Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (68)
- Computer Sciences (53)
- Physical Sciences and Mathematics (53)
- Computer Law (20)
- Law (20)
-
- Social and Behavioral Sciences (20)
- Forensic Science and Technology (19)
- Information Security (19)
- Legal Studies (19)
- Chemical Engineering (15)
- Civil Engineering (15)
- Civil and Environmental Engineering (15)
- Electrical and Electronics (15)
- Materials Science and Engineering (15)
- Mechanical Engineering (15)
- Metallurgy (15)
- Ocean Engineering (15)
- Structural Engineering (15)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Digital Communications and Networking (1)
- Taxation-State and Local (1)
- Institution
- Keyword
-
- Computer forensics (3)
- Artificial neural networks (2)
- Cybercrime (2)
- FFT (2)
- Forensic computing (2)
-
- Fraud (2)
- Internet (2)
- Pattern recognition (2)
- Simulation (2)
- ARX (1)
- Accounting curriculum development (1)
- Active Balun (1)
- Adaptive distance protection (1)
- Adaptive feedforward (1)
- Al-SiC metal matrix composite (1)
- Audit (1)
- Auditors (1)
- Bio gasoline (1)
- Biometric identification (1)
- Bit rate (1)
- Bluetooth (1)
- Bonding strength test. (1)
- CaCO3 deposit morphology (1)
- Calcium carbonate precipitation (1)
- Cluster computing (1)
- Complex analysis (1)
- Compliance (1)
- Computational intelligence (1)
- Computer crime (1)
- Computer forensics education (1)
Articles 1 - 30 of 72
Full-Text Articles in Computer Engineering
Particle Swarm Optimization For Global Optimization Problems, Hsin-Chuan Kuo, Jiang-Ren Chang, Ching-Hsiang Liu
Particle Swarm Optimization For Global Optimization Problems, Hsin-Chuan Kuo, Jiang-Ren Chang, Ching-Hsiang Liu
Journal of Marine Science and Technology
In this paper, the particle swarm optimization (PSO), originated as a simulation of a simplified social system with swarm intelligence and having exploring and exploiting characteristics of the particle swarm, is adopted to deal with the global optimization problems. To begin with, four non-linear two-dimensional functions are adopted as benchmark examples for determining the suitable ranges of parameters in the PSO. It is found that uses of the PSO can make the search quickly converge to the global optimum. Then, several benchmark functions below ten-dimensions are adopted especially for comparisons of search efficiency on the PSO and other algorithms. Results …
Web Services Of Mms Applications On Mobile Devices, Cheng-Chih Yang, Cheng-Min Lin
Web Services Of Mms Applications On Mobile Devices, Cheng-Chih Yang, Cheng-Min Lin
Journal of Marine Science and Technology
This study develops the Web services that are applied in Multimedia Message Service (MMS) applications via the Internet and operated by mobile portable devices, such as Personal Digital Assistant (PDA) and cellular phone. First, a MMS system environment and architecture is modeled. Next, the operations and interface of the MMS system is defined by the Web Services Description Language (WSDL) to represent the web services on MMS application system. Finally, two system prototypes are described in this study that includes distance video cam monitor system and GPRS cellular phone MMS sender.
Magnetic Field Effects On Caco3 Precipitation Process In Hard Water, Nelson Saksono, Setijo Bismo, Elsa Krisanti, Azwar Manaf, Roekmijati Widaningrum
Magnetic Field Effects On Caco3 Precipitation Process In Hard Water, Nelson Saksono, Setijo Bismo, Elsa Krisanti, Azwar Manaf, Roekmijati Widaningrum
Makara Journal of Technology
Magnetic Field Effects on CaCO3 Precipitation Process in Hard Water. Magnetic treatment is applied as physical water treatment for scale prevention especially CaCO3, from hard water in piping equipment by reducing its hardness. Na2CO3 and CaCl2 solution sample was used in to investigate the magnetic fields influence on the formation of particle of CaCO3. By changing the strength of magnetic fields, exposure time and concentration of samples solution, this study presents quantitative results of total scale deposit, total precipitated CaCO3 and morphology of the deposit. This research was run by comparing magnetically and non-magnetically treated samples. The results showed an …
Biogasoline Production From Palm Oil Via Catalytic Hydrocracking Over Gamma-Alumina Catalyst, Anondho Wijanarko, Dadi Ahmad Mawardi, Mohammad Nasikin
Biogasoline Production From Palm Oil Via Catalytic Hydrocracking Over Gamma-Alumina Catalyst, Anondho Wijanarko, Dadi Ahmad Mawardi, Mohammad Nasikin
Makara Journal of Technology
Biogasoline Production from Palm Oil Via Catalytic Hydrocracking over Gamma-Alumina Catalyst. Bio gasoline conversion from palm oil is an alternative energy resources method which can be substituted fossil fuel base energy utilization. Previous research resulted that palm oil can be converted into hydrocarbon by catalytic cracking reaction with γ-alumina catalyst. In this research, catalytic cracking reaction of palm oil by γ-alumina catalyst is done in a stirrer batch reactor with the oil/catalyst weight ratio variation of 100:1, 75:1, and 50:1; at suhue variation of 260 to 340oC and reaction time variation of 1 to 2 hour. Post cracking reaction, bio …
Determination Of Operation Condition And Product Dimension Accuracy Optimization Of Filament Deposition Modelling On Layer Manufacturing Application, Slamet A. Widyanto, Alva Edy Tontowi, Jamasri Jamasri, Heru Santoso Budi Rochardjo
Determination Of Operation Condition And Product Dimension Accuracy Optimization Of Filament Deposition Modelling On Layer Manufacturing Application, Slamet A. Widyanto, Alva Edy Tontowi, Jamasri Jamasri, Heru Santoso Budi Rochardjo
Makara Journal of Technology
Layer manufacturing process has proven as a process that can produce a high complexity mechanical part. Now, Improvement of LM methods continuously conduct that is aimed to increase precessions and efficiency of these processes. Pressure filament deposition modelling is a form of layer manufacturing process that is designed to produce a plastic part with controlling its semisolid phase. In this research, the equipment of filament depositor is designed and tested to make the product filament deposition. With operation condition observation, the optimal temperature and pressure of deposition process was determined. These experiments used PVC as crystalline material and polypropylene as …
A Study On Parallel Computation Tools On Networked Pcs, Heru Suhartanto
A Study On Parallel Computation Tools On Networked Pcs, Heru Suhartanto
Makara Journal of Technology
A Study on Parallel Computation Tools on Networked PCs. Many models for natural phenomena, engineering applications and industries need powerfull computing resources to solve their problems. High Performance Computing resources were introduced by many researchers. This comes in the form of Supercomputers and with operating systems and tools for development such as parallel compiler and its library. However, these resources are expensive for the investation and maintenance, hence people need some alternatives. Many people then introduced parallel distributed computing by using available computing resource such as PCs. Each of these PCs is treated as a processors, hence the cluster of …
Segmental Sinusoidal Model For Speech Signal Coding, Florentinus Budi Setiawan, Soegijardjo Soegijoko, Sugihartono Sugihartono, Suhartono Tjondronegoro
Segmental Sinusoidal Model For Speech Signal Coding, Florentinus Budi Setiawan, Soegijardjo Soegijoko, Sugihartono Sugihartono, Suhartono Tjondronegoro
Makara Journal of Technology
Segmental Sinusoidal Model for Speech Signal Coding. Periodic signal can be decomposed by sinusoidal component with Fourier series. With this characteristic, it can be modeled referring by sinusoidal form. By the sinusoidal model, signal can be quantized in order to encode the speech signal at the lower rate. The recent sinusoidal method is implemented in speech coding. By using this method, a block of the speech signal with 20 ms to 30 ms width is coded based on Fourier series coefficients. The new method proposed is quantization and reconstruction of speech signal by the segmental sinusoidal model. A segment is …
Stress Corrosion Cracking Behavior Of Stainless Steel 304 In The Sulfuric Acid Environment Due To Prestrain, Mohammad Badaruddin, Ahmad Suudi, Arinal Hamni
Stress Corrosion Cracking Behavior Of Stainless Steel 304 In The Sulfuric Acid Environment Due To Prestrain, Mohammad Badaruddin, Ahmad Suudi, Arinal Hamni
Makara Journal of Technology
Stress Corrosion Cracking Behavior of Stainless Steel 304 in the Sulfuric Acid Environment Due to Prestrain. The aim of research is to investigate the effect of prestrain on the stress corossion cracking behavior of AISI 304 stainless steel in the sulfuric acid of 10% concentration under the static cantilever loading according to ASTM E-1681 standart. The specimen of 304 Stainless steel was strain up over the yield strength until reaching the uniform strain of 5% and 10% using servopulser UTM 9506 under the displacement control of 0,3 mm/sec. The results of test show that the prestrain of 5% specimen is …
Crude Oil Sludge Degradation In Microcosmic Scale: Simple Simulation As Preliminary Study On Land Treatment Bioremediation., Astri Nugroho
Crude Oil Sludge Degradation In Microcosmic Scale: Simple Simulation As Preliminary Study On Land Treatment Bioremediation., Astri Nugroho
Makara Journal of Technology
Crude Oil Sludge Degradation in Microcosmic Scale: Simple Simulation as Preliminary Study on Land Treatment Bioremediation. A study in microcosmic condition has been carried out to evaluate the bacterial hydrocarbonoclastic capability in increasing the oil sludge degradation being mixed with NPK fertilizer as nitrogen resources. Aerobic test was carried out by putting erlenmeyers in a shaker incubator, 120 rpm shaking speed, at 50°C temperature. While 150 days in microcosmic one observation showed that the consortium has the potential to grow up to 50% (v/v) sludge oil load. Maximum growth and maximum growth rate of the consortium occurred in the III …
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
The University of New Hampshire Law Review
Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …
Effect Of Firing Temperature And Holding Time On Characterization Of Al/Sic Metal Matrix Composites Produced By Pressureless Infiltration., Anne Zulfia, Myrna Ariati
Effect Of Firing Temperature And Holding Time On Characterization Of Al/Sic Metal Matrix Composites Produced By Pressureless Infiltration., Anne Zulfia, Myrna Ariati
Makara Journal of Technology
Effect of Firing Temperature and Holding Time on Characterization of Al/SiC Metal Matrix Composites Produced by Pressureless Infiltration. The production of Al-SiC metal matrix composite can be carried out by pressureless metal infiltration processs (PRIMEX). The experiment was conducted using aluminium AC2B ingot as a matrix and 50%Vf SiC powder as a reinforcement which is mixed with 10% Mg powder for wetting agent. The variables of this experiment are holding time and firing temperature to investigate the effect of these conditions on mechanical properties of Al-SiC metal matrix composites. Holding time was conducted for 2,5,8,10,12 hours and firing temperatures was …
On The Performance Of Imt-2000 Communication Link Based On Stratospheric Platforms, Iskandar Iskandar, Shigeru Shimamoto
On The Performance Of Imt-2000 Communication Link Based On Stratospheric Platforms, Iskandar Iskandar, Shigeru Shimamoto
Makara Journal of Technology
A new means for providing wireless communication has been currently proposed. It is based on aerial vehicle known as High Altitude Platform or Stratospheric Platforms (SPF). The SPF will be operated at an altitude of 17-22 km above the ground. Therefore, the channel condition may be different compared with those of the conventional terrestrial or satellite wireless channel. In this paper, the channel propagation characteristic of such a system is firstly investigated by means of ray tracing algorithm. We emphasize our investigation in a typical urban environment, in which the mobile users mostly exist. We developed building block model for …
Development Of Fiber-Optic Humidity Sensor Probe With Gelatin Cladding, Akhiruddin Maddu, Kun Modjahidin, Sar Sardy, Hamdani Zain
Development Of Fiber-Optic Humidity Sensor Probe With Gelatin Cladding, Akhiruddin Maddu, Kun Modjahidin, Sar Sardy, Hamdani Zain
Makara Journal of Technology
Development of Fiber-Optic Humidity Sensor Probe with Gelatin Cladding. Humidity sensor based on optical fiber with gelatin cladding has been developed. In this humidity sensor probe, the origin cladding of optical fiber is replaced by gelatin coating as humidity sensitive cladding. Testing of the optical fiber sensor probe was conducted by measuring of light intensity transmitted on the optical fiber probe for each variation of different humidity treatments. Response of the optical fiber sensor probe measured from 42%RH to 99%RH, the results show an optical transmission curve varied with relative humidity (RH). Optical transmission in the optical fiber probe increase …
Analysis Of Technical Energy Losses By Using Simulation, Betrianis Betrianis, Randite Herawan
Analysis Of Technical Energy Losses By Using Simulation, Betrianis Betrianis, Randite Herawan
Makara Journal of Technology
Model is a representation of a system. Through model, it can be easier to forecast and control the changing of each element system. Electricity distribution is also a system. Losses are general problem that exist in a distribution network system. But with the right methods, specifically technical energy losses can be reduced in order to increase the efficiency. By making model of the distribution network, the value of technical energy losses in the whole network as well as in every line can be observed. Simulation can also be used to see all losses reduction alternatives. By comparing results from each …
Modification Of Bonding Strength Test Of Wc Hvof Thermal Spray Coating On Rocket Nozzle, Bondan T. Sofyan, Haposan J. Pardede, Marizki Stefano, Edi Sofyan
Modification Of Bonding Strength Test Of Wc Hvof Thermal Spray Coating On Rocket Nozzle, Bondan T. Sofyan, Haposan J. Pardede, Marizki Stefano, Edi Sofyan
Makara Journal of Technology
Modification of Bonding Strength Test of WC HVOF Thermal Spray Coating on Rocket Nozzle. One way to reduce structural weight of RX-100 rocket is by modifying the nozzle material and processing. Nozzle is the main target in weight reduction due to the fact that it contributes 30 % to the total weight of the structur. An alternative for this is by substitution of massive graphite, which is currently used as thermal protector in the nozzle, with thin layer of HVOF (High Velocity Oxy-Fuel) thermal spray layer. This paper presents the characterization of nozzle base material as well as the modification …
Modeling Of Coupled-Tank System Using Fuzzy Takagi-Sugeno Model, Aries Subiantoro
Modeling Of Coupled-Tank System Using Fuzzy Takagi-Sugeno Model, Aries Subiantoro
Makara Journal of Technology
Modeling of Coupled-Tank System Using Fuzzy Takagi-Sugeno Model. This paper describes modeling of coupledtank system based on data measurement using fuzzy Takagi-Sugeno model. The fuzzy clustering method of Gustafson- Kessel algorithm is used to classify input-output data into several clusters based on distance similarity of a member of input-output data from center of cluster. The formed clusters are projected orthonormally into each linguistic variables of premise part to determine membership function of fuzzy Takagi-Sugeno model. By estimating data in each cluster, the consequent parameters of fuzzy Takagi-Sugeno model are calculated using weighted least-squares method. The resulted fuzzy Takagi-Sugeno model is …
Design Of Induction Motor Drive Without Velocity Sensor Using Current Vector Controller With Full And Reduced Observer Moving To Dq Axis, Ridwan Gunawan, Feri Yusivar, Wahidin Wahab, Zuhal A. Kadir
Design Of Induction Motor Drive Without Velocity Sensor Using Current Vector Controller With Full And Reduced Observer Moving To Dq Axis, Ridwan Gunawan, Feri Yusivar, Wahidin Wahab, Zuhal A. Kadir
Makara Journal of Technology
Design of Induction Motor Drive Without Velocity Sensor Using Current Vector Controller with Full and Reduced Observer Moving to DQ Axis. The observer is used in estimation velocity sensor usually in α-β axis, therefore this situation will need an extra transformation when we want to add compensator because the flux model is in direct and quadrature-axis dq. Every used the transformation to make possible emerge an error. So in this simulation is used a method to estimate the velocity of induction motor drive with observer that is moved to dq-axis. The model of actual motor used is in alfa-beta axis, …
Hybrid Identification System With Arx And Fast Fourier Transform In Application Of A Quarter Of Vehicle Half Active Suspension, Noveri Lysbetti M, Antonius R.
Hybrid Identification System With Arx And Fast Fourier Transform In Application Of A Quarter Of Vehicle Half Active Suspension, Noveri Lysbetti M, Antonius R.
Makara Journal of Technology
Hybrid Identification System with ARX and Fast Fourier Transform in Application of a Quarter of Vehicle Half Active Suspension. In a control system problem, identification system mechanism is a absolute thing, especially in adaptation controlling to disturbance changing. For that case, is needed an identification method which can identify the changing of disturbance in that system. The aim of this research is to give an alternative in system/plant identification which is a combination (hybrid) of ARX and Fast Fourier Transform. So, it is needed an algorithm design for identification process. In this case, the designed algorithm will be implemented in …
Performance Analysis Of Mc-Cdma Communication Systems Over Nakagami-M Environments, Joy Iong-Zong Chen
Performance Analysis Of Mc-Cdma Communication Systems Over Nakagami-M Environments, Joy Iong-Zong Chen
Journal of Marine Science and Technology
The performance for a MC-CDMA (multi-carrier coded-division multiple-access) system working in uncorrelated and correlated fading channels with Nakagami distribution is investigated in this paper. We adopt the BPSK modulation scheme with an alternative expression for Q-function to evaluate the BER (bit error rate) performance of the MC-CDMA system. The sum of Gamma variates is adopted for deriving a closed-form solution for arbitrarily correlated channel in order to avoid the difficulty of explicitly obtaining the pdf (probability density function) for the SNR (signal-to-noise ratio) at the MRC (maximum ratio combining) output. The results with simple expression obviously show that the BER …
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas
The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas
Journal of Digital Forensics, Security and Law
All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.
In …
Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz
Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz
Journal of Digital Forensics, Security and Law
This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.
A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli
A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli
Journal of Digital Forensics, Security and Law
Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …
A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns
A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation of financial reporting and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, internal and external auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs and instruction in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity – is limited. Only a few university-level …
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Journal of Digital Forensics, Security and Law
Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.
The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
Journal of Digital Forensics, Security and Law
The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …
Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka
Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka
Journal of Digital Forensics, Security and Law
Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …
Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Journal of Digital Forensics, Security and Law
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Journal of Digital Forensics, Security and Law
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …
Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl
Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl
Journal of Digital Forensics, Security and Law
Forensic Computing is a new and quickly developing field. It is in the process of becoming an academic discipline or sub-discipline with all the features from full undergraduate and postgraduate course provision to conferences and journals. An important question in this process of turning into an established discipline is whether it will coincide with the recognition of the graduates as professionals. This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline. In order to approach this question, the paper will discuss the concept of forensic computing including the most salient topics of …