5,619 research outputs found
Recommended from our members
To Catch A Thief II: Computer Forensics in the Classroom
The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum
Gene Technology in the eyes of the public and experts. Moral opinions, attitudes and risk perception.
Risk perceptions and attitudes to genetically modified food (GMF) were investigated in a survey study of the public (N=469) and experts (N=49). The response rate was 47 percent for the public. For the experts, response rate was 60 percent. GMF technology was rated as the worst of 18 technologies by members of the public and highly replaceable. Experts had a very different view but also saw GMF as replaceable. Models of risk perceptions and attitudes with regard to policy and consumer intentions were fitted to data. It was found that a very large share of the variance, about 70 percent, was accounted for in the latter cases, while risk perception was somewhat harder to account for (about 50 percent was explained). Traditional explanatory factors such as Dread and Novelty were weak explanatory factors as compared to new approaches, which included Interfering with Nature, Moral value of technology and Epistemic trust. Experts were throughout much more positive to GMF than were members of the public. However, their attitudes and risk perceptions still showed dynamic properties similar to those found in the data from the public. The differences between experts and the public could be well explained in terms of the models tested. In comparisons with recent Eurobarometer studies of attitudes towards GMF, risk emerged in the present study as a more important factor in attitudes, equally important as benefits. The models formulated for the present data were about twice as powerful as those in published analyses of Eurobarometer data.Gene technology; risk perception; policy attitude; consumer behavior; experts; epistemic trust; risk sensitivity
TLAD 2011 Proceedings:9th international workshop on teaching, learning and assesment of databases (TLAD)
This is the ninth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2011), which once again is held as a workshop of BNCOD 2011 - the 28th British National Conference on Databases. TLAD 2011 is held on the 11th July at Manchester University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.Due to the healthy number of high quality submissions this year, the workshop will present eight peer reviewed papers. Of these, six will be presented as full papers and two as short papers. These papers cover a number of themes, including: the teaching of data mining and data warehousing, databases and the cloud, and novel uses of technology in teaching and assessment. It is expected that these papers will stimulate discussion at the workshop itself and beyond. This year, the focus on providing a forum for discussion is enhanced through a panel discussion on assessment in database modules, with David Nelson (of the University of Sunderland), Al Monger (of Southampton Solent University) and Charles Boisvert (of Sheffield Hallam University) as the expert panel
TLAD 2011 Proceedings:9th international workshop on teaching, learning and assesment of databases (TLAD)
This is the ninth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2011), which once again is held as a workshop of BNCOD 2011 - the 28th British National Conference on Databases. TLAD 2011 is held on the 11th July at Manchester University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.Due to the healthy number of high quality submissions this year, the workshop will present eight peer reviewed papers. Of these, six will be presented as full papers and two as short papers. These papers cover a number of themes, including: the teaching of data mining and data warehousing, databases and the cloud, and novel uses of technology in teaching and assessment. It is expected that these papers will stimulate discussion at the workshop itself and beyond. This year, the focus on providing a forum for discussion is enhanced through a panel discussion on assessment in database modules, with David Nelson (of the University of Sunderland), Al Monger (of Southampton Solent University) and Charles Boisvert (of Sheffield Hallam University) as the expert panel
Analysis of digital evidence in identity theft investigations
Identity Theft could be currently considered as a significant problem in the modern
internet driven era. This type of computer crime can be achieved in a number of
different ways; various statistical figures suggest it is on the increase. It intimidates
individual privacy and self assurance, while efforts for increased security and
protection measures appear inadequate to prevent it. A forensic analysis of the digital
evidence should be able to provide precise findings after the investigation of Identity
Theft incidents. At present, the investigation of Internet based Identity Theft is
performed on an ad hoc and unstructured basis, in relation to the digital evidence.
This research work aims to construct a formalised and structured approach to digital
Identity Theft investigations that would improve the current computer forensic
investigative practice. The research hypothesis is to create an analytical framework to
facilitate the investigation of Internet Identity Theft cases and the processing of the
related digital evidence.
This research work makes two key contributions to the subject: a) proposing the
approach of examining different computer crimes using a process specifically based
on their nature and b) to differentiate the examination procedure between the victimâs and the fraudsterâs side, depending on the ownership of the digital media. The
background research on the existing investigation methods supports the need of
moving towards an individual framework that supports Identity Theft investigations.
The presented investigation framework is designed based on the structure of the
existing computer forensic frameworks. It is a flexible, conceptual tool that will assist
the investigatorâs work and analyse incidents related to this type of crime. The
research outcome has been presented in detail, with supporting relevant material for
the investigator. The intention is to offer a coherent tool that could be used by
computer forensics investigators. Therefore, the research outcome will not only be
evaluated from a laboratory experiment, but also strengthened and improved based on
an evaluation feedback by experts from law enforcement.
While personal identities are increasingly being stored and shared on digital media,
the threat of personal and private information that is used fraudulently cannot be
eliminated. However, when such incidents are precisely examined, then the nature of
the problem can be more clearly understood
Complete Issue 52(1)
Complete digitized issue (volume 52, issue 1) of Speaker & Gavel
Graph-based Temporal Analysis in Digital Forensics
Establishing a timeline as part of a digital forensics investigation is a vital part of understanding the order in which system events occurred. However, most digital forensics tools present timelines as histogram or as raw artifacts. Consequently, digital forensics examiners are forced to rely on manual, labor-intensive practices to reconstruct system events. Current digital forensics analysis tools are at their technological limit with the increasing storage and complexity of data. A graph-based timeline can present digital forensics evidence in a structure that can be immediately understood and effortlessly focused. This paper presents the Temporal Analysis Integration Management Application (TAIMA) to enhance digital forensics analysis via information visualization (infovis) techniques. TAIMA is a prototype application that provides a graph-based timeline for event reconstruction using abstraction and visualization techniques. A workflow illustration and pilot usability study provided evidence that TAIMA assisted digital forensics specialists in identifying key system events during digital forensics analysis
Treatments and predictors of violent behaviour: the role of fantasy and schizotypal personality traits
This research project primarily investigated the relationship between fantasy, schizotypal personality
traits, psychological distress, criminal thinking styles and violent offending behaviour. A number of
studies have explored the relationship between fantasy life and sexual offending, but few have
investigated this in relation to non -sexual violence. This is the first of its kind to do so with a forensic
sample, where violent behaviour is corroborated, rather than self-reported. Firstly a systematic
review of the literature around the impact of psychological therapies on reducing violent behaviour
was completed. Ten papers were identified and critically reviewed. The resulting synthesis of these
studies indicated that psychological intervention, at least in the short term, can reduce violent
behaviour. However, there was little evidence of a long -term impact of psychological therapies on
reducing violent behaviour. The second part of the research project was a survey of 138 male
prisoners which investigated the relationships between psychological distress, schizotypal personality
traits and criminal thinking styles. In addition, differences in fantasy styles: negative, positive and
narcissistic, and schizotypal personality according to level of violent behaviour were explored, as
were differences in fantasy styles between criminal thinking style groups. Kendall's Tau -b
correlation analyses, Kruskal-Wallis test and post hoc specific comparison tests indicated no
significant differences in fantasy style scores between the violent behaviour groups or thinking style
categories, but revealed that many of the variables explored were strongly correlated. The findings
differed from those of a previous general population study, by finding that fantasy style did not differ
according to level of violence, but provided new findings in terms of relationships between criminal
thinking styles and fantasy style. In an area with little existing research this warrants further
exploration
- âŠ