Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security (3)
- Analytics (1)
- Australia (1)
- Ballistic images (1)
- Big data (1)
-
- Browsers (1)
- Business intelligence (1)
- Cloud Services (1)
- Conference (1)
- Data discovery (1)
- Encryption (1)
- Event processing (1)
- Evidence (1)
- Firearm identification (1)
- Hadoop (1)
- Intelligence (1)
- Investigation (1)
- Law (1)
- Mobility (1)
- Networking (1)
- NoSQL. (1)
- Ontology (1)
- Pattern recognition (1)
- Privacy (1)
- Projectile specimens (1)
- Semantic (1)
- Sentiment analysis (1)
- Social (1)
- Social media (1)
Articles 1 - 5 of 5
Full-Text Articles in Criminology
Mining Social Networking Sites For Digital Evidence, Brian Cusack, Saud Alshaifi
Mining Social Networking Sites For Digital Evidence, Brian Cusack, Saud Alshaifi
Australian Digital Forensics Conference
OnLine Social Networking sites (SNS) hold a vast amount of information that individuals and organisations post about themselves. Investigations include SNS as sources of evidence and the challenge is to have effective tools to extract the evidence. In this exploratory research we apply the latest version of a proprietary tool to identify potential evidence from five SNS using three different browsers. We found that each web browser influenced the scope of the evidence extracted. In previous research we have shown that different open source and proprietary tools influence the scope of evidence obtained. In this research we asked, What variation …
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
Australian Security and Intelligence Conference
From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.
Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li
Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li
Research outputs pre 2011
Charactetistic markings on the cartridge case and projectile of a fired bullet are created when it is fired. Over thirty different features within these marks can be distinguished, which in combination produce a "fingerprint" for a firearm. By analyzing features within such a set of fireann :fingerprints, it will be possible to identify not only the type and model of a fireann, but also each every individual weapon as effectively as human :fingerprint identification. A new analytic system based on fast Fourier transform (FFT) for identifying the projectile specimens by the line-scan imaging technique is proposed in this paper. Experimental …