Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

1,108 Full-Text Articles 1,488 Authors 1,146,329 Downloads 77 Institutions

All Articles in Forensic Science and Technology

Faceted Search

1,108 full-text articles. Page 38 of 47.

Electronic Communication And Privacy Rights: Rape Shield Laws, Sexual Assault Survivors’ Rights, And Defense Subpoenas In A Digital World, Kelly J. Thompson 2013 Iowa State University

Electronic Communication And Privacy Rights: Rape Shield Laws, Sexual Assault Survivors’ Rights, And Defense Subpoenas In A Digital World, Kelly J. Thompson

Kelly J. Thompson

As electronic communications and online information access become indispensable components of our day-to-day lives, they also begin to trigger changes in policy and produce unintended consequences from existing policies. Privacy of personal information has always been an issue in legal cases dealing with sexual assault, but in the information age, so much more information exists in a digital format, and without proper protections, provides a tempting trove of information ripe for unjust “fishing expeditions.” Privacy protections for survivors of sexual violence are as important as ever in this new technological landscape. Consumer education and awareness of privacy issues should also …


Isolation Of Secreted Micrornas (Mirnas) From Cell-Conditioned Media, Claire L. Glynn, Sonja Khan, Michael J. Kerin, Roisin M. Dwyer 2013 University of New Haven

Isolation Of Secreted Micrornas (Mirnas) From Cell-Conditioned Media, Claire L. Glynn, Sonja Khan, Michael J. Kerin, Roisin M. Dwyer

Forensic Science Publications

MicroRNAs (miRNAs) have been found to be stable in the circulation of cancer patients raising their potential as circulating biomarkers of disease. The specific source and role, however, of miRNAs in the circulation is unknown and requires elucidation to determine their true potential. In this study, along with primary tissue explants and primary stromal cells, three breast cancer cell lines were employed, including T47D, MDA-MB-231 and SK-BR-3. Tissue explants were harvested in theatre, with informed patient consent, and included tumour, tumour associated normal, and diseased lymph node samples. Cell-conditioned media containing all factors secreted by the cells were harvested. MiRNAs …


Effect Of Fluctuating Temperatures On The Development Of A Forensically Important Blow Fly, Protophormia Terraenovae (Diptera: Calliphoridae), Jodie-A. Warren, Gail S. Anderson 2013 Simon Fraser University

Effect Of Fluctuating Temperatures On The Development Of A Forensically Important Blow Fly, Protophormia Terraenovae (Diptera: Calliphoridae), Jodie-A. Warren, Gail S. Anderson

Faculty Research, Scholarly, and Creative Activity

Experiments were conducted to compare the immature development of Protophormia terraenovae (Robineau-Desvoidy) at fluctuating temperatures of 4-28 and 9-23°C to their mean constant temperature, 16°C. Overall development was fastest at the greater fluctuation and slowest at the constant temperature but showed similar percentages of development time in each stage. The rate summation effect is suspected to have caused this difference in development rate because fluctuations above the mean increase the rate relatively more than temperatures below the mean can lower the rate.


Development Of Micro Volume Dna And Rna Profiling Assays To Identify The Donor And Tissue Source Of Origin Of Trace Forensic Biological Evidence, Brittany Morgan 2013 University of Central Florida

Development Of Micro Volume Dna And Rna Profiling Assays To Identify The Donor And Tissue Source Of Origin Of Trace Forensic Biological Evidence, Brittany Morgan

Electronic Theses and Dissertations

In forensic casework analysis it is necessary to obtain genetic profiles from increasingly smaller amounts of biological material left behind by perpetrators of crime. The ability to obtain profiles from trace biological evidence is demonstrated with so-called ‘touch DNA evidence’ which is perceived to be the result of DNA obtained from shed skin cells transferred from donor to an object or person during physical contact. However, the current method of recovery of trace DNA involves cotton swabs or adhesive tape to sample an area of interest. This "blindswabbing" approach may result in the recovery of biological material from different individuals …


The Hermeneutics Of The Hard Drive: Using Narratology, Natural Language Processing, And Knowledge Management To Improve The Effectiveness Of The Digital Forensic Process, Mark Pollitt 2013 University of Central Florida

The Hermeneutics Of The Hard Drive: Using Narratology, Natural Language Processing, And Knowledge Management To Improve The Effectiveness Of The Digital Forensic Process, Mark Pollitt

Electronic Theses and Dissertations

In order to protect the safety of our citizens and to ensure a civil society, we ask our law enforcement, judiciary and intelligence agencies, under the rule of law, to seek probative information which can be acted upon for the common good. This information may be used in court to prosecute criminals or it can be used to conduct offensive or defensive operations to protect our national security. As the citizens of the world store more and more information in digital form, and as they live an ever-greater portion of their lives online, law enforcement, the judiciary and the Intelligence …


Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula 2013 Griffith University, Australia

Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula

Journal of Digital Forensics, Security and Law

Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle 2013 State University of New York

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton 2013 California State Polytechnic University

A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …


Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee 2013 Murdoch University, Australia

Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee

Journal of Digital Forensics, Security and Law

The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security …


Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash 2013 Internet Crime against Children Task Force

Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash

Journal of Digital Forensics, Security and Law

In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation. Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle 2013 State University of New York

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko 2013 University of Colorado, Denver

Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko

Journal of Digital Forensics, Security and Law

The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.


How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw 2013 Engineering Cost Group, NASA Marshall Space Flight Center

How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …


Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod 2013 University Putra, Malaysia

Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod

Journal of Digital Forensics, Security and Law

This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the …


Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen 2013 California Sciences Institute

Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen

Journal of Digital Forensics, Security and Law

Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.


The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann 2013 Murdoch University

The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann

Journal of Digital Forensics, Security and Law

As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter 2013 University of Pretoria, South Africa

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Journal of Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel 2013 Simson Garfinkel

Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit). Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But …


Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson 2013 Slippery Rock University of Pennsylvania

Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson

Journal of Digital Forensics, Security and Law

Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011). One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search …


Table Of Contents, 2013 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Digital Commons powered by bepress