instrumental conception of equality and non-discrimination, and a thorough insight into the data and tools used by criminal authorities, might be needed.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84774358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration 美国上诉法院刑事案件中的数字证据:趋势和需要考虑的问题
IF 0.3 Pub Date : 2019-01-01 DOI: 10.15394/jdfsl.2019.1609
M. Novák
{"title":"Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration","authors":"M. Novák","doi":"10.15394/jdfsl.2019.1609","DOIUrl":"https://doi.org/10.15394/jdfsl.2019.1609","url":null,"abstract":"","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83975508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications 改进的先前卸载的计算机应用程序的容错推断
IF 0.3 Pub Date : 2019-01-01 DOI: 10.15394/jdfsl.2019.1626
Oluwaseun Adegbehingbe, James H. Jones
When an application is uninstalled from a computer system, the application’s deleted file contents are overwritten over time, depending on factors such as operating system, available unallocated disk space, user activity, etc. As this content decays, the ability to infer the application’s prior presence, based on the remaining digital artifacts, becomes more difficult. Prior research inferring previously installed applications by matching sectors from a hard disk of interest to a previously constructed catalog of labeled sector hashes showed promising results. This prior work used a white list approach to identify relevant artifacts, resulting in no irrelevant artifacts but incurring the loss of some potentially useful artifacts. In this current work, we collect a more complete set of relevant artifacts by adapting the sequential snapshot file differencing method to identify and eliminate from the catalog file-system changes which are not due to application installation and use. The key contribution of our work is the building of a more complete catalog which ultimately results in more accurate prior application inference.
当从计算机系统卸载应用程序时,应用程序已删除的文件内容会随着时间的推移而被覆盖,这取决于操作系统、可用未分配磁盘空间、用户活动等因素。随着这些内容的衰减,基于剩余的数字工件推断应用程序先前存在的能力变得更加困难。先前的研究通过将感兴趣的硬盘扇区与先前构建的标记扇区哈希目录相匹配来推断先前安装的应用程序,显示出有希望的结果。先前的工作使用白名单方法来识别相关的工件,导致没有不相关的工件,但是导致一些潜在有用的工件的丢失。在当前的工作中,我们通过采用顺序快照文件差异方法收集了一组更完整的相关工件,以从目录中识别和消除不是由于应用程序安装和使用而导致的文件系统更改。我们的工作的关键贡献是建立一个更完整的目录,最终导致更准确的先验应用推断。
{"title":"Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications","authors":"Oluwaseun Adegbehingbe, James H. Jones","doi":"10.15394/jdfsl.2019.1626","DOIUrl":"https://doi.org/10.15394/jdfsl.2019.1626","url":null,"abstract":"When an application is uninstalled from a computer system, the application’s deleted file contents are overwritten over time, depending on factors such as operating system, available unallocated disk space, user activity, etc. As this content decays, the ability to infer the application’s prior presence, based on the remaining digital artifacts, becomes more difficult. Prior research inferring previously installed applications by matching sectors from a hard disk of interest to a previously constructed catalog of labeled sector hashes showed promising results. This prior work used a white list approach to identify relevant artifacts, resulting in no irrelevant artifacts but incurring the loss of some potentially useful artifacts. In this current work, we collect a more complete set of relevant artifacts by adapting the sequential snapshot file differencing method to identify and eliminate from the catalog file-system changes which are not due to application installation and use. The key contribution of our work is the building of a more complete catalog which ultimately results in more accurate prior application inference.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87585592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-Security Risks of Fedwire 联邦电信的网络安全风险
IF 0.3 Pub Date : 2019-01-01 DOI: 10.15394/JDFSL.2019.1590
Markus Bilger
This paper will review the risks associated with the Federal Reserve’s Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.
本文将回顾美联储的联邦电讯网络作为美国金融体系有效运作所必需的关键资源所带来的风险。它将研究实时银行间转账系统的商业模式、Fedwire的网络特征、成功攻击Fedwire的可能性及其对美国金融体系的潜在影响。
{"title":"Cyber-Security Risks of Fedwire","authors":"Markus Bilger","doi":"10.15394/JDFSL.2019.1590","DOIUrl":"https://doi.org/10.15394/JDFSL.2019.1590","url":null,"abstract":"This paper will review the risks associated with the Federal Reserve’s Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90428226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems 在Windows操作系统上使用集中式缩略图缓存的快速取证分类
IF 0.3 Pub Date : 2019-01-01 DOI: 10.15394/jdfsl.2019.1591
Sean McKeown, Gordon Russell, P. Leimich
A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and checking these against a database of known contraband. However, modern drives are now so large that it can take several hours just to read this data from the disk, and can contribute to the large investigative backlogs suffered by many law enforcement bodies. Digital forensic triage techniques may thus be used to prioritise evidence and effect faster investigation turnarounds. This paper proposes a new forensic triage method for investigating disk evidence relating to picture files, making use of centralised thumbnail caches that are present in the Windows operating system. Such centralised caches serve as a catalogue of images on the device, allowing for fast triage. This work includes a comprehensive analysis of the thumbnail variants across a range of windows operating systems, which causes difficulties when detecting contraband using cryptographic hash databases. A novel method for large-scale hash database generation is described which allows precalculated cryptographic hash databases to be built from arbitrary image sets for use in thumbnail contraband detection. This approach allows for cryptographic hashes to be generated for multiple Windows versions from the original source image, facilitating wider detection. Finally, a more flexible approach is also proposed which makes novel use of perceptual hashing techniques, mitigating issues caused by the differences between thumbnails across Windows versions. A key contribution of this work demonstrates that by using new techniques, thumbnail caches can be used to robustly and effectively detect contraband in seconds, with processing times being largely independent of disk capacity.
一项常见的调查任务是识别设备上已知的违禁品图像,这通常涉及计算磁盘上所有文件的加密散列,并将其与已知违禁品数据库进行比对。然而,现在的硬盘非常大,仅仅从磁盘读取这些数据就可能需要几个小时,并且可能导致许多执法机构遭受大量的调查积压。因此,数字法医分诊技术可用于优先处理证据并加快调查周转。本文提出了一种新的法医分类方法,用于调查与图片文件有关的磁盘证据,利用Windows操作系统中存在的集中式缩略图缓存。这种集中的缓存作为设备上的图像目录,允许快速分类。这项工作包括对一系列windows操作系统的缩略图变体进行全面分析,这在使用加密散列数据库检测违禁品时造成了困难。描述了一种新的大规模哈希数据库生成方法,该方法允许从任意图像集构建预先计算的密码哈希数据库,用于缩略图违禁品检测。这种方法允许从原始源图像为多个Windows版本生成加密散列,从而促进更广泛的检测。最后,还提出了一种更灵活的方法,该方法新颖地使用了感知哈希技术,减轻了Windows版本之间缩略图差异造成的问题。这项工作的一个关键贡献表明,通过使用新技术,缩略图缓存可以在几秒钟内可靠有效地检测违禁品,处理时间在很大程度上与磁盘容量无关。
{"title":"Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems","authors":"Sean McKeown, Gordon Russell, P. Leimich","doi":"10.15394/jdfsl.2019.1591","DOIUrl":"https://doi.org/10.15394/jdfsl.2019.1591","url":null,"abstract":"A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and checking these against a database of known contraband. However, modern drives are now so large that it can take several hours just to read this data from the disk, and can contribute to the large investigative backlogs suffered by many law enforcement bodies. Digital forensic triage techniques may thus be used to prioritise evidence and effect faster investigation turnarounds. This paper proposes a new forensic triage method for investigating disk evidence relating to picture files, making use of centralised thumbnail caches that are present in the Windows operating system. Such centralised caches serve as a catalogue of images on the device, allowing for fast triage. This work includes a comprehensive analysis of the thumbnail variants across a range of windows operating systems, which causes difficulties when detecting contraband using cryptographic hash databases. A novel method for large-scale hash database generation is described which allows precalculated cryptographic hash databases to be built from arbitrary image sets for use in thumbnail contraband detection. This approach allows for cryptographic hashes to be generated for multiple Windows versions from the original source image, facilitating wider detection. Finally, a more flexible approach is also proposed which makes novel use of perceptual hashing techniques, mitigating issues caused by the differences between thumbnails across Windows versions. A key contribution of this work demonstrates that by using new techniques, thumbnail caches can be used to robustly and effectively detect contraband in seconds, with processing times being largely independent of disk capacity.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83513324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cover Back 盖好
IF 0.3 Pub Date : 2017-12-01 DOI: 10.58940/1558-7223.1517
{"title":"Cover Back","authors":"","doi":"10.58940/1558-7223.1517","DOIUrl":"https://doi.org/10.58940/1558-7223.1517","url":null,"abstract":"","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48933561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on Cyberharassment Investigation: Advances and Trends 网络骚扰调查:进展与趋势特刊
IF 0.3 Pub Date : 2016-12-01 DOI: 10.15394/JDFSL.2016.1416
Jo Bryce, V. N. Franqueira, A. Marrington
{"title":"Special Issue on Cyberharassment Investigation: Advances and Trends","authors":"Jo Bryce, V. N. Franqueira, A. Marrington","doi":"10.15394/JDFSL.2016.1416","DOIUrl":"https://doi.org/10.15394/JDFSL.2016.1416","url":null,"abstract":"","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81433120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints 具体数字分析:基于数字足迹的行为分析
IF 0.3 Pub Date : 2014-03-31 DOI: 10.15394/JDFSL.2014.1160
Chad M. S. Steel
Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals.  This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ongoing investigation.   IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting offenders.
具体数字分析(IDP)是行为分析在数字取证领域的应用。在这一领域的先前工作采取了一种通过试图理解网络罪犯的总体行为来进行行为分析的方法。Â这项工作是第一次采取具体的方法,通过检查特定主题的数字足迹,立即用于正在进行的调查。Â Â IDP为调查人员提供了一个框架,以分析数字行为证据,用于案件规划,主题识别,线索生成,获得和执行搜查令以及起诉罪犯。
{"title":"Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints","authors":"Chad M. S. Steel","doi":"10.15394/JDFSL.2014.1160","DOIUrl":"https://doi.org/10.15394/JDFSL.2014.1160","url":null,"abstract":"Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals.  This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ongoing investigation.   IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting offenders.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2014-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83715094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Journal of Digital Forensics Security and Law
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1