CINXE.COM
Search results for: digital evidence
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: digital evidence</title> <meta name="description" content="Search results for: digital evidence"> <meta name="keywords" content="digital evidence"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="digital evidence" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="digital evidence"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 6487</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: digital evidence</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6487</span> Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lilian%20Noronha%20Nassif">Lilian Noronha Nassif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20evidence" title="digital evidence">digital evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics%20process%20and%20procedures" title=" digital forensics process and procedures"> digital forensics process and procedures</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20forensics" title=" mobile forensics"> mobile forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20forensics" title=" cloud forensics"> cloud forensics</a> </p> <a href="https://publications.waset.org/abstracts/60179/towards-a-proof-acceptance-by-overcoming-challenges-in-collecting-digital-evidence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60179.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6486</span> Filling the Gap of Extraction of Digital Evidence from Emerging Platforms Without Forensics Tools</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yi%20Anson%20Lam">Yi Anson Lam</a>, <a href="https://publications.waset.org/abstracts/search?q=Siu%20Ming%20Yiu"> Siu Ming Yiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Kam%20Pui%20Chow"> Kam Pui Chow</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital evidence has been tendering to courts at an exponential rate in recent years. As an industrial practice, most digital evidence is extracted and preserved using specialized and well-accepted forensics tools. On the other hand, the advancement in technologies enables the creation of quite a few emerging platforms such as Telegram, Signal etc. Existing (well-accepted) forensics tools were not designed to extract evidence from these emerging platforms. While new forensics tools require a significant amount of time and effort to be developed and verified, this paper tries to address how to fill this gap using quick-fix alternative methods for digital evidence collection (e.g., based on APIs provided by Apps) and discuss issues related to the admissibility of this evidence to courts with support from international courts’ stance and the circumstances of accepting digital evidence using these proposed alternatives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=extraction" title="extraction">extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20evidence" title=" digital evidence"> digital evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=laws" title=" laws"> laws</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a> </p> <a href="https://publications.waset.org/abstracts/177751/filling-the-gap-of-extraction-of-digital-evidence-from-emerging-platforms-without-forensics-tools" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6485</span> Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Kaya">M. Kaya</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Eris"> M. Eris</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=block%20matching" title="block matching">block matching</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20evidence" title=" digital evidence"> digital evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=hash%20list" title=" hash list"> hash list</a>, <a href="https://publications.waset.org/abstracts/search?q=evaluation%20of%20digital%20evidence" title=" evaluation of digital evidence"> evaluation of digital evidence</a> </p> <a href="https://publications.waset.org/abstracts/76796/hash-based-block-matching-for-digital-evidence-image-files-from-forensic-software-tools" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76796.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">255</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6484</span> A Progressive Techno-Legal Framework for Digital Evidence Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ayobami%20P.%20Olatunji">Ayobami P. Olatunji</a>, <a href="https://publications.waset.org/abstracts/search?q=Saadat%20Ibiyeye"> Saadat Ibiyeye</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulaziz%20Ibiyeye"> Abdulaziz Ibiyeye</a>, <a href="https://publications.waset.org/abstracts/search?q=Tahir%20M.%20Khan"> Tahir M. Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evidence%20presentation" title="evidence presentation">evidence presentation</a>, <a href="https://publications.waset.org/abstracts/search?q=warrant" title=" warrant"> warrant</a>, <a href="https://publications.waset.org/abstracts/search?q=digital-forensic" title=" digital-forensic"> digital-forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20of%20compliance" title=" certificate of compliance"> certificate of compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20procedures" title=" legal procedures"> legal procedures</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crime" title=" computer crime"> computer crime</a>, <a href="https://publications.waset.org/abstracts/search?q=violation" title=" violation"> violation</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation%20cybercrime" title=" investigation cybercrime"> investigation cybercrime</a> </p> <a href="https://publications.waset.org/abstracts/188837/a-progressive-techno-legal-framework-for-digital-evidence-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188837.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">32</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6483</span> A Method to Enhance the Accuracy of Digital Forensic in the Absence of Sufficient Evidence in Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fahad%20Alanazi">Fahad Alanazi</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Jones"> Andrew Jones</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital forensics seeks to achieve the successful investigation of digital crimes through obtaining acceptable evidence from digital devices that can be presented in a court of law. Thus, the digital forensics investigation is normally performed through a number of phases in order to achieve the required level of accuracy in the investigation processes. Since 1984 there have been a number of models and frameworks developed to support the digital investigation processes. In this paper, we review a number of the investigation processes that have been produced throughout the years and introduce a proposed digital forensic model which is based on the scope of the Saudi Arabia investigation process. The proposed model has been integrated with existing models for the investigation processes and produced a new phase to deal with a situation where there is initially insufficient evidence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=process" title=" process"> process</a>, <a href="https://publications.waset.org/abstracts/search?q=metadata" title=" metadata"> metadata</a>, <a href="https://publications.waset.org/abstracts/search?q=Traceback" title=" Traceback"> Traceback</a>, <a href="https://publications.waset.org/abstracts/search?q=Sauid%20Arabia" title=" Sauid Arabia"> Sauid Arabia</a> </p> <a href="https://publications.waset.org/abstracts/57322/a-method-to-enhance-the-accuracy-of-digital-forensic-in-the-absence-of-sufficient-evidence-in-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57322.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6482</span> A Practical Approach and Implementation of Digital Library Towards Best Practice in Malaysian Academic Library</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zainab%20Ajab%20Mohideen">Zainab Ajab Mohideen</a>, <a href="https://publications.waset.org/abstracts/search?q=Kiran%20Kaur"> Kiran Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Basheer%20Ahamadhu"> A. Basheer Ahamadhu</a>, <a href="https://publications.waset.org/abstracts/search?q=Noor%20Azlinda%20Wan%20Jan"> Noor Azlinda Wan Jan</a>, <a href="https://publications.waset.org/abstracts/search?q=Sukmawati%20Muhammad"> Sukmawati Muhammad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The corpus in the digital library is to provide an overview and evidence from library automation that can be used to justify the needs of the digital library. This paper disperses the approach and implementation of the digital library as part of best practices by the Automation Division at Hamzah Sendut Library of the University Science Malaysia (USM). The implemented digital library model emphasizes on the entire library collections, technical perspective, and automation solution. This model served as a foundation for digital library services as part of information delivery in the USM digital library. The approach to digital library includes discussion on key factors, design, architecture, and pragmatic model that has been collected, captured, and identified during the implementation stages. At present, the USM digital library has achieved the status of an Institutional Repository (IR). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20digital%20library" title="academic digital library">academic digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20information%20system" title=" digital information system"> digital information system</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20library%20best%20practice" title=" digital library best practice"> digital library best practice</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20library%20model" title=" digital library model"> digital library model</a> </p> <a href="https://publications.waset.org/abstracts/31709/a-practical-approach-and-implementation-of-digital-library-towards-best-practice-in-malaysian-academic-library" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31709.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">554</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6481</span> The Challenges of Digital Crime Nowadays</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bendes%20%C3%81kos">Bendes Ákos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital evidence will be the most widely used type of evidence in the future. With the development of the modern world, more and more new types of crimes have evolved and transformed. For this reason, it is extremely important to examine these types of crimes in order to get a comprehensive picture of them, with which we can help the authorities work. In 1865, with early technologies, people were able to forge a picture of a quality that is not even recognized today. With the help of today's technology, authorities receive a lot of false evidence. Officials are not able to process such a large amount of data, nor do they have the necessary technical knowledge to get a real picture of the authenticity of the given evidence. The digital world has many dangers. Unfortunately, we live in an age where we must protect everything digitally: our phones, our computers, our cars, and all the smart devices that are present in our personal lives and this is not only a burden on us, since companies, state and public utilities institutions are also forced to do so. The training of specialists and experts is essential so that the authorities can manage the incoming digital evidence at some level. When analyzing evidence, it is important to be able to examine it from the moment it is created. Establishing authenticity is a very important issue during official procedures. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. Otherwise, they will not have sufficient probative value and in case of doubt, the court will always decide in favor of the defendant. One of the most common problems in the world of digital data and evidence is doubt, which is why it is extremely important to examine the above-mentioned problems. The most effective way to avoid digital crimes is to prevent them, for which proper education and knowledge are essential. The aim is to present the dangers inherent in the digital world and the new types of digital crimes. After the comparison of the Hungarian investigative techniques with international practice, modernizing proposals will be given. A sufficiently stable yet flexible legislation is needed that can monitor the rapid changes in the world and not regulate afterward but rather provide an appropriate framework. It is also important to be able to distinguish between digital and digitalized evidence, as the degree of probative force differs greatly. The aim of the research is to promote effective international cooperation and uniform legal regulation in the world of digital crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20crime" title="digital crime">digital crime</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20law" title=" digital law"> digital law</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20crime" title=" cyber crime"> cyber crime</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20cooperation" title=" international cooperation"> international cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20crimes" title=" new crimes"> new crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=skepticism" title=" skepticism"> skepticism</a> </p> <a href="https://publications.waset.org/abstracts/172162/the-challenges-of-digital-crime-nowadays" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172162.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6480</span> Using Printouts as Social Media Evidence and Its Authentication in the Courtroom</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chih-Ping%20Chang">Chih-Ping Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=federal%20rule%20of%20evidence" title="federal rule of evidence">federal rule of evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20forensic" title=" internet forensic"> internet forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=printouts%20as%20evidence" title=" printouts as evidence"> printouts as evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media%20evidence" title=" social media evidence"> social media evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20States%20v.%20Vayner" title=" United States v. Vayner"> United States v. Vayner</a> </p> <a href="https://publications.waset.org/abstracts/43043/using-printouts-as-social-media-evidence-and-its-authentication-in-the-courtroom" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43043.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">290</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6479</span> Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Gonzales">Daniel Gonzales</a>, <a href="https://publications.waset.org/abstracts/search?q=Zev%20Winkelman"> Zev Winkelman</a>, <a href="https://publications.waset.org/abstracts/search?q=Trung%20Tran"> Trung Tran</a>, <a href="https://publications.waset.org/abstracts/search?q=Ricardo%20Sanchez"> Ricardo Sanchez</a>, <a href="https://publications.waset.org/abstracts/search?q=Dulani%20Woods"> Dulani Woods</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Hollywood"> John Hollywood</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=spark" title=" spark"> spark</a>, <a href="https://publications.waset.org/abstracts/search?q=Kubernetes" title=" Kubernetes"> Kubernetes</a>, <a href="https://publications.waset.org/abstracts/search?q=Kafka" title=" Kafka"> Kafka</a> </p> <a href="https://publications.waset.org/abstracts/73858/digital-forensics-compute-cluster-a-high-speed-distributed-computing-capability-for-digital-forensics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73858.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6478</span> Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Nooraiman%20bin%20Noorashid">Muhammad Nooraiman bin Noorashid</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Sharizuan%20bin%20Mohd%20Omar"> Mohd Sharizuan bin Mohd Omar</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Zabri%20Adil%20bin%20%20Talib"> Mohd Zabri Adil bin Talib</a>, <a href="https://publications.waset.org/abstracts/search?q=Aswami%20Fadillah%20bin%20Mohd%20Ariffin"> Aswami Fadillah bin Mohd Ariffin </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20wallet" title=" digital wallet"> digital wallet</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a> </p> <a href="https://publications.waset.org/abstracts/94467/cryptocurrency-forensics-analysis-on-bitcoin-e-wallet-from-computer-source-evidence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6477</span> A Preliminary Literature Review of Digital Transformation Case Studies </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vesna%20Bosilj%20Vuk%C5%A1i%C4%87">Vesna Bosilj Vukšić</a>, <a href="https://publications.waset.org/abstracts/search?q=Lucija%20Ivan%C4%8Di%C4%87"> Lucija Ivančić</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20Su%C5%A1a%20Vugec"> Dalia Suša Vugec</a> </p> <p class="card-text"><strong>Abstract:</strong></p> While struggling to succeed in today’s complex market environment and provide better customer experience and services, enterprises encompass digital transformation as a means for reaching competitiveness and foster value creation. A digital transformation process consists of information technology implementation projects, as well as organizational factors such as top management support, digital transformation strategy, and organizational changes. However, to the best of our knowledge, there is little evidence about digital transformation endeavors in organizations and how they perceive it – is it only about digital technologies adoption or a true organizational shift is needed? In order to address this issue and as the first step in our research project, a literature review is conducted. The analysis included case study papers from Scopus and Web of Science databases. The following attributes are considered for classification and analysis of papers: time component; country of case origin; case industry and; digital transformation concept comprehension, i.e. focus. Research showed that organizations – public, as well as private ones, are aware of change necessity and employ digital transformation projects. Also, the changes concerning digital transformation affect both manufacturing and service-based industries. Furthermore, we discovered that organizations understand that besides technologies implementation, organizational changes must also be adopted. However, with only 29 relevant papers identified, research positioned digital transformation as an unexplored and emerging phenomenon in information systems research. The scarcity of evidence-based papers calls for further examination of this topic on cases from practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20strategy" title="digital strategy">digital strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20technologies" title=" digital technologies"> digital technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20transformation" title=" digital transformation"> digital transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=literature%20review" title=" literature review"> literature review</a> </p> <a href="https://publications.waset.org/abstracts/96919/a-preliminary-literature-review-of-digital-transformation-case-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96919.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">217</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6476</span> Generating Innovations in Established Banks through Digital Transformation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wisu%20Suntoyo">Wisu Suntoyo</a>, <a href="https://publications.waset.org/abstracts/search?q=Dedy%20Sushandoyo"> Dedy Sushandoyo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Innovation and digital transformation are essential for firms’ competitiveness in the digital age. The competition in Indonesia’s banking industry provides an intriguing case study for understanding how digital transformation can generate innovation in established companies. The empirical evidence of this study is mainly based on interviews and annual reports examining four established banks in their various states of digital transformation. The findings of this study reveal that banks’ digital transformations that lead to innovations differ in terms of the activities undertaken and the outcomes achieved depending on the state of advancement in which they are. Digital transformation is a complex and challenging process, and this study finds that with this strategy, established banks have shown capable of generating innovation. Banks can choose types of transformation activities that generate radical, architectural, modular, or even incremental innovations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20transformation" title="digital transformation">digital transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=innovations" title=" innovations"> innovations</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20industry" title=" banking industry"> banking industry</a>, <a href="https://publications.waset.org/abstracts/search?q=established%20banks" title=" established banks"> established banks</a> </p> <a href="https://publications.waset.org/abstracts/166179/generating-innovations-in-established-banks-through-digital-transformation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166179.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6475</span> The Impact of Bitcoin and Cryptocurrency on the Development of Community</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Felib%20Ayman%20Shawky%20Salem">Felib Ayman Shawky Salem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=payment%20methods" title=" payment methods"> payment methods</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=appropriation" title=" appropriation"> appropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20retailers" title=" online retailers"> online retailers</a>, <a href="https://publications.waset.org/abstracts/search?q=TOE%20framework" title=" TOE framework"> TOE framework</a>, <a href="https://publications.waset.org/abstracts/search?q=disappropriation" title=" disappropriation"> disappropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=non-appropriationBitCoin" title=" non-appropriationBitCoin"> non-appropriationBitCoin</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20protection" title=" financial protection"> financial protection</a>, <a href="https://publications.waset.org/abstracts/search?q=crypto%20currency" title=" crypto currency"> crypto currency</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering%20cryptocurrency" title=" money laundering cryptocurrency"> money laundering cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20wallet" title=" digital wallet"> digital wallet</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a> </p> <a href="https://publications.waset.org/abstracts/186455/the-impact-of-bitcoin-and-cryptocurrency-on-the-development-of-community" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">41</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6474</span> Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagus%20Hanindhito">Bagus Hanindhito</a>, <a href="https://publications.waset.org/abstracts/search?q=Fariz%20Azmi%20Pratama"> Fariz Azmi Pratama</a>, <a href="https://publications.waset.org/abstracts/search?q=Ulfah%20Nadiya"> Ulfah Nadiya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20information%20system" title="academic information system">academic information system</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20crime" title=" academic crime"> academic crime</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title=" digital forensic"> digital forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=high-availability%20server%20and%20storage" title=" high-availability server and storage"> high-availability server and storage</a>, <a href="https://publications.waset.org/abstracts/search?q=rapid%20evidence%20remote%20acquisition" title=" rapid evidence remote acquisition"> rapid evidence remote acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20incident" title=" security incident"> security incident</a> </p> <a href="https://publications.waset.org/abstracts/95626/rapid-evidence-remote-acquisition-in-high-availability-server-and-storage-system-for-digital-forensic-to-unravel-academic-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6473</span> An Enhanced Digital Forensic Model for Internet of Things Forensic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tina%20Wu">Tina Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Martin"> Andrew Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acquisition" title="acquisition">acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning" title=" zoning"> zoning</a> </p> <a href="https://publications.waset.org/abstracts/76982/an-enhanced-digital-forensic-model-for-internet-of-things-forensic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6472</span> Digital Preservation: A Need of Tomorrow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gaurav%20Kumar">Gaurav Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=preservation" title="preservation">preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation" title=" digital preservation"> digital preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=archive" title=" archive"> archive</a>, <a href="https://publications.waset.org/abstracts/search?q=repository" title=" repository"> repository</a>, <a href="https://publications.waset.org/abstracts/search?q=document" title=" document"> document</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware" title=" hardware"> hardware</a>, <a href="https://publications.waset.org/abstracts/search?q=software" title=" software"> software</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20readable%20format" title=" machine readable format"> machine readable format</a> </p> <a href="https://publications.waset.org/abstracts/23433/digital-preservation-a-need-of-tomorrow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23433.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">588</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6471</span> An Analysis of Digital Forensic Laboratory Development among Malaysia’s Law Enforcement Agencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarah%20K.%20Taylor">Sarah K. Taylor</a>, <a href="https://publications.waset.org/abstracts/search?q=Miratun%20M.%20Saharuddin"> Miratun M. Saharuddin</a>, <a href="https://publications.waset.org/abstracts/search?q=Zabri%20A.%20Talib"> Zabri A. Talib </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrime is on the rise, and yet many Law Enforcement Agencies (LEAs) in Malaysia have no Digital Forensics Laboratory (DFL) to assist them in the attrition and analysis of digital evidence. From the estimated number of 30 LEAs in Malaysia, sadly, only eight of them owned a DFL. All of the DFLs are concentrated in the capital of Malaysia and none at the state level. LEAs are still depending on the national DFL (CyberSecurity Malaysia) even for simple and straightforward cases. A survey was conducted among LEAs in Malaysia owning a DFL to understand their history of establishing the DFL, the challenges that they faced and the significance of the DFL to their case investigation. The results showed that the while some LEAs faced no challenge in establishing a DFL, some of them took seven to 10 years to do so. The reason was due to the difficulty in convincing their management because of the high costs involved. The results also revealed that with the establishment of a DFL, LEAs were better able to get faster forensic result and to meet agency’s timeline expectation. It is also found that LEAs were also able to get more meaningful forensic results on cases that require niche expertise, compared to sending off cases to the national DFL. Other than that, cases are getting more complex, and hence, a continuous stream of budget for equipment and training is inevitable. The result derived from the study is hoped to be used by other LEAs in justifying to their management the benefits of establishing an in-house DFL. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20evidence" title="digital evidence">digital evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics%20laboratory" title=" digital forensics laboratory"> digital forensics laboratory</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20enforcement%20agency" title=" law enforcement agency"> law enforcement agency</a> </p> <a href="https://publications.waset.org/abstracts/95162/an-analysis-of-digital-forensic-laboratory-development-among-malaysias-law-enforcement-agencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95162.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">176</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6470</span> Reconceptualizing Evidence and Evidence Types for Digital Journalism Studies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hai%20L.%20Tran">Hai L. Tran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the digital age, evidence-based reporting is touted as a best practice for seeking the truth and keeping the public well-informed. Journalists are expected to rely on evidence to demonstrate the validity of a factual statement and lend credence to an individual account. Evidence can be obtained from various sources, and due to a rich supply of evidence types available, the definition of this important concept varies semantically. To promote clarity and understanding, it is necessary to break down the various types of evidence and categorize them in a more coherent, systematic way. There is a wide array of devices that digital journalists deploy as proof to back up or refute a truth claim. Evidence can take various formats, including verbal and visual materials. Verbal evidence encompasses quotes, soundbites, talking heads, testimonies, voice recordings, anecdotes, and statistics communicated through written or spoken language. There are instances where evidence is simply non-verbal, such as when natural sounds are provided without any verbalized words. On the other hand, other language-free items exhibited in photos, video footage, data visualizations, infographics, and illustrations can serve as visual evidence. Moreover, there are different sources from which evidence can be cited. Supporting materials, such as public or leaked records and documents, data, research studies, surveys, polls, or reports compiled by governments, organizations, and other entities, are frequently included as informational evidence. Proof can also come from human sources via interviews, recorded conversations, public and private gatherings, or press conferences. Expert opinions, eye-witness insights, insider observations, and official statements are some of the common examples of testimonial evidence. Digital journalism studies tend to make broad references when comparing qualitative versus quantitative forms of evidence. Meanwhile, limited efforts are being undertaken to distinguish between sister terms, such as “data,” “statistical,” and “base-rate” on one side of the spectrum and “narrative,” “anecdotal,” and “exemplar” on the other. The present study seeks to develop the evidence taxonomy, which classifies evidence through the quantitative-qualitative juxtaposition and in a hierarchical order from broad to specific. According to this scheme, data, statistics, and base rate belong to the quantitative evidence group, whereas narrative, anecdote, and exemplar fall into the qualitative evidence group. Subsequently, the taxonomical classification arranges data versus narrative at the top of the hierarchy of types of evidence, followed by statistics versus anecdote and base rate versus exemplar. This research reiterates the central role of evidence in how journalists describe and explain social phenomena and issues. By defining the various types of evidence and delineating their logical connections it helps remove a significant degree of conceptual inconsistency, ambiguity, and confusion in digital journalism studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evidence" title="evidence">evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=evidence%20forms" title=" evidence forms"> evidence forms</a>, <a href="https://publications.waset.org/abstracts/search?q=evidence%20types" title=" evidence types"> evidence types</a>, <a href="https://publications.waset.org/abstracts/search?q=taxonomy" title=" taxonomy"> taxonomy</a> </p> <a href="https://publications.waset.org/abstracts/171723/reconceptualizing-evidence-and-evidence-types-for-digital-journalism-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171723.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6469</span> Forensic Challenges in Source Device Identification for Digital Videos</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mustapha%20Aminu%20Bagiwa">Mustapha Aminu Bagiwa</a>, <a href="https://publications.waset.org/abstracts/search?q=Ainuddin%20Wahid%20Abdul%20Wahab"> Ainuddin Wahid Abdul Wahab</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Yamani%20Idna%20Idris"> Mohd Yamani Idna Idris</a>, <a href="https://publications.waset.org/abstracts/search?q=Suleman%20Khan"> Suleman Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=video%20forgery" title="video forgery">video forgery</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20camcorder" title=" source camcorder"> source camcorder</a>, <a href="https://publications.waset.org/abstracts/search?q=device%20identification" title=" device identification"> device identification</a>, <a href="https://publications.waset.org/abstracts/search?q=forgery%20detection" title=" forgery detection "> forgery detection </a> </p> <a href="https://publications.waset.org/abstracts/21641/forensic-challenges-in-source-device-identification-for-digital-videos" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21641.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">631</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6468</span> Forensic Analysis of Thumbnail Images in Windows 10</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=George%20Kurian">George Kurian</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongmei%20Chi"> Hongmei Chi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital evidence plays a critical role in most legal investigations. In many cases, thumbnail databases show important information in that investigation. The probability of having digital evidence retrieved from a computer or smart device has increased, even though the previous user removed data and deleted apps on those devices. Due to the increase in digital forensics, the ability to store residual information from various thumbnail applications has improved. This paper will focus on investigating thumbnail information from Windows 10. Thumbnail images of interest in forensic investigations may be intact even when the original pictures have been deleted. It is our research goal to recover useful information from thumbnails. In this research project, we use various forensics tools to collect left thumbnail information from deleted videos or pictures. We examine and describe the various thumbnail sources in Windows and propose a methodology for thumbnail collection and analysis from laptops or desktops. A machine learning algorithm is adopted to help speed up content from thumbnail pictures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title="digital forensic">digital forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20tools" title=" forensic tools"> forensic tools</a>, <a href="https://publications.waset.org/abstracts/search?q=soundness" title=" soundness"> soundness</a>, <a href="https://publications.waset.org/abstracts/search?q=thumbnail" title=" thumbnail"> thumbnail</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=OCR" title=" OCR"> OCR</a> </p> <a href="https://publications.waset.org/abstracts/152619/forensic-analysis-of-thumbnail-images-in-windows-10" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152619.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6467</span> Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zainurrasyid%20Abdullah">Zainurrasyid Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Fadzlee%20Sulaiman"> Mohamed Fadzlee Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Fadzlan%20Zainal"> Muhammad Fadzlan Zainal</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Zabri%20Adil%20Talib"> M. Zabri Adil Talib</a>, <a href="https://publications.waset.org/abstracts/search?q=Aswami%20Fadillah%20M.%20Ariffin"> Aswami Fadillah M. Ariffin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artifacts%20analysis" title="artifacts analysis">artifacts analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20analysis" title=" forensic analysis"> forensic analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20analysis" title=" memory analysis"> memory analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=registry%20analysis" title=" registry analysis"> registry analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=tor%20browser" title=" tor browser"> tor browser</a>, <a href="https://publications.waset.org/abstracts/search?q=Windows%2010" title=" Windows 10"> Windows 10</a> </p> <a href="https://publications.waset.org/abstracts/89769/digital-forensics-analysis-focusing-on-the-onion-router-browser-artifacts-in-windows-10" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6466</span> A General Framework to Successfully Operate the Digital Transformation Process in the Post-COVID Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Driss%20Kettani">Driss Kettani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we shed light on “Digital Divide 2.0,” which we see as COVID-19’s Version of the Digital Divide! We believe that “Fighting” against Digital Divide 2.0 necessitates for a Country to be seriously advanced in the Global Digital Transformation that is, naturally, a complex, delicate, costly and long-term Process. We build an argument supporting our assumption and, from there, we present the foundations of a computational framework to guide and streamline Digital Transformation at all levels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20divide%202.0" title="digital divide 2.0">digital divide 2.0</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20transformation" title=" digital transformation"> digital transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=ICTs%20for%20development" title=" ICTs for development"> ICTs for development</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20outcomes%20assessment" title=" computational outcomes assessment"> computational outcomes assessment</a> </p> <a href="https://publications.waset.org/abstracts/143734/a-general-framework-to-successfully-operate-the-digital-transformation-process-in-the-post-covid-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6465</span> The Roles of Aesthetics and Information Quality on Intention to Continued Used of Digital Library within the Context of UTAUT2</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shahruhaida%20Adayu%20Mohd%20Paili">Shahruhaida Adayu Mohd Paili</a>, <a href="https://publications.waset.org/abstracts/search?q=Abd%20Latif%20Abdul%20Rahman"> Abd Latif Abdul Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Asmadi%20Mohammed%20Ghazali"> Asmadi Mohammed Ghazali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital library was developed by many organizations, especially universities. The digital library can be considered as a new information system. Digital library brings many benefits to the users. There are many researches that have investigated the importance of the digital library, the acceptance, and continuance use of digital library. The investigation towards the digital library is important and it is crucial to understand the reason why users accept and continued use of digital library. Users can search the information and available resources through the digital library website. It is important to know the user’s perception towards the aesthetics of the digital library. Besides that, because of digital library provided information to the users, the researcher also needed to investigate the quality of information in digital library. This study used Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) in order to know the user’s intention to continued use of digital library. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20library" title="digital library">digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=aesthetics" title=" aesthetics"> aesthetics</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20quality" title=" information quality"> information quality</a>, <a href="https://publications.waset.org/abstracts/search?q=intention%20to%20continued%20use%20of%20digital%20library" title=" intention to continued use of digital library"> intention to continued use of digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=UTAUT2" title=" UTAUT2"> UTAUT2</a> </p> <a href="https://publications.waset.org/abstracts/45725/the-roles-of-aesthetics-and-information-quality-on-intention-to-continued-used-of-digital-library-within-the-context-of-utaut2" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6464</span> The Use of Ontology Framework for Automation Digital Forensics Investigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Luthfi">Ahmad Luthfi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the main goals of a computer forensic analyst is to determine the cause and effect of the acquisition of a digital evidence in order to obtain relevant information on the case is being handled. In order to get fast and accurate results, this paper will discuss the approach known as ontology framework. This model uses a structured hierarchy of layers that create connectivity between the variant and searching investigation of activity that a computer forensic analysis activities can be carried out automatically. There are two main layers are used, namely analysis tools and operating system. By using the concept of ontology, the second layer is automatically designed to help investigator to perform the acquisition of digital evidence. The methodology of automation approach of this research is by utilizing forward chaining where the system will perform a search against investigative steps and atomically structured in accordance with the rules of the ontology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ontology" title="ontology">ontology</a>, <a href="https://publications.waset.org/abstracts/search?q=framework" title=" framework"> framework</a>, <a href="https://publications.waset.org/abstracts/search?q=automation" title=" automation"> automation</a>, <a href="https://publications.waset.org/abstracts/search?q=forensics" title=" forensics"> forensics</a> </p> <a href="https://publications.waset.org/abstracts/7087/the-use-of-ontology-framework-for-automation-digital-forensics-investigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">342</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6463</span> Risk Screening in Digital Insurance Distribution: Evidence and Explanations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Finbarr%20Murphy">Finbarr Murphy</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Xu"> Wei Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xian%20Xu"> Xian Xu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The embedding of digital technologies in the global economy has attracted increasing attention from economists. With a large and detailed dataset, this study examines the specific case where consumers have a choice between offline and digital channels in the context of insurance purchases. We find that digital channels screen consumers with lower unobserved risk. For the term life, endowment, and disease insurance products, the average risk of the policies purchased through digital channels was 75%, 21%, and 31%, respectively, lower than those purchased offline. As a consequence, the lower unobserved risk leads to weaker information asymmetry and higher profitability of digital channels. We highlight three mechanisms of the risk screening effect: heterogeneous marginal influence of channel features on insurance demand, the channel features directly related to risk control, and the link between the digital divide and risk. We also find that the risk screening effect mainly comes from the extensive margin, i.e., from new consumers. This paper contributes to three connected areas in the insurance context: the heterogeneous economic impacts of digital technology adoption, insurer-side risk selection, and insurance marketing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20economy" title="digital economy">digital economy</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20asymmetry" title=" information asymmetry"> information asymmetry</a>, <a href="https://publications.waset.org/abstracts/search?q=insurance" title=" insurance"> insurance</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20application" title=" mobile application"> mobile application</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20screening" title=" risk screening"> risk screening</a> </p> <a href="https://publications.waset.org/abstracts/164066/risk-screening-in-digital-insurance-distribution-evidence-and-explanations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164066.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6462</span> Modelling Medieval Vaults: Digital Simulation of the North Transept Vault of St Mary, Nantwich, England</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Webb">N. Webb</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Buchanan"> A. Buchanan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital and virtual heritage is often associated with the recreation of lost artefacts and architecture; however, we can also investigate works that were not completed, using digital tools and techniques. Here we explore physical evidence of a fourteenth-century Gothic vault located in the north transept of St Mary’s church in Nantwich, Cheshire, using existing springer stones that are built into the walls as a starting point. Digital surveying tools are used to document the architecture, followed by an analysis process to hypothesise and simulate possible design solutions, had the vault been completed. A number of options, both two-dimensionally and three-dimensionally, are discussed based on comparison with examples of other contemporary vaults, thus adding another specimen to the corpus of vault designs. Dissemination methods such as digital models and 3D prints are also explored as possible resources for demonstrating what the finished vault might have looked like for heritage interpretation and other purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20simulation" title="digital simulation">digital simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=heritage%20interpretation" title=" heritage interpretation"> heritage interpretation</a>, <a href="https://publications.waset.org/abstracts/search?q=medieval%20vaults" title=" medieval vaults"> medieval vaults</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20heritage" title=" virtual heritage"> virtual heritage</a>, <a href="https://publications.waset.org/abstracts/search?q=3d%20scanning" title=" 3d scanning"> 3d scanning</a> </p> <a href="https://publications.waset.org/abstracts/55632/modelling-medieval-vaults-digital-simulation-of-the-north-transept-vault-of-st-mary-nantwich-england" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6461</span> Effective Teaching without Digital Enhancement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=D.%20A.%20Carnegie">D. A. Carnegie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Whilst there is a movement towards increased digital augmentation in order to facilitate effective tertiary learning, this must come with an awareness of the limitations of such an approach. Learning is best achieved in an environment that includes their learning peers where difficulties can be shared and learning enabled. Policy that advocates for digital technology in place of a physical classroom is dangerous and is often driven by financial concerns rather than pedagogical ones. In this paper, a mostly digital-less form of teaching is presented – one that has proven to be extremely effective. Implicit is anecdotal evidence that student prefer the old overhead transparencies to PowerPoint presentations. Varying and reinforcing assessment, facilitation of effective note-taking, and just actively engaging with students is at the core of a good tertiary education experience. Digital techniques can augment and complement, but not replace these core personal teaching requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=engineering%20education" title="engineering education">engineering education</a>, <a href="https://publications.waset.org/abstracts/search?q=active%20classroom%20engagement" title=" active classroom engagement"> active classroom engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=effective%20note%20taking" title=" effective note taking"> effective note taking</a>, <a href="https://publications.waset.org/abstracts/search?q=reinforcing%20assessment" title=" reinforcing assessment"> reinforcing assessment</a> </p> <a href="https://publications.waset.org/abstracts/39071/effective-teaching-without-digital-enhancement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39071.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6460</span> Prosperous Digital Image Watermarking Approach by Using DCT-DWT</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prabhakar%20C.%20Dhavale">Prabhakar C. Dhavale</a>, <a href="https://publications.waset.org/abstracts/search?q=Meenakshi%20M.%20Pawar"> Meenakshi M. Pawar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacks <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=watermarking" title="watermarking">watermarking</a>, <a href="https://publications.waset.org/abstracts/search?q=digital" title=" digital"> digital</a>, <a href="https://publications.waset.org/abstracts/search?q=DCT-DWT" title=" DCT-DWT"> DCT-DWT</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/3228/prosperous-digital-image-watermarking-approach-by-using-dct-dwt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3228.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">422</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6459</span> Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20A.%20Spooner">Mark A. Spooner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20examination" title=" forensic examination"> forensic examination</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20device" title=" small device"> small device</a>, <a href="https://publications.waset.org/abstracts/search?q=trends" title=" trends"> trends</a> </p> <a href="https://publications.waset.org/abstracts/80256/using-multi-level-analysis-to-identify-future-trends-in-small-device-digital-communication-examinations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80256.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6458</span> The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dipo%20Dunsin">Dipo Dunsin</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20C.%20Ghanem"> Mohamed C. Ghanem</a>, <a href="https://publications.waset.org/abstracts/search?q=Karim%20Ouazzane"> Karim Ouazzane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20science" title=" computer science"> computer science</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20investigation" title=" criminal investigation"> criminal investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a> </p> <a href="https://publications.waset.org/abstracts/139763/the-use-of-artificial-intelligence-in-digital-forensics-and-incident-response-in-a-constrained-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">212</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=216">216</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=217">217</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=digital%20evidence&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>