CINXE.COM
Search results for: forensic case
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: forensic case</title> <meta name="description" content="Search results for: forensic case"> <meta name="keywords" content="forensic case"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="forensic case" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="forensic case"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 11698</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: forensic case</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11698</span> The Forensic Handwriting Analysis of a Painter’s Signature: Claude Monet’s Case</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olivia%20Rybak-Karkosz">Olivia Rybak-Karkosz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper's purpose was to present a case study on a questioned Claude Monet's signature forensic handwriting analysis. It is an example taken from the author’s experience as a court handwriting expert. A comparative study was conducted to determine whether the signature resembles similarities (and if so, to what measure) with the features representing the writing patterns and their natural variability typical for Claude Monet. It was conducted to check whether all writing features are within the writer's normal range of variation. The paper emphasizes the difficulties and challenges encountered by the forensic handwriting expert while analysing the questioned signature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artist%E2%80%99s%20signatures" title="artist’s signatures">artist’s signatures</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticity%20of%20an%20artwork" title=" authenticity of an artwork"> authenticity of an artwork</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20handwriting%20analysis" title=" forensic handwriting analysis"> forensic handwriting analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=graphic-comparative%20method" title=" graphic-comparative method"> graphic-comparative method</a> </p> <a href="https://publications.waset.org/abstracts/152843/the-forensic-handwriting-analysis-of-a-painters-signature-claude-monets-case" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152843.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11697</span> A Case Study of Misinterpretation of Results in Forensic DNA Cases Due to Expression of Y- Chromosome in Females</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Garima%20Chaudhary">Garima Chaudhary</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The gender of an individual in forensic DNA analysis is normally accessed by using the STR multiplexes with the incorporated gender based marker amelogenin or in other words by presence or absence of Y-Chromosome, but it may not be true in all the cases. We hereby report an interesting case of a phenotypic female carrying a male karyotype (46XY). In the alleged murder case, the deceased female with XY genotype was noticed. The expression of 18 Y-linked genes was studied to measure the extent of expression. Expression at 4 loci was observed that might have caused the misinterpretation in forensic casework. This clinical situation of the deceased in this case was diagnosed as testicular feminization syndrome, which characterize a female phenotype with a male karyotype (46, XY). Most of these cases have SRY (testis determining factor). The genetic explanation of this phenomenon is not very clear. Here, we are discussing the impact of such situations of genetic discrepancy in forensic interpretation of results. In the presented murder case of a phenotypic female, sexual assault was also suspected. For confirmation vaginal swabs and micro slides were also sent to us for DNA examination. After DNA analysis using STR markers, Y-chromosome was detected in the samples which supporting the suspicion of sexual assault before murder. When the reference blood sample of the deceased was analyzed, it was found to be case of testicular feminization syndrome. Interesting inferences were made from the results obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNA%20profiling" title="DNA profiling">DNA profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20case%20study" title=" forensic case study"> forensic case study</a>, <a href="https://publications.waset.org/abstracts/search?q=Y%20chromosome" title=" Y chromosome"> Y chromosome</a>, <a href="https://publications.waset.org/abstracts/search?q=females" title=" females"> females</a> </p> <a href="https://publications.waset.org/abstracts/74256/a-case-study-of-misinterpretation-of-results-in-forensic-dna-cases-due-to-expression-of-y-chromosome-in-females" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74256.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11696</span> Forensic Imaging as an Effective Learning Tool for Teaching Forensic Pathology to Undergraduate Medical Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vasudeva%20Murthy%20Challakere%20Ramaswamy">Vasudeva Murthy Challakere Ramaswamy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Conventionally forensic pathology is learnt through autopsy demonstrations which carry various limitations such as unavailability of cases in the mortuary, medico-legal implication and infection. Over the years forensic pathology and science has undergone significant evolution in this digital world. Forensic imaging is a technology which can be effectively utilized for overcoming the current limitations in the undergraduate learning of forensic curriculum. Materials and methods: demonstration of forensic imaging was done using a novel technology of autopsy which has been recently introduced across the globe. Three sessions were conducted in international medical university for a total of 196 medical students. The innovative educational tool was evacuated by using quantitative questionnaire with the scoring scales between 1 to 10. Results: The mean score for acceptance of new tool was 82% and about 74% of the students recommended incorporation of the forensic imaging in the regular curriculum. 82% of students were keen on collaborative research and taking further training courses in forensic imaging. Conclusion: forensic imaging can be an effective tool and also a suitable alternative for teaching undergraduate students. This feedback also supports the fact that students favour the use of contemporary technologies in learning medicine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20imaging" title="forensic imaging">forensic imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20pathology" title=" forensic pathology"> forensic pathology</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20students" title=" medical students"> medical students</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20tool" title=" learning tool"> learning tool</a> </p> <a href="https://publications.waset.org/abstracts/11591/forensic-imaging-as-an-effective-learning-tool-for-teaching-forensic-pathology-to-undergraduate-medical-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">481</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11695</span> Credible Autopsy Report for Investigators and Judiciary</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sudhir%20K.%20Gupta">Sudhir K. Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: When a forensic doctor determines that a suspicious death is a suicide, homicide, or accident, the decision virtually becomes incontestable by the investigating police officer, and it becomes an issue whether the medical opinion was created with necessary checks and balances on the other probabilities of the case. It is suggested that the opinion of Forensic Medical experts is conventional, mutable, and shifting from one expert to another. The determination of suicide, accident, or homicide is mandatorily required, which is the Gold Standard for conducting death investigations. Forensic investigations serve many audiences, but the court is by far the most critical. The likely questions on direct and cross-examination determine how forensic doctors gather and handle evidence and what conclusions they reach. Methodology: The author interacted with the investigative authority, and a crime scene visit was also done along with the perusal of the Postmortem report, subsequent opinion, and crime scene photographs and statements of the witness and accused. Further analysis of all relevant scientific documents and opinions of other forensic doctors, forensic scientists, and ballistic experts involved in these cases was done to arrive at an opinion with scientific justification. Findings: The opinions arrived at by the author and how they helped the judiciary in delivering justice in these cases have been discussed in this article. This can help the readers to understand the process involved in formulating a credible forensic medical expert opinion for investigators and the judiciary. Conclusion: A criminal case might be won or lost over doubt cast on the chain of custody. Medically trained forensic doctors, therefore, learn to practice their profession in legally appropriate ways, and opinions must be based on medical justifications with credible references. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20doctor" title="forensic doctor">forensic doctor</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20credibility" title=" professional credibility"> professional credibility</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=expert%20opinion" title=" expert opinion"> expert opinion</a> </p> <a href="https://publications.waset.org/abstracts/156415/credible-autopsy-report-for-investigators-and-judiciary" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11694</span> Forensic Nursing in the Emergency Department: The Overlooked Roles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Tugba%20Topcu">E. Tugba Topcu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergency services are usually the first places to encounter forensic cases. Hence, it is important to consider forensics from the perspective of the emergency services staff and the physiological and psychological consequences that may arise as a result of behaviour by itself or another person. Accurate and detailed documentation of the situation in which the patient first arrives at the emergency service and preservation of the forensic findings is pivotal for the subsequent forensic investigation. The first step in determining whether or not a forensic case exists is to perform a medical examination of the patient. For each individual suspected to be part of a forensic case, police officers should be informed at the same time as the medical examination is being conducted. Violent events are increasing every year and with an increase in the number of forensic cases, emergency service workers have increasing responsibility and consequently play a key role in protecting, collecting and arranging the forensic evidence. In addition, because the emergency service workers involved in forensic events typically have information about the accused and/or victim, as well as evidence related to the events and the cause of injuries, police officers often require their testimony. However, both nurses and other health care personnel do not typically have adequate expertise in forensic medicine. Emergency nurses should take an active role for determining that whether any patient admitted to the emergency services is a clinical forensic patient the emergency service with injury and requiring possible punishment and knowing of their roles and responsibilities in this area provides legal protection as well as the protection of the judicial affair. Particularly, in emergency services, where rapid patient turnover and high workload exists, patient registration and case reporting may not exist. In such instances, the witnesses, typically the nurses, are often consulted for information. Knowledge of forensic medical matters plays a vital role in achieving justice. According to the Criminal Procedure Law, Article 75, Paragraph 3, ‘an internal body examination or the taking of blood or other biological samples from the body can be performed only by a doctor or other health professional member’. In favour of this item, the clinic nurse and doctor are mainly responsible for evaluating forensic cases in emergency departments, performing the examination, collecting evidence, and storing and reporting data. The courts place considerable importance on determining whether a suspect is the victim or accused and, thus, in terms of illuminating events, it is crucial that any evidence is gathered carefully and appropriately. All the evidence related to the forensic case including the forensic report should be handed over to the police officers. In instances where forensic evidence cannot be collected and the only way to obtain the evidence is the hospital environment, health care personnel in emergency services need to have knowledge about the diagnosis of forensic evidence, the collection of evidence, hiding evidence and provision of the evidence delivery chain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20department" title="emergency department">emergency department</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20nursing" title=" emergency nursing"> emergency nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20cases" title=" forensic cases"> forensic cases</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20nursing" title=" forensic nursing"> forensic nursing</a> </p> <a href="https://publications.waset.org/abstracts/68830/forensic-nursing-in-the-emergency-department-the-overlooked-roles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11693</span> An Enhanced Digital Forensic Model for Internet of Things Forensic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tina%20Wu">Tina Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Martin"> Andrew Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acquisition" title="acquisition">acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning" title=" zoning"> zoning</a> </p> <a href="https://publications.waset.org/abstracts/76982/an-enhanced-digital-forensic-model-for-internet-of-things-forensic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11692</span> Corruption and Economic Performance in Nigeria: The Role of Forensic Accounting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamila%20Garba%20Audu">Jamila Garba Audu</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Adamu"> Peter Adamu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the role of forensic accounting in the fight against corruption in Nigeria for better utilization of public funds and economic growth and development of the Country. We adopted a trend analysis to show the performance of the Nigerian economy as well as the quality of institutions which government economic and political activities in the country. It is an established fact that Nigeria has performed badly since the 1960s to date in terms of institutional quality and economic development despite large amount of money obtained from the export of crude oil. It was revealed also that the fight against corruption has not been very successful in recent times because experts in the field of forensic accounting have not been utilized. With the successes recorded in dealing with fraud and embezzlement using forensic accounting, it has become imperative for the EFCC to use forensic accountants in the fight against corruption in the country. Also, there is the need to introduce very seriously, the teaching of forensic accounting in Nigerian Universities to train experts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corruption" title="corruption">corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20performance" title=" economic performance"> economic performance</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting" title=" forensic accounting"> forensic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/54077/corruption-and-economic-performance-in-nigeria-the-role-of-forensic-accounting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54077.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11691</span> Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Venugopal%20Rao%20Gudlur">Venkata Venugopal Rao Gudlur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title="Internet of Things">Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=Process%20Management" title=" Process Management"> Process Management</a>, <a href="https://publications.waset.org/abstracts/search?q=Forensic%20Investigation" title=" Forensic Investigation"> Forensic Investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M%20Framework" title=" M2M Framework"> M2M Framework</a> </p> <a href="https://publications.waset.org/abstracts/154606/importance-of-new-policies-of-process-management-for-internet-of-things-based-on-forensic-investigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11690</span> Investigating Cloud Forensics: Challenges, Tools, and Practical Case Studies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Noha%20Badkook">Noha Badkook</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Alsubaie"> Maryam Alsubaie</a>, <a href="https://publications.waset.org/abstracts/search?q=Samaher%20Dawood"> Samaher Dawood</a>, <a href="https://publications.waset.org/abstracts/search?q=Enas%20Khairullah"> Enas Khairullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has introduced transformative benefits in data storage and accessibility while posing unique forensic challenges. This paper explores cloud forensics, focusing on investigating and analyzing evidence from cloud environments to address issues such as unauthorized data access, manipulation, and breaches. The research highlights the practical use of open-source forensic tools like Autopsy and Bulk Extractor in real-world scenarios, including unauthorized data sharing via Google Drive and the misuse of personal cloud storage for sensitive information leaks. This work underscores the growing importance of robust forensic procedures and accessible tools in ensuring data security and accountability in cloud ecosystems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20forensic" title="cloud forensic">cloud forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=tools" title=" tools"> tools</a>, <a href="https://publications.waset.org/abstracts/search?q=challenge" title=" challenge"> challenge</a>, <a href="https://publications.waset.org/abstracts/search?q=autopsy" title=" autopsy"> autopsy</a>, <a href="https://publications.waset.org/abstracts/search?q=bulk%20extractor" title=" bulk extractor"> bulk extractor</a> </p> <a href="https://publications.waset.org/abstracts/195467/investigating-cloud-forensics-challenges-tools-and-practical-case-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/195467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">4</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11689</span> The Conception of Implementation of Vision for European Forensic Science 2020 in Lithuania</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Egl%C4%97%20Bilevi%C4%8Di%C5%ABt%C4%97">Eglė Bilevičiūtė</a>, <a href="https://publications.waset.org/abstracts/search?q=Vidmantas%20Egidijus%20Kurapka"> Vidmantas Egidijus Kurapka</a>, <a href="https://publications.waset.org/abstracts/search?q=Snieguol%C4%97%20Matulien%C4%97"> Snieguolė Matulienė</a>, <a href="https://publications.waset.org/abstracts/search?q=Sigut%C4%97%20Stankevi%C4%8Di%C5%ABt%C4%97"> Sigutė Stankevičiūtė</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Council of European Union (EU Council) has stressed on several occasions the need for a concerted, comprehensive and effective solution to delinquency problems in EU communities. In the context of establishing a European Forensic Science Area and the development of forensic science infrastructure in Europe, EU Council believes that forensic science can significantly contribute to the efficiency of law enforcement, crime prevention and combating crimes. Lithuanian scientists have consolidated to implement a project named “Conception of the vision for European Forensic Science 2020 implementation in Lithuania” (the project is funded for the period of 1 March 2014 - 31 December 2016) with the objective to create a conception of implementation of the vision for European Forensic Science 2020 in Lithuania by 1) evaluating the current status of Lithuania’s forensic system and opportunities for its improvement; 2) analysing achievements and knowledge in investigation of crimes listed in conclusions of EU Council on the vision for European Forensic Science 2020 including creation of a European Forensic Science Area and the development of forensic science infrastructure in Europe: trafficking in human beings, organised crime and terrorism; 3) analysing conceptions of criminalistics, which differ in different EU member states due to the variety of forensic schools, and finding means for their harmonization. Apart from the conception of implementation of the vision for European Forensic Science 2020 in Lithuania, the project is expected to suggest provisions that will be relevant to other EU countries as well. Consequently, the presented conception of implementation of vision for European Forensic Science 2020 in Lithuania could initiate a project for a common vision of European Forensic Science and contribute to the development of the EU as an area of freedom, security and justice. The article presents main ideas of the project of the conception of the vision for European Forensic Science 2020 of EU Council and analyses its legal background, as well as prospects of and challenges for its implementation in Lithuania and the EU. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EUROVIFOR" title="EUROVIFOR">EUROVIFOR</a>, <a href="https://publications.waset.org/abstracts/search?q=standardization" title=" standardization"> standardization</a>, <a href="https://publications.waset.org/abstracts/search?q=vision%20for%20European%20Forensic%20Science%202020" title=" vision for European Forensic Science 2020"> vision for European Forensic Science 2020</a>, <a href="https://publications.waset.org/abstracts/search?q=Lithuania" title=" Lithuania"> Lithuania</a> </p> <a href="https://publications.waset.org/abstracts/7731/the-conception-of-implementation-of-vision-for-european-forensic-science-2020-in-lithuania" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7731.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11688</span> Determination of the Knowledge Level of Healthcare Professional's Working at the Emergency Services in Turkey about Their Approaches to Common Forensic Cases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Tu%C4%9Fba%20Top%C3%A7u">E. Tuğba Topçu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ebru%20E.%20Kazan"> Ebru E. Kazan</a>, <a href="https://publications.waset.org/abstracts/search?q=Erhan%20B%C3%BCken"> Erhan Büken</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Emergency nurses are the first health care professional to generally observe the patients, communicate patients’ family or relatives, touch the properties of patients and contact to laboratory sample of patients. Also, they are the encounter incidents related crime, people who engage in violence or suspicious injuries frequently. So, documentation of patients’ condition came to the hospital and conservation of evidence are important in the inquiry of forensic medicine. The aim of the study was to determine the knowledge level of healthcare professional working at the emergency services regarding their approaches to common forensic cases. The study was comprised of 404 healthcare professional working (nurse, emergency medicine technician, health officer) at the emergency services of 6 state hospitals, 6 training and 6 research hospitals and 3 university hospitals in Ankara. Data was collected using questionnaire form which was developed by researches in the direction of literature. Questionnaire form is comprised of two sections. The first section includes 17 questions related demographic information about health care professional and 4 questions related Turkish laws. The second section includes 43 questions to the determination of knowledge level of health care professional’s working in the emergency department, about approaches to frequently encountered forensic cases. For the data evaluation of the study; Mann Whitney U test, Bonferroni correction Kruskal Wallis H test and Chi Square tests have been used. According to study, it’s said that there is no forensic medicine expert in the foundation by 73.4% of health care professionals. Two third (66%) of participants’ in emergency department reported daily average 7 or above forensic cases applied to the emergency department and 52.1% of participants did not evaluate incidents came to the emergency department as a forensic case. Most of the participants informed 'duty of preservation of evidence' is health care professionals duty related forensic cases. In result, we determinated that knowledge level of health care professional working in the emergency department, about approaches to frequently encountered forensic cases, is not the expected level. Because we found that most of them haven't received education about forensic nursing.Postgraduates participants, educated health professional about forensic nursing, staff who applied to sources about forensic nursing and staff who evaluated emergency department cases as forensic cases have significantly higher level of knowledge. Moreover, it’s found that forensic cases diagnosis score is the highest in health officer and university graduated. Health care professional’s deficiency in knowledge about forensic cases can cause defects in operation of the forensic process because of mistakes in collecting and conserving of evidence. It is obvious that training about the approach to forensic nursing should be arranged. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20nurses" title="emergency nurses">emergency nurses</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20case" title=" forensic case"> forensic case</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20nursing" title=" forensic nursing"> forensic nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=level%20of%20knowledge" title=" level of knowledge"> level of knowledge</a> </p> <a href="https://publications.waset.org/abstracts/68703/determination-of-the-knowledge-level-of-healthcare-professionals-working-at-the-emergency-services-in-turkey-about-their-approaches-to-common-forensic-cases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68703.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11687</span> Cerebral Toxoplasmosis: A Histopathological Diagnosis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prateek%20Rastogi">Prateek Rastogi</a>, <a href="https://publications.waset.org/abstracts/search?q=Jenash%20Acharya"> Jenash Acharya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Histopathology examination has been a boon to forensic experts all around the world since its implication in autopsy cases. Whenever a case of sudden death is encountered, forensic experts clandestinely focus on cardiovascular, respiratory, gastrointestinal or cranio-cerebral causes. After ruling out poisoning or trauma, they are left with the only option available, histopathology examination. Besides preserving thoracic and abdominal organs, brain tissues are very less frequently subjected for the analysis. Based on provisional diagnosis documented on hospital treatment record files, one hemisphere of grossly unremarkable cerebrum was confirmatively diagnosed by histopathology examination to be a case of cerebral toxoplasmosis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cerebral%20toxoplasmosis" title="cerebral toxoplasmosis">cerebral toxoplasmosis</a>, <a href="https://publications.waset.org/abstracts/search?q=sudden%20death" title=" sudden death"> sudden death</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information" title=" health information"> health information</a>, <a href="https://publications.waset.org/abstracts/search?q=histopathology" title=" histopathology"> histopathology</a> </p> <a href="https://publications.waset.org/abstracts/4091/cerebral-toxoplasmosis-a-histopathological-diagnosis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4091.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11686</span> Financial Statement Fraud: The Need for a Paradigm Shift to Forensic Accounting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ifedapo%20Francis%20Awolowo">Ifedapo Francis Awolowo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The unrelenting series of embarrassing audit failures should stimulate a paradigm shift in accounting. And in this age of information revolution, there is need for a constant improvement on the products or services one offers to the market in order to be relevant. This study explores the perceptions of external auditors, forensic accountants and accounting academics on whether a paradigm shift to forensic accounting can reduce financial statement frauds. Through Neo-empiricism/inductive analytical approach, findings reveal that a paradigm shift to forensic accounting might be the right step in the right direction in order to increase the chances of fraud prevention and detection in the financial statement. This research has implication on accounting education on the need to incorporate forensic accounting into present day accounting curriculum. Accounting professional bodies, accounting standard setters and accounting firms all have roles to play in incorporating forensic accounting education into accounting curriculum. Particularly, there is need to alter the ISA 240 to make the prevention and detection of frauds the responsibilities of bot those charged with the management and governance of companies and statutory auditors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20statement%20fraud" title="financial statement fraud">financial statement fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting" title=" forensic accounting"> forensic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20prevention%20and%20detection" title=" fraud prevention and detection"> fraud prevention and detection</a>, <a href="https://publications.waset.org/abstracts/search?q=auditing" title=" auditing"> auditing</a>, <a href="https://publications.waset.org/abstracts/search?q=audit%20expectation%20gap" title=" audit expectation gap"> audit expectation gap</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a> </p> <a href="https://publications.waset.org/abstracts/42346/financial-statement-fraud-the-need-for-a-paradigm-shift-to-forensic-accounting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42346.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">367</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11685</span> Adoption and Diffusion of Valuation Standards in the Forensic Accounting Community and in Courts: Facilitating and Inhibiting Factors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matteo%20Manera">Matteo Manera</a>, <a href="https://publications.waset.org/abstracts/search?q=Mariateresa%20Torchia"> Mariateresa Torchia</a>, <a href="https://publications.waset.org/abstracts/search?q=Gregory%20Moscato"> Gregory Moscato</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forensic accounting is a hot subject of research in accounting. Valuation remains one of the major topics for practitioners. Valuation standards are a powerful instrument that can contribute to a fair process: their use aims at reducing subjectivity and arbitrary decisions in courts. In most jurisdictions, valuation standards are not the law: forensic accountants are not obliged to use valuation standards when they perform valuation works for judges. To date, as far as we know, no literature work has investigated adoption and diffusion of valuation standards in the forensic accounting space. In this paper, we analyze the spread of valuation standards through the lenses of isomorphism and -as corollaries- of Agency Theory and Signaling Theory. Because of lack of research in the particular area of valuation standards adoption, the present work relies on qualitative, exploratory research, based on semi-structured interviews conducted (up to saturation) with expert forensic accountants. Our work digs into motivations behind adoption and diffusion, as well into perceptions of forensic accountants around benefits of valuation standards and into barriers to their diffusion: the result is that, while the vast majority of forensic accountants praise the great work of the standards setters in introducing valuation standards, it might be that less than 50% of forensic accountants actually use valuation standards, in courts. Our preliminary findings, to be supported or refuted by future research, lead us to address a “trilogy” of recommendations to the stakeholders involved in the process of adoption and diffusion of valuation standards in courts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting" title="forensic accounting">forensic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=valuation%20standards" title=" valuation standards"> valuation standards</a>, <a href="https://publications.waset.org/abstracts/search?q=adoption%20of%20standards" title=" adoption of standards"> adoption of standards</a>, <a href="https://publications.waset.org/abstracts/search?q=motivations" title=" motivations"> motivations</a>, <a href="https://publications.waset.org/abstracts/search?q=benefits" title=" benefits"> benefits</a>, <a href="https://publications.waset.org/abstracts/search?q=barriers" title=" barriers"> barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=Isomorphism" title=" Isomorphism"> Isomorphism</a> </p> <a href="https://publications.waset.org/abstracts/139052/adoption-and-diffusion-of-valuation-standards-in-the-forensic-accounting-community-and-in-courts-facilitating-and-inhibiting-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139052.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">172</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11684</span> Filtering and Reconstruction System for Grey-Level Forensic Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahd%20Aljarf">Ahd Aljarf</a>, <a href="https://publications.waset.org/abstracts/search?q=Saad%20Amin"> Saad Amin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Images are important source of information used as evidence during any investigation process. Their clarity and accuracy is essential and of the utmost importance for any investigation. Images are vulnerable to losing blocks and having noise added to them either after alteration or when the image was taken initially, therefore, having a high performance image processing system and it is implementation is very important in a forensic point of view. This paper focuses on improving the quality of the forensic images. For different reasons packets that store data can be affected, harmed or even lost because of noise. For example, sending the image through a wireless channel can cause loss of bits. These types of errors might give difficulties generally for the visual display quality of the forensic images. Two of the images problems: noise and losing blocks are covered. However, information which gets transmitted through any way of communication may suffer alteration from its original state or even lose important data due to the channel noise. Therefore, a developed system is introduced to improve the quality and clarity of the forensic images. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20filtering" title="image filtering">image filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20reconstruction" title=" image reconstruction"> image reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20images" title=" forensic images"> forensic images</a> </p> <a href="https://publications.waset.org/abstracts/15654/filtering-and-reconstruction-system-for-grey-level-forensic-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11683</span> Proposition on Improving Environmental Forensic System in China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huilei%20Wang">Huilei Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuanfeng%20Wang"> Yuanfeng Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the early period of China, economy developed rapidly at the cost of environment. Recently, it is generally recognized that the heavily polluted environment not only puts a brake on economic development but also paces negative impact on people’ health as well as probably next decades of generations. Accordingly, the latest Environmental Protection Law revised in 2014 makes a clear-cut division of environmental responsibility and regulates stricter penalties of breaching law. As the new environmental law is enforced gradually, environmental forensic is increasingly required in the process of ascertaining facts in judicial proceedings of environmental cases. Based on the outcomes of documentary analysis for all environmental cases judged on the basis of new environmental law, it is concluded that there still exists problems in present system of environmental forensic. Thus, this paper is aimed to make proposition on improving Chinese environmental forensic system, which involves: (i) promoting capability of environmental forensic system (EFS) to handle professional questions; (ii) develop price mechanism; (iii) multi-departments cooperate to establish unifying and complete EFS system;(iv) enhance the probative value of results of EFS. Such protocol for amending present regulation on environmental forensic is of significant importance because a quality report of environmental forensic will contributes to providing strong probative evidence of culprits’ activity of releasing contaminant into environment, degree of damages for victims and above all, causality between the behavior of public nuisance and damages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=China" title="China">China</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20cases" title=" environmental cases"> environmental cases</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20forensic%20system" title=" environmental forensic system"> environmental forensic system</a>, <a href="https://publications.waset.org/abstracts/search?q=proposition" title=" proposition"> proposition</a> </p> <a href="https://publications.waset.org/abstracts/67446/proposition-on-improving-environmental-forensic-system-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67446.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11682</span> The Forensic Analysis of Engravers' Handwriting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olivia%20Rybak-Karkosz">Olivia Rybak-Karkosz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to present the result of scientific research using forensic handwriting analysis. It was conducted to verify the stability and lability of handwriting of engravers and check if gravers transfer their traits from handwriting to plates and other surfaces they rework. This research methodology consisted of completing representative samples of signatures of gravers written on a piece of paper using a ballpen and signatures engraved on other surfaces. The forensic handwriting analysis was conducted using the graphic-comparative method (graphic method), and all traits were analysed. The paper contains a concluding statement of the similarities and differences between the samples. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artist%E2%80%99s%20signatures" title="artist’s signatures">artist’s signatures</a>, <a href="https://publications.waset.org/abstracts/search?q=engraving" title=" engraving"> engraving</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20handwriting%20analysis" title=" forensic handwriting analysis"> forensic handwriting analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=graphic-comparative%20method" title=" graphic-comparative method"> graphic-comparative method</a> </p> <a href="https://publications.waset.org/abstracts/152839/the-forensic-analysis-of-engravers-handwriting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152839.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11681</span> Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gigih%20Supriyatno">Gigih Supriyatno</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=web%20forensic" title="web forensic">web forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection" title=" SQL injection"> SQL injection</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20shell" title=" web shell"> web shell</a> </p> <a href="https://publications.waset.org/abstracts/95122/searching-for-forensic-evidence-in-a-compromised-virtual-web-server-against-sql-injection-attacks-and-php-web-shell" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11680</span> Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avinash%20Malladhi">Avinash Malladhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AI" title="AI">AI</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting%20%26%20fraud%20detection" title=" forensic accounting & fraud detection"> forensic accounting & fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=anti%20money%20laundering" title=" anti money laundering"> anti money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=Benford%27s%20law" title=" Benford's law"> Benford's law</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20triangle%20theory" title=" fraud triangle theory"> fraud triangle theory</a> </p> <a href="https://publications.waset.org/abstracts/165809/harnessing-artificial-intelligence-and-machine-learning-for-advanced-fraud-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165809.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11679</span> A Retrospective Study of Suicidal Deaths in Madinah for Ten Years</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Radah%20Yousuf">Radah Yousuf</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashraf%20Shebl"> Ashraf Shebl</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Suicide is a tragic event with strong emotional repercussions for its survivors and for families of its victims. There were thousands of cases all over the world. There are many risk factors include mental disorders such as depression, and substance abuse, including alcoholism and use of benzodiazepines. Other suicides are impulsive acts due to stress such as from financial difficulties, troubles with relationships, or from bullying. The aim of work in this study is making a survey from archives of the suicidal cases, which had a medicolegal examination, in forensic medicine center in Al Madinah Almunawarah-KSA, for ten years in the period between 1428-1438h. In each case, some data are collected such as age, sex, time and place of an act, method of suicide, the presence of the witness, medical history. This study demonstrates that suicide is more common in male than female, and the 4th decade was the most period of age. The most common method of suicide was hanging followed by falling from the height. These results indicated that cultural and religious beliefs that discourage suicide and support self-preservation instinct, and suicide education programs provide information to students in high school, builds awareness, one of the most important issues in solving that problem. From the forensic view, circumstantial evidence of every forensic case must take and record, full history about the social, medical and psychological problems, attend the scene of death is a very important, complete medicolegal investigation for every case, and full autopsy with very skilled techniques and facilities can help in diagnosing what type of crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=suicide" title="suicide">suicide</a>, <a href="https://publications.waset.org/abstracts/search?q=age" title=" age"> age</a>, <a href="https://publications.waset.org/abstracts/search?q=sex" title=" sex"> sex</a>, <a href="https://publications.waset.org/abstracts/search?q=hanging" title=" hanging"> hanging</a> </p> <a href="https://publications.waset.org/abstracts/88955/a-retrospective-study-of-suicidal-deaths-in-madinah-for-ten-years" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11678</span> DNA as an Instrument in Constructing Narratives and Justice in Criminal Investigations: A Socio-Epistemological Exploration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aadita%20Chaudhury">Aadita Chaudhury</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since at least the early 2000s, DNA profiling has achieved a preeminent status in forensic investigations into criminal acts. While the criminal justice system has a long history of using forensic evidence and testing them through establish technoscientific means, the primacy of DNA in establishing 'truth' or reconstructing a series of events is unparalleled in the history of forensic science. This paper seeks to elucidate the ways in which DNA profiling has become the most authoritative instrument of 'truth' in criminal investigations, and how it is used in the legal process to ascertain culpability, create the notion of infallible evidence, and advance the search for justice. It is argued that DNA profiling has created a paradigm shift in how the legal system and the general public understands crime and culpability, but not without limitations. There are indications that even trace amounts of DNA evidence can point to causal links in a criminal investigation, however, there still remains many rooms to create confusion and doubt from empirical evidence within the narrative of crimes. Many of the shortcomings of DNA-based forensic investigations are explored and evaluated with regards to claims of the authority of biological evidence and implications for the public understanding of the elusive concepts of truth and justice in the present era. Public misinformation about the forensic analysis processes could produce doubt or faith in the judgements rooted in them, depending on other variables presented at the trial. A positivist understanding of forensic science that is shared by the majority of the population does not take into consideration that DNA evidence is far from definitive, and can be used to support any theories of culpability, to create doubt and to deflect blame. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNA%20profiling" title="DNA profiling">DNA profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=epistemology%20of%20forensic%20science" title=" epistemology of forensic science"> epistemology of forensic science</a>, <a href="https://publications.waset.org/abstracts/search?q=philosophy%20of%20forensic%20science" title=" philosophy of forensic science"> philosophy of forensic science</a>, <a href="https://publications.waset.org/abstracts/search?q=sociology%20of%20scientific%20knowledge" title=" sociology of scientific knowledge"> sociology of scientific knowledge</a> </p> <a href="https://publications.waset.org/abstracts/70471/dna-as-an-instrument-in-constructing-narratives-and-justice-in-criminal-investigations-a-socio-epistemological-exploration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70471.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11677</span> Punishment In Athenian Forensic Oratory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eleni%20Volonaki">Eleni Volonaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Athenian forensic speeches, the argumentation on punishment of the wrongdoers constitutes a fundamental ideal of exacting justice in court. The present paper explores the variation of approaches to punishment as a means of reformation, revenge, correction, education, example, chance to restoration of justice. As it will be shown, all these approaches reflect the social and political ideology of Athenian justice in the classical period and enhances the role of the courts and the importance of rhetoric in the process of decision-making. Punishment entails a wide range of penalties but also of ideological principles related to the Athenian constitution of democracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=punishment" title="punishment">punishment</a>, <a href="https://publications.waset.org/abstracts/search?q=athenian%20forensic%20speeches" title=" athenian forensic speeches"> athenian forensic speeches</a>, <a href="https://publications.waset.org/abstracts/search?q=justice" title=" justice"> justice</a>, <a href="https://publications.waset.org/abstracts/search?q=athenian%20democracy" title=" athenian democracy"> athenian democracy</a> </p> <a href="https://publications.waset.org/abstracts/139225/punishment-in-athenian-forensic-oratory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139225.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11676</span> Gender Identification Using Digital Forensics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vinod%20C.%20Nayak">Vinod C. Nayak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In day-to-day forensic practice, identification is always a difficult task. Availability of anti-mortem and postmortem records plays a major rule in facilitating this tough task. However, the advent of digital forensic is a boon for forensic experts. This study has made use of digital forensics to establish identity by radiological dimensions of maxillary sinus using workstation software. The findings suggest a significant association between maxillary sinus dimensions and human gender. The author will be discussing the methods and results of the study in this e-poster. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=identification" title=" identification"> identification</a>, <a href="https://publications.waset.org/abstracts/search?q=maxillary%20sinus" title=" maxillary sinus"> maxillary sinus</a>, <a href="https://publications.waset.org/abstracts/search?q=radiology" title=" radiology"> radiology</a> </p> <a href="https://publications.waset.org/abstracts/41653/gender-identification-using-digital-forensics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41653.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">420</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11675</span> Forensic Necropsy-Importance in Wildlife Conservation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20V.%20Sai%20Soumya">G. V. Sai Soumya</a>, <a href="https://publications.waset.org/abstracts/search?q=Kalpesh%20Solanki"> Kalpesh Solanki</a>, <a href="https://publications.waset.org/abstracts/search?q=Sumit%20K.%20Choudhary"> Sumit K. Choudhary</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Necropsy is another term used for an autopsy, which is known as death examination in the case of animals. It is a complete standardized procedure involving dissection, observation, interpretation, and documentation. Government Bodies like National Tiger Conservation Authority (NTCA) have given standard operating procedures for commencing the necropsies. Necropsies are rarely performed as compared to autopsies performed on human bodies. There are no databases which maintain the count of autopsies in wildlife, but the research in this area has shown a very small number of necropsies. Long back, wildlife forensics came into existence but is coming into light nowadays as there is an increase in wildlife crime cases, including the smuggling of trophies, pooching, and many more. Physical examination in cases of animals is not sufficient to yield fruitful information, and thus postmortem examination plays an important role. Postmortem examination helps in the determination of time since death, cause of death, manner of death, factors affecting the case under investigation, and thus decreases the amount of time required in solving cases. Increasing the rate of necropsies will help forensic veterinary pathologists to build standardized provision and confidence within them, which will ultimately yield a higher success rate in solving wildlife crime cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=necropsy" title="necropsy">necropsy</a>, <a href="https://publications.waset.org/abstracts/search?q=wildlife%20crime" title=" wildlife crime"> wildlife crime</a>, <a href="https://publications.waset.org/abstracts/search?q=postmortem%20examination" title=" postmortem examination"> postmortem examination</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20application" title=" forensic application"> forensic application</a> </p> <a href="https://publications.waset.org/abstracts/131708/forensic-necropsy-importance-in-wildlife-conservation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11674</span> Forensic Science in Dr. Jekyll and Mr. Hyde: Trails of Utterson's Quest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyu-Jeoung%20Lee">Kyu-Jeoung Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Jae-Uk%20Choo"> Jae-Uk Choo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on investigating <em>The Strange Case of Dr Jekyll and Mr Hyde</em> from Utterson’s point of view, referring to: Gabriel John <em>Utterson</em>, a central character in the book. Utterson is no different from a forensic investigator, as he tries to collect evidence on the mysterious Mr. Hyde’s relationship to Dr. Jekyll. From Utterson's perspective, Jekyll is the 'victim' of a potential scandal and blackmail, and Hyde is the 'suspect' of a possible 'crime'. Utterson intends to figure out Hyde's identity, connect his motive with his actions, and gather witness accounts. During Utterson’s quest, the outside materials available to him along with the social backgrounds of Hyde and Jekyll will be analyzed. The archives left from Jekyll’s chamber will also play a part providing evidence. Utterson will investigate, based on what he already knows about Jekyll his whole life, and how Jekyll had acted in his eyes until he was gone, and finding out possible explanations for Jekyll's actions. The relationship between Jekyll and Hyde becomes the major question, as the social background offers clues pointing in the direction of illegitimacy and prostitution. There is still a possibility that Jekyll and Hyde were, in fact, completely different people. Utterson received a full statement and confession from Jekyll himself at the end of the story, which gives the reader the possible truth on what happened. Stevenson’s Dr. Jekyll and Mr. Hyde led readers, as it did Utterson, to find the connection between Hyde and Jekyll using methods of history, culture, and science. Utterson's quest to uncover Hyde shows an example of applying the various fields to in his act to see if Hyde's inheritance was legal. All of this taken together could technically be considered forensic investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dr.%20Jekyll%20and%20Mr.%20Hyde" title="Dr. Jekyll and Mr. Hyde">Dr. Jekyll and Mr. Hyde</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20investigation" title=" forensic investigation"> forensic investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=illegitimacy" title=" illegitimacy"> illegitimacy</a>, <a href="https://publications.waset.org/abstracts/search?q=prostitution" title=" prostitution"> prostitution</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20Louis%20Stevenson" title=" Robert Louis Stevenson"> Robert Louis Stevenson</a> </p> <a href="https://publications.waset.org/abstracts/56868/forensic-science-in-dr-jekyll-and-mr-hyde-trails-of-uttersons-quest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">211</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11673</span> Forensics Linguistics and Phonetics: The Analysis of Language to Support Investigations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andreas%20Aceranti">Andreas Aceranti</a>, <a href="https://publications.waset.org/abstracts/search?q=Simonetta%20Vernocchi"> Simonetta Vernocchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Marco%20Colorato"> Marco Colorato</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaoutar%20Filahi"> Kaoutar Filahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was inspired by the necessity of giving forensic linguistics and phonetics more and more importance and the intention to explore those topics in an attempt to understand what the role of these disciplines really is in investigations of any nature. The goal is to analyze what are the achievements that those subjects have been able to reach, and what contribution they gave to the legal world; the analysis and study of those topics are supported by the recounting of real cases that have included forensic and phonetic linguistics. One of the most relevant cases is that of the Unabomber, an investigation that brought to light the importance and highlighted the importance this matter can have in difficult and time-consuming cases such as the one we have here. We also focus on the areas of expertise of those new branches of applied linguistics, focusing on what is the use of this new discipline in Italy and abroad and showing what could be the possible improvements that the Italian state could apply in order to be able to catch up with countries like Great Britain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistic" title="forensic linguistic">forensic linguistic</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics" title=" forensic phonetics"> forensic phonetics</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=criminalistics" title=" criminalistics"> criminalistics</a> </p> <a href="https://publications.waset.org/abstracts/160312/forensics-linguistics-and-phonetics-the-analysis-of-language-to-support-investigations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160312.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11672</span> Directing the Forensic Investigation of a Catastrophic Structure Collapse: The Jacksonville Parking Garage Collapse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=William%20C.%20Bracken">William C. Bracken</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper discusses the forensic investigation of a fatality-involved catastrophic structure collapse and the special challenges faced when tasked with directing such an effort. While this paper discusses the investigation’s findings and the outcome of the event; this paper’s primary focus is on the challenges faced directing a forensic investigation that requires coordinating with governmental oversight while also having to accommodate multiple parties’ investigative teams. In particular the challenges discussed within this paper included maintaining on-site safety and operations while accommodating outside investigator’s interests. In addition this paper discusses unique challenges that one may face such as what to do about unethical conduct of interested party’s investigative teams, “off the record” sharing of information, and clandestinely transmitted evidence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=catastrophic%20structure%20collapse" title="catastrophic structure collapse">catastrophic structure collapse</a>, <a href="https://publications.waset.org/abstracts/search?q=collapse%20investigation" title=" collapse investigation"> collapse investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=Jacksonville%20parking%20garage%20collapse" title=" Jacksonville parking garage collapse"> Jacksonville parking garage collapse</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20investigation" title=" forensic investigation"> forensic investigation</a> </p> <a href="https://publications.waset.org/abstracts/24535/directing-the-forensic-investigation-of-a-catastrophic-structure-collapse-the-jacksonville-parking-garage-collapse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11671</span> Applying Massively Parallel Sequencing to Forensic Soil Bacterial Profiling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hui%20Li">Hui Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Xueying%20Zhao"> Xueying Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Ke%20Ma"> Ke Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Cao"> Yu Cao</a>, <a href="https://publications.waset.org/abstracts/search?q=Fan%20Yang"> Fan Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingwen%20Xu"> Qingwen Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Wenbin%20Liu"> Wenbin Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Soil can often link a person or item to a crime scene, which makes it a valuable evidence in forensic casework. Several techniques have been utilized in forensic soil discrimination in previous studies. Because soil contains a vast number of microbiomes, the analyse of soil microbiomes is expected to be a potential way to characterise soil evidence. In this study, we applied massively parallel sequencing (MPS) to soil bacterial profiling on the Ion Torrent Personal Genome Machine (PGM). Soils from different regions were collected repeatedly. V-region 3 and 4 of Bacterial 16S rRNA gene were detected by MPS. Operational taxonomic units (OTU, 97%) were used to analyse soil bacteria. Several bioinformatics methods (PCoA, NMDS, Metastats, LEfse, and Heatmap) were applied in bacterial profiles. Our results demonstrate that MPS can provide a more detailed picture of the soil microbiomes and the composition of soil bacterial components from different region was individualistic. In conclusion, the utility of soil bacterial profiling via MPS of the 16S rRNA gene has potential value in characterising soil evidences and associating them with their place of origin, which can play an important role in forensic science in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bacterial%20profiling" title="bacterial profiling">bacterial profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=massively%20parallel%20sequencing" title=" massively parallel sequencing"> massively parallel sequencing</a>, <a href="https://publications.waset.org/abstracts/search?q=soil%20evidence" title=" soil evidence"> soil evidence</a> </p> <a href="https://publications.waset.org/abstracts/80561/applying-massively-parallel-sequencing-to-forensic-soil-bacterial-profiling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80561.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">564</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11670</span> The Role of Digital Technology in Crime Prevention: a Case Study of Cellular Forensics Unit, Capital City Police Peshawar-Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Ashfaq">Muhammad Ashfaq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies.Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries and blind murder cases are now traceable with the help of technology.Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police .A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals .Latest digital analysis software should be provided to equip the Cellular Forensic Unit. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime-prevention" title="crime-prevention">crime-prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular-forensic%20unit-pakistan" title=" cellular-forensic unit-pakistan"> cellular-forensic unit-pakistan</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention-digital-pakistan" title=" crime prevention-digital-pakistan"> crime prevention-digital-pakistan</a>, <a href="https://publications.waset.org/abstracts/search?q=crminology-pakistan" title=" crminology-pakistan"> crminology-pakistan</a> </p> <a href="https://publications.waset.org/abstracts/167955/the-role-of-digital-technology-in-crime-prevention-a-case-study-of-cellular-forensics-unit-capital-city-police-peshawar-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11669</span> Digital Forensics Showdown: Encase and FTK Head-to-Head</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rida%20Nasir">Rida Nasir</a>, <a href="https://publications.waset.org/abstracts/search?q=Waseem%20Iqbal"> Waseem Iqbal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the constant revolution in technology and the increase in anti-forensic techniques used by attackers to remove their traces, professionals often struggle to choose the best tool to be used in digital forensic investigations. This paper compares two of the most well-known and widely used licensed commercial tools, i.e., Encase & FTK. The comparison was drawn on various parameters and features to provide an authentic evaluation of licensed versions of these well-known commercial tools against various real-world scenarios. In order to discover the popularity of these tools within the digital forensic community, a survey was conducted publicly to determine the preferred choice. The dataset used is the Computer Forensics Reference Dataset (CFReDS). A total of 70 features were selected from various categories. Upon comparison, both FTK and EnCase produce remarkable results. However, each tool has some limitations, and none of the tools is declared best. The comparison drawn is completely unbiased, based on factual data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=commercial%20tools" title=" commercial tools"> commercial tools</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20evaluation" title=" forensic evaluation"> forensic evaluation</a> </p> <a href="https://publications.waset.org/abstracts/190321/digital-forensics-showdown-encase-and-ftk-head-to-head" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190321.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">19</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=389">389</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=390">390</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20case&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>