Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (2)
- Digital investigation (2)
- Relationship attribution (2)
- Accounting curriculum (1)
- Accounting practitioners (1)
-
- Certifications (1)
- Child Exploitation Material (1)
- Computer Cache (1)
- Computer forensics (1)
- Digital evidence (1)
- Digital investigation framework (1)
- Forensic accounting (1)
- Fraud examination (1)
- Intention to Possess (1)
- Intention to View (1)
- Knowing Possession (1)
- Live triage (1)
- Social media (1)
- Social networking (1)
- Viewing Child Exploitation Material (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas
Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas
Journal of Digital Forensics, Security and Law
The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords. These opportunities often end up being exploited by a small percentage of the user community who use it for objectionable or unlawful activities; for example, trolling, cyber bullying, grooming, luring. In some cases, these unlawful activities result in investigations where swift retrieval of critical evidence required in order to save a life.
This paper presents a proof of concept (PoC) framework for social media user attribution. The framework aims to provide digital …
A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas
A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas
Journal of Digital Forensics, Security and Law
This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper …
An Examination Of Computer Forensics And Related Certifications In The Accounting Curriculum, Michael A. Seda, Bonita Peterson Kramer, D. Larry Crumbley
An Examination Of Computer Forensics And Related Certifications In The Accounting Curriculum, Michael A. Seda, Bonita Peterson Kramer, D. Larry Crumbley
Journal of Digital Forensics, Security and Law
Forensic accounting has been a fast-growing niche area within the accounting field for many years. While there has been dramatic growth in the number of courses and degrees in forensic accounting offered by universities, certain relevant topics receive little coverage, such as computer forensics. The purpose of this paper is to examine the views of accounting academics and practitioners pertaining to integrating computer forensics in the accounting curriculum, as well as to determine which forensic accounting certifications the respondents hold. Differences in opinions between the two groups are discussed, along with recommendations on how to improve the forensic accounting curriculum …
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Journal of Digital Forensics, Security and Law
When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …