首页 > 最新文献

Journal of Digital Forensics Security and Law最新文献

英文 中文
HOW OFTEN IS EMPLOYEE ANGER AN INSIDER RISK II? DETECTING AND MEASURING NEGATIVE SENTIMENT VERSUS INSIDER RISK IN DIGITAL COMMUNICATIONS-COMPARISON BETWEEN HUMAN RATERS AND PSYCHOLINGUISTIC SOFTWARE 员工愤怒是一种内部风险吗?数字通信中消极情绪与内部风险的检测和测量——人类评价者与心理语言学软件的比较
IF 0.3 Pub Date : 2013-01-01 DOI: 10.15394/JDFSL.2013.1144
E. Shaw, Maria Payri, Ilene Shaw
This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected sample from the Enron archive. WT proved less effective in locating emails Low in negative sentiment on the SNIT and Low in insider risk on the SIRDC. However, WT performed extremely well in identifying communications from actual insiders randomly selected from case files and inserted in this email sample. In addition, it appeared that WT’s measure of perceived Victimization was a significant supplement to using negative sentiment alone, when it came to searching for actual insiders. Previous findings ( Shaw et al., 2013) indicate that this relative weakness in identifying low levels of negative sentiment may not impair WT’s usefulness for identifying communications containing
本研究使用两种最近引入的观察者评级量表(Shaw et al., 2013)来识别和测量负面情绪(文本中的消极情绪量表或SNIT)和内部风险(数字通信中的风险指标量表或SIRDC),以测试用于检测这些风险因素指标的心理语言学软件的性能。以前用于调查的心理语言学软件程序WarmTouch (WT)似乎是一种有效的方法,可以在随机选择的安然档案样本中定位由SNIT评为负面情绪高或中等或由SIRDC评为内幕风险高的通信。WT证明在定位电子邮件方面效果较差,SNIT的负面情绪较低,SIRDC的内部风险较低。然而,WT在识别从案例文件中随机选择并插入此电子邮件样本的实际内部人员的通信方面表现得非常好。此外,当涉及到寻找实际的内部人员时,WT的感知受害测量似乎是单独使用负面情绪的重要补充。先前的研究结果(Shaw et al., 2013)表明,识别低水平负面情绪的相对弱点可能不会损害WT在识别包含的通信中的有用性
{"title":"HOW OFTEN IS EMPLOYEE ANGER AN INSIDER RISK II? DETECTING AND MEASURING NEGATIVE SENTIMENT VERSUS INSIDER RISK IN DIGITAL COMMUNICATIONS-COMPARISON BETWEEN HUMAN RATERS AND PSYCHOLINGUISTIC SOFTWARE","authors":"E. Shaw, Maria Payri, Ilene Shaw","doi":"10.15394/JDFSL.2013.1144","DOIUrl":"https://doi.org/10.15394/JDFSL.2013.1144","url":null,"abstract":"This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected sample from the Enron archive. WT proved less effective in locating emails Low in negative sentiment on the SNIT and Low in insider risk on the SIRDC. However, WT performed extremely well in identifying communications from actual insiders randomly selected from case files and inserted in this email sample. In addition, it appeared that WT’s measure of perceived Victimization was a significant supplement to using negative sentiment alone, when it came to searching for actual insiders. Previous findings ( Shaw et al., 2013) indicate that this relative weakness in identifying low levels of negative sentiment may not impair WT’s usefulness for identifying communications containing","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88659539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How often is Employee Anger an Insider Risk I? Detecting and Measuring Negative Sentiment versus Insider Risk in Digital Communications 员工愤怒是一种内部风险吗?数字通信中负面情绪与内部风险的检测与测量
IF 0.3 Pub Date : 2013-01-01 DOI: 10.15394/JDFSL.2013.1140
E. Shaw, Maria Payri, Michael Cohn, Ilene Shaw
This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased and transitioned to a physical attack was also examined in an actual case study. Inter-rater reliability for the SNIT was extremely high across groups while the SIRDC produced lower, but acceptable levels of agreement. Both measures also significantly distinguished the criterion groups from the overall Enron sample. The scales were then used to measure the frequency of negative sentiment and insider risk indicators in the random Enron sample and the relationship between the two constructs. While low levels of negative sentiment were found in 20% of the sample, moderate and high levels of negative sentiment were extremely rare, occurring in less than 1% of communications. Less than 4% of the sampled emails displayed indicators of insider risk on the SIRDC. Emails containing high levels of insider risk comprised less than one percent or the sample. Of the emails containing negative sentiment in the sample, only 16.3%, also displayed Journal of Digital Forensics, Security and Law, Vol. 8(1) 40 indicators of insider risk. The odds of a communication containing insider risk increased with the level of negative sentiment and only low levels of insider risk were found at low levels of negative sentiment. All of the emails found to contain insider risk indicators on the SIRDC also displayed some level of negative sentiment. The implications of these findings for insider risk detection were then examined.
本研究引入了两个新的量表来识别和测量沟通中的负面情绪和内部风险,以检验这两个结构之间未被探索的关系。采用安然档案中的随机电子邮件样本和来自已建立的内部人员、不满员工、自杀、抑郁、愤怒、焦虑和其他抽样群体的标准测量,建立了文本否定性量表(SNIT)和数字通信内部人员风险量表(SIRDC)的评分者间信度和标准效度。此外,在实际案例研究中,还研究了随着数字攻击风险增加并过渡到物理攻击时,量表对时间变化的敏感性。SNIT的组间信度极高,而SIRDC的一致性较低,但可以接受。这两项措施也显著地将标准组与整个安然样本区分开来。然后使用量表测量随机安然样本中负面情绪和内幕风险指标的频率以及两者之间的关系。虽然在20%的样本中发现了低水平的负面情绪,但中度和高度的负面情绪极为罕见,出现在不到1%的交流中。在抽样的电子邮件中,显示SIRDC内部风险指标的邮件不到4%。包含高度内幕风险的电子邮件在样本中所占比例不到1%。在样本中包含负面情绪的电子邮件中,只有16.3%还显示了Journal Of Digital Forensics, Security and Law, Vol. 8(1) 40个内部风险指标。沟通中包含内幕风险的几率随着负面情绪水平的增加而增加,只有在低水平的负面情绪中发现了低水平的内幕风险。在SIRDC上发现的所有包含内幕风险指标的电子邮件也显示出一定程度的负面情绪。然后对这些发现对内部风险检测的影响进行了检查。
{"title":"How often is Employee Anger an Insider Risk I? Detecting and Measuring Negative Sentiment versus Insider Risk in Digital Communications","authors":"E. Shaw, Maria Payri, Michael Cohn, Ilene Shaw","doi":"10.15394/JDFSL.2013.1140","DOIUrl":"https://doi.org/10.15394/JDFSL.2013.1140","url":null,"abstract":"This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased and transitioned to a physical attack was also examined in an actual case study. Inter-rater reliability for the SNIT was extremely high across groups while the SIRDC produced lower, but acceptable levels of agreement. Both measures also significantly distinguished the criterion groups from the overall Enron sample. The scales were then used to measure the frequency of negative sentiment and insider risk indicators in the random Enron sample and the relationship between the two constructs. While low levels of negative sentiment were found in 20% of the sample, moderate and high levels of negative sentiment were extremely rare, occurring in less than 1% of communications. Less than 4% of the sampled emails displayed indicators of insider risk on the SIRDC. Emails containing high levels of insider risk comprised less than one percent or the sample. Of the emails containing negative sentiment in the sample, only 16.3%, also displayed Journal of Digital Forensics, Security and Law, Vol. 8(1) 40 indicators of insider risk. The odds of a communication containing insider risk increased with the level of negative sentiment and only low levels of insider risk were found at low levels of negative sentiment. All of the emails found to contain insider risk indicators on the SIRDC also displayed some level of negative sentiment. The implications of these findings for insider risk detection were then examined.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75773121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Column: The Science of Digital Forensics: Analysis of Digital Traces 专栏:数字取证科学:数字痕迹分析
IF 0.3 Pub Date : 2012-09-30 DOI: 10.15394/jdfsl.2012.1113
F. Cohen
In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces. “Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine." (see PDF for full column)
在本系列的第1部分(Cohen, 2011a)中,数字痕迹分析是一个基本过程,考官通常使用计算机软件工具来理解和回答有关数字痕迹的基本问题。€œInput序列到数字系统产生输出和状态变化作为前一个状态的函数。在某种程度上,状态或输出产生存储和/或捕获的位序列,这些形成导致它们的事件序列的痕迹。因此,跟踪的定义可以表述为:“由有限状态机的执行产生的一组位序列。”(完整专栏见PDF)
{"title":"Column: The Science of Digital Forensics: Analysis of Digital Traces","authors":"F. Cohen","doi":"10.15394/jdfsl.2012.1113","DOIUrl":"https://doi.org/10.15394/jdfsl.2012.1113","url":null,"abstract":"In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces. “Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: \"A set of bit sequences produced from the execution of a finite state machine.\" (see PDF for full column)","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2012-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79115706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
“Preemptive Suppression” – Judges Claim the Right to Find Digital Evidence Inadmissible Before It Is Even Discovered “先发制人的压制”——法官声称有权在数字证据被发现之前就认定其不可采信
IF 0.3 Pub Date : 2012-01-01 DOI: 10.15394/JDFSL.2012.1132
B. Simpson
Vermont state prosecutors have asked the Vermont Supreme Court to end a state trial judge’s practice of attaching conditions to computer warrants. The Vermont judge’s conditions are drawn from five conditions established in the 2009 decision of the 9 Circuit Court of Appeals in the Comprehensive Drug Testing, Inc. case (CDT II). This is the first time the validity of the “CDT conditions” will be decided by a state court of final jurisdiction in the United States.
佛蒙特州检察官要求佛蒙特州最高法院终止一名州初审法官对电脑搜查令附加条件的做法。佛蒙特州法官的条件是从2009年第九巡回上诉法院在综合药物测试公司案(CDT II)中确定的五个条件中提取出来的。这是美国第一次由具有最终管辖权的州法院决定“CDT条件”的有效性。
{"title":"“Preemptive Suppression” – Judges Claim the Right to Find Digital Evidence Inadmissible Before It Is Even Discovered","authors":"B. Simpson","doi":"10.15394/JDFSL.2012.1132","DOIUrl":"https://doi.org/10.15394/JDFSL.2012.1132","url":null,"abstract":"Vermont state prosecutors have asked the Vermont Supreme Court to end a state trial judge’s practice of attaching conditions to computer warrants. The Vermont judge’s conditions are drawn from five conditions established in the 2009 decision of the 9 Circuit Court of Appeals in the Comprehensive Drug Testing, Inc. case (CDT II). This is the first time the validity of the “CDT conditions” will be decided by a state court of final jurisdiction in the United States.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76038061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Column: Analysis of Digital Traces 专栏:数字轨迹分析
IF 0.3 Pub Date : 2012-01-01 DOI: 10.15394/JDFSL.2012.1125
F. Cohen
In cases where the examiner also performed collection, the details of the collection process may also be known, and so forth. The examiner may also rely on statements, paperwork, claims, and all manner of other things to put the bag of bits into context, but at the start of the examination, anything outside of the personal knowledge of the examiner 2 should be treated as speculative and subject to refutation. Analysis is largely about performing computations on the bag of bits and related information to produce analytical products and derived traces. These products are then used to interpret, attribute, reconstruct, present, and otherwise work with the evidence to other examiners, lawyers, triers of fact, etc. But in order to do this, something about the bag of bits must support or refute hypotheses about what it contains.
在审查员也进行了收集的情况下,收集过程的细节也可以被知道,等等。主考人也可以依靠陈述、文书、声明和其他各种形式的东西来把这一大堆东西放在上下文中,但在考试开始时,主考人个人知识之外的任何东西都应被视为推测性的,并应予以驳斥。分析主要是对比特包和相关信息进行计算,以产生分析产物和衍生轨迹。然后,这些产品被用来解释、归类、重建、呈现证据,并以其他方式将证据提供给其他审查员、律师、事实审判者等。但为了做到这一点,关于比特包的某些东西必须支持或反驳关于它所包含的东西的假设。
{"title":"Column: Analysis of Digital Traces","authors":"F. Cohen","doi":"10.15394/JDFSL.2012.1125","DOIUrl":"https://doi.org/10.15394/JDFSL.2012.1125","url":null,"abstract":"In cases where the examiner also performed collection, the details of the collection process may also be known, and so forth. The examiner may also rely on statements, paperwork, claims, and all manner of other things to put the bag of bits into context, but at the start of the examination, anything outside of the personal knowledge of the examiner 2 should be treated as speculative and subject to refutation. Analysis is largely about performing computations on the bag of bits and related information to produce analytical products and derived traces. These products are then used to interpret, attribute, reconstruct, present, and otherwise work with the evidence to other examiners, lawyers, triers of fact, etc. But in order to do this, something about the bag of bits must support or refute hypotheses about what it contains.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76806310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Crash Recovery: Internet Explorer's black box 自动崩溃恢复:Internet Explorer的黑匣子
IF 0.3 Pub Date : 2012-01-01 DOI: 10.15394/JDFSL.2012.1127
John Moran, Douglas Orr
A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of recent browsing history in spite of the users attempts to delete historical artifacts. As investigators, we must continually be looking for new sources of evidence; Automatic Crash Recovery is it.
今天的调查中有很大一部分包括,至少部分地,对用户的网络历史的检查。尽管微软的ie浏览器在过去几年里节节败退,但它仍然占据着网络浏览器市场的很大一部分份额。大多数用户现在都知道ie浏览器会保存浏览历史、用户名、密码和表单历史。因此,一些用户试图消除这些伪影,留下更少的证据供审查员在调查期间发现。然而,大多数用户,可能还有很大一部分审查员都没有意识到自动崩溃恢复可以留下最近浏览历史记录的金矿,尽管用户试图删除历史文物。作为调查人员,我们必须不断寻找新的证据来源;自动崩溃恢复是它。
{"title":"Automatic Crash Recovery: Internet Explorer's black box","authors":"John Moran, Douglas Orr","doi":"10.15394/JDFSL.2012.1127","DOIUrl":"https://doi.org/10.15394/JDFSL.2012.1127","url":null,"abstract":"A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of recent browsing history in spite of the users attempts to delete historical artifacts. As investigators, we must continually be looking for new sources of evidence; Automatic Crash Recovery is it.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86074933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage PyFlag在高效分析计算机数据存储中的应用
IF 0.3 Pub Date : 2010-03-31 DOI: 10.15394/JDFSL.2010.1071
A. Byrski, Wojciech Stryjewski, BartÅ‚omiej Czechowicz
Based on existing software aimed at investigation support in the analysis of computer data storage overtaken during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.
在现有的调查支持软件(PyFlag)的基础上,提出了一个扩展,包括引入用于数据识别和过滤的专用组件。考虑了NIST/NSRL数据库中包含的流行软件的哈希码,以便在搜索时避免不需要的文件,并将其分为几类。扩展允许进一步分析,例如使用人工智能方法。系统设计的概述说明了这些注意事项。
{"title":"Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage","authors":"A. Byrski, Wojciech Stryjewski, BartÅ‚omiej Czechowicz","doi":"10.15394/JDFSL.2010.1071","DOIUrl":"https://doi.org/10.15394/JDFSL.2010.1071","url":null,"abstract":"Based on existing software aimed at investigation support in the analysis of computer data storage overtaken during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2010-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89258791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teaching Data Carving Using The Real World Problem of Text Message Extraction From Unstructured Mobile Device Data Dumps 利用从非结构化移动设备数据转储中提取文本消息的现实问题进行数据雕刻教学
IF 0.3 Pub Date : 1900-01-01 DOI: 10.15394/JDFSL.2019.1603
Gary Cantrell, Joan Runs Through
Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics. However, it is also useful in teaching computer science students about file structure and the binary encoding of information, especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real-world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in digital forensics courses and other computer science courses.
数据雕刻是一种用于数据恢复的技术,在没有任何文件系统指导的情况下,根据文件内容隔离和提取文件。它是数据恢复和数字取证的重要组成部分。然而,它在教授计算机科学学生关于文件结构和信息二进制编码方面也很有用,特别是在数字取证程序中。这项工作展示了作者如何使用他们在数字取证证据处理中遇到的现实问题来教授数据雕刻,这些问题涉及从非结构化小型设备二进制提取中提取文本消息。作者将这个问题用于数字取证课程和其他计算机科学课程的教学。
{"title":"Teaching Data Carving Using The Real World Problem of Text Message Extraction From Unstructured Mobile Device Data Dumps","authors":"Gary Cantrell, Joan Runs Through","doi":"10.15394/JDFSL.2019.1603","DOIUrl":"https://doi.org/10.15394/JDFSL.2019.1603","url":null,"abstract":"Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics. However, it is also useful in teaching computer science students about file structure and the binary encoding of information, especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real-world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in digital forensics courses and other computer science courses.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78583463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Digital Forensics Security and Law
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1