103,544 research outputs found
3D Data Processing Toward Maintenance and Conservation. The Integrated Digital Documentation of Casa de Vidro
During the last decade, 3D integrated surveys and BIM modelling procedures have greatly improved the overall knowledge on some Brazilian Modernist buildings. In this framework, the Casa de Vidro 3D survey carried out by DIAPReM centre at Ferrara University, beside the important outputs, analysis and researches achieved from the point cloud database processing, was also useful to test several awareness increasing activities in cooperation with local stakeholders.
The first digital documentation test of the Casa de Vidro allowed verifying the feasibility of a full survey on the building towards the restoration and possible placement of new architectures into the garden as an archive-museum of the Lina Bo and P.M. Bardi Foundation. Later, full 3D integrated survey and diagnostic analysis were carried out to achieve the total digital documentation of the house sponsored by the Keeping it Modern initiative of Getty Foundation (Los Angeles). Following its characteristics, the survey had to take into consideration the different architectural features, up to the relationship of architecture and nature.
These 3D documentation activities and the point cloud processing allowed several analysis in a multidisciplinary framework
Calm before the storm: the challenges of cloud computing in digital forensics
Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed
Visualizing the Geology of Lake Trout Spawning Sites: Northern Lake Michigan
Geologists and biologists are working together to understand the links between lake floor geology (composition and shape) and the distribution of lake trout throughout their life cycle. Lake floor geology is one of the main factors determining where lake trout spawn, feed, and hide. In support of ongoing research to study Lake Michigan trout habitats, the U.S. Geological Survey in cooperation with the U.S. Army Corps of Engineers mapped the morphology of principle lake trout spawning sites. Using the Army Corps of Engineer\u27s SHOALS airborne lidar (Light Detection and Ranging) system we mapped six regions in Northern Lake Michigan in order to identify ideal spawning regions composed of shallow, clean, gravel/cobble substrate, adjacent to deeper water.
Lidar mapping systems, which use laser pulses to measure water depths from an airplane, are now available to map the nearshore lake morphology at meter-scale detail. Maps generated from the bathymetric data are used to define regions with smooth homogeneous substrate, regions with higher relief, and mixed regions with both smooth and rough relief. This morphologic information combined with sediment samples and direct bottom observations enable geologists to map areas with rougher relief composed of rock outcrop, boulders, and cobbles, as well as smooth regions covered with sand or mud. This information helps biologists, fishery managers, and ecologists visualize the lake floor in significant detail which promotes better fishery management, species protection, and habitat identification.
These maps present the maps and discuss the geology of the six lake trout spawning sites mapped by the lidar system. Where the mapping approached land, aerial photography of the land is combined with the bathymetric data to help visualize the scale of the offshore features. Map and perspective views of Boulder Reef, Hog Island Reef, and Little Traverse Bay are shown on sheet 1, whereas map and perspective views of Trout and High Island Shoal, Gull Island Reef, and Dahlia Shoal are shown on sheet 2. Additional information, bathymetric data, imagery, and metadata are available online athttp://geopubs.wr.usgs.gov/open-file/of03-120/
The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium
The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the required battery power. Carbon fibre composites are by many seen as the only real option when traditional engineering materials are running out of potential for further weight reduction. However, the automotive industry lacks experience working with structural composites and the methods for high volume composite manufacturing are immature. The development of a composite automotive body structure, therefore, needs methods to support and guide the conceptual work to improve the financial and technical results. In this thesis a framework is presented which will provide guidelines for the conceptual phase of the development of an automotive body structure. The framework follows two main paths, one to strive for the ideal material diversity, which also defines an initial partition of the body structure based on the process and material selection. Secondly, a further analysis of the structures are made to evaluate if a more cost and weight efficient solution can be found by a more differential design and by that define the ideal part size. In the case and parameter studies performed, different carbon fibre composite material systems and processes are compared and evaluated. The results show that high performance material system with continuous fibres becomes both more cost and performance effective compared to industrialised discontinuous fibre composites. But also that cycle times, sometimes, are less important than a competitive feedstock cost for a manufacturing process. When further analysing the manufacturing design of the structures it is seen that further partition(s) can become cost effective if the size and complexity is large enough. Â Â Â QC 20140527</p
Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement.
This exploratory study was conducted to better assess how technology can be used in criminal investigations; it is important to get a better understanding of how technology is currently employed in child sex trafficking as well as the approaches and needs of law enforcement. 144 investigators from Internet Crimes Against Children (ICAC) Task Forces and affiliate agencies responded to an online semiâstructured survey, including 45 investigators with experience conducting investigations of the commercial sexual exploitation of children (CSEC) that involved technology. Participants included investigators working in local, county, and state law enforcement agencies in the United States. The discussion suggested a great deal of variation in perspectives and experiences surrounding the problem of CSEC and technology. Investigators were able to highlight both benefits and obstacles. Benefits included the availability of digital evidence instead of relying on personal accounts, the monitoring capabilities of police, and the ability to conduct extensive undercover operations. Obstacles tended to focus on financial concerns, the continual need for training and technical assistance, and the rapidly changing technological environment. Findings highlight the vast complexity and variability in these crimes. There is still quite a bit of the unknown when it comes to investigating CSEC â technology changes rapidly and avenues for marketing and communicating are vast. Continual education, training and technical assistance are central to investigatorsâ needs in this area
Rethinking Security Incident Response: The Integration of Agile Principles
In today's globally networked environment, information security incidents can
inflict staggering financial losses on organizations. Industry reports indicate
that fundamental problems exist with the application of current linear
plan-driven security incident response approaches being applied in many
organizations. Researchers argue that traditional approaches value containment
and eradication over incident learning. While previous security incident
response research focused on best practice development, linear plan-driven
approaches and the technical aspects of security incident response, very little
research investigates the integration of agile principles and practices into
the security incident response process. This paper proposes that the
integration of disciplined agile principles and practices into the security
incident response process is a practical solution to strengthening an
organization's security incident response posture.Comment: Paper presented at the 20th Americas Conference on Information
Systems (AMCIS 2014), Savannah, Georgi
PRECEPT: A Framework for Ethical Digital Forensics Investigations.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.
Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organizationâs right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.
This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.
In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individualsâ rights to privacy and organizationsâ rights to control intellectual capital disclosure.
The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.
Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.
Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE
As more businesses and users adopt cloud computing services, security
vulnerabilities will be increasingly found and exploited. There are many
technological and political challenges where investigation of potentially
criminal incidents in the cloud are concerned. Security experts, however, must
still be able to acquire and analyze data in a methodical, rigorous and
forensically sound manner. This work applies the STRIDE asset-based risk
assessment method to cloud computing infrastructure for the purpose of
identifying and assessing an organization's ability to respond to and
investigate breaches in cloud computing environments. An extension to the
STRIDE risk assessment model is proposed to help organizations quickly respond
to incidents while ensuring acquisition and integrity of the largest amount of
digital evidence possible. Further, the proposed model allows organizations to
assess the needs and capacity of their incident responders before an incident
occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on
Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp.
223-236, 201
- âŠ