16 research outputs found

    On the complexity of collaborative cyber crime investigations

    Get PDF
    This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime. The opportunities, operational environment and modus operandi of a cyber criminal are considered, with a view to developing the skills and procedural support that investigators might usefully consider in order to respond more effectively to the investigation of cyber crimes across State boundaries

    Contextual Dependencies in Information Systems Security

    Get PDF
    This paper addresses the contextual dependencies related to the use of information systems security and criticizes the predominance of technical and formalized paradigm in the development and implementation of IS security policies and procedures. The underlying epistemology of our research lies in the interpretative paradigm. It explores the patterns of how the contextual use of information systems security is involved according to a business/organizational practice perspective. It elicits the detailed processes and practices that constitute the pragmatic perspective in developing information security activities

    Understanding Security Practices Deficiencies: A Contextual Analysis

    Get PDF
    This paper seeks to provide an overview of how companies assess and manage security risks in practice. For this purpose we referred to data of security surveys to examine the scope of risk analysis and to identify involved entities in this process. Our analysis shows a continuous focus on data system security rather than on real world organizational context as well as a prevalent involvement of top management and security staff in risk analysis process and in security policy definition and implementation. We therefore suggest that three issues need to be further investigated in the field of information security risk management in order to bridge the gap between design and implementation of secure and usable systems. First, there is a need to broaden the horizon to consider information system as human activity system which is different from a data processing system. Second, the involvement of relevant stakeholders in context for risk analysis leads to better appreciation of security risks. Third, it is necessary to develop ad-hoc tools and techniques to facilitate discussions and dialogue between stakeholders in risk analysis context

    Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime

    Get PDF
    The internet is not a single network, limited to one specific type of information or restrictive of the types of users who can access its information. Conversely, the internet is an intercontinental information highway that has enabled people of all ages to communicate with family and friends with lightning-fast speed, share and collect information, and connect with people and companies thousands of miles from their computer (Roberts, Foehr, Rideout, & Brodie, 1999; Rosenbaum et al., 2000; Smith & Rupp, 2002). However, this growth of information technology has introduced a new form of criminality to the criminal justice system: cyber crime (Denning, 1998). The purpose of this research study is to investigate the prevalence of cyber criminality, specifically possession of child pornography, in law enforcement jurisdictions and the types of training which local and State law enforcement agencies currently offer to effectively combat these technological crimes

    Cyber-Crime Investigations: Complex Collaborative Decision Making

    Get PDF
    This paper reports on the challenges computer forensic investigators face in relation to collaborative decision making, communication and coordination. The opportunities, operational environment and modus operandi of a cyber criminal are considered and used to develop the requirements in terms of both skill sets and procedural support a forensics investigator should have in order to respond to the respective threat vectors. As such, we show how a published framework for systemic thinking can be fit fir purpose for supporting the collaborative enquiry and decision making process

    The Authority of Government in Clearing Hatefull and Hostilities Electronic Information Based on Tribe, Relegion, Race and Intergroup

    Get PDF
    The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergrou

    Age Detection Through Keystroke Dynamics From User Authentication Failures

    Get PDF
    In this paper an incident response approach is proposed for handling detections of authentication failures in systems that employ dynamic biometric authentication and more specifically keystroke user recognition. The main component of the approach is a multi layer perceptron focusing on the age classification of a user. Empirical findings show that the classifier can detect the age of the subject with a probability that is far from the uniform random distribution, making the proposed method suitable for providing supporting yet circumstantial evidence during e-discovery

    The use of specialized cybercrime policing units: An organizational analysis

    Get PDF
    Given the increased focus and importance of cybercrime, some police agencies have turned to the use of specialized cybercrime policing units. Research has yet to examine the how frequently these units are used in policing, nor has research examined the types of agencies most likely to use these units. The current research, drawing on contingency theory, institutional theory, and Maguire’s theory of police organizational structure, uses four waves of Law Enforcement Management and Administrative Survey data to provide a descriptive analysis of specialized cybercrime units with a focus on identifying organizational correlates, environmental pressures, and the role of time. Trend data show that cybercrime units have proliferated over time and are on the path to becoming a normative aspect of policing, with about one-half of all state-level agencies and around one-quarter of all county and municipal agencies making use of cybercrime units as of 2013. Regression results indicate that larger agencies, agencies facing more task routineness and larger task scope challenges, agencies which make use of broader material technologies, and agencies which have adopted specialization strategies are more likely to use cybercrime units than other agencies. The practical and theoretical implications of these results are discussed, as are promising future research directions

    Her most recent publications appear in Journal of School Violence; Western Criminology Review; and Criminal Justice Studies. Her research focuses on criminological theory testing

    Get PDF
    ABSTRACT The internet is not a single network, limited to one specific type of information or restrictive of the International Journal of Police Science and Management, Vol. 12 No. 4, 2010, pp. 516-525. DOI: 10.1350/ijps.201
    corecore