248 research outputs found

    Audit: Automated Disk Investigation Toolkit

    Get PDF
    Software tools designed for disk analysis play a critical role today in forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally trained users with IT backgrounds. The relevant tools are also often open source requiring additional technical knowledge and proper configuration. This makes it difficult for investigators without some computer science background to easily conduct the needed disk analysis. In this paper, we present AUDIT, a novel automated disk investigation toolkit that supports investigations conducted by non-expert (in IT and disk technology) and expert investigators. Our proof of concept design and implementation of AUDIT intelligently integrates open source tools and guides non-IT professionals while requiring minimal technical knowledge about the disk structures and file systems of the target disk image

    Chasing Sustainability on the Net : International research on 69 journalistic pure players and their business models

    Get PDF
    This report outlines how online-based journalistic startups have created their economical locker in the evolving media ecology. The research introduces the ways that startups have found sustainability in the markets of ten countries. The work is based on 69 case studies from Europe, USA and Japan. The case analysis shows that business models can be divided into two groups. The storytelling-oriented business models are still prevalent in our findings. These are the online journalistic outlets that produce original content – news and stories for audiences. But the other group, service-oriented business models, seems to be growing. This group consists of sites that don’t try to monetize the journalistic content as such but rather focus on carving out new functionality. The project was able to identify several revenue sources: advertising, paying for content, affiliate marketing, donations, selling data or services, organizing events, freelancing and training or selling merchandise. Where it was hard to evidence entirely new revenue sources, it was however possible to find new ways in which revenue sources have been combined or reconfigured. The report also offers practical advice for those who are planning to start their own journalistic site

    Optimising additive manufacturing for fine art sculpture and digital restoration of archaeological artefacts

    Get PDF
    Additive manufacturing (AM) has shown itself to be beneficial in many application areas, including product design and manufacture, medical models and prosthetics, architectural modelling and artistic endeavours. For some of these applications, coupling AM with reverse engineering (RE) enables the utilisation of data from existing 3D shapes. This thesis describes the application of AM and RE within sculpture manufacture, in order to optimise the process chains for sculpture reproduction and relic conservation and restoration. This area poses particular problems since the original artefacts can often be fragile and inaccessible, and the finishing required on the AM replicas is both complex and varied. Several case studies within both literature and practical projects are presented, which cover essential knowledge of producing large scale sculptures from an original models as well as a wide range of artefact shapes and downstream finishing techniques. The combination of digital technologies and traditional art requires interdisciplinary knowledge across engineering and fine art. Also, definitions and requirements (e.g. ‘accuracy’), can be applied as both engineering and artistic terms when specifications and trade-offs are being considered. The thesis discusses the feasibility for using these technologies across domains, and explores the potential for developing new market opportunities for AM. It presents and analyses a number of case study projects undertaken by the author with a view to developing cost and time models for various processes used. These models have then been used to develop a series of "process maps", which enable users of AM in this area to decide upon the optimum process route to follow, under various circumstances. The maps were validated and user feedback obtained through the execution of two further sculpture manufacturing projects. The thesis finishes with conclusions about the feasibility of the approach, its constraints, the pros and cons of adopting AM in this area and recommendations for future research

    Sustaining Journalistic Entrepreneurship

    Get PDF
    Structural change in the media ecology has opened up a range of opportunities for startups, as this report has detailed. Media entrepreneurs have flexed their muscles creating all manner of new sites, products and services in the journalism ecology. Many have launched blogs or niche interest sites, forums or digital communities; others trade on civic, investigative or citizen journalism; others on technology and production. This chapter recognizes the valid addition of these sites to the potential career path of a journalist and the increasing likelihood for journalists to work within, create or alongside such journalistic entities. Where once innovation and change happened slowly, current media technologies are developing continually and the rate of product development has increased exponentially. As part of the interview process to create the SuBMoJour database, researchers had the opportunity to discuss with media managers about the range of skills required to sustain journalistic entrepreneurship. Not all interviewees participated in these discussions. However, the interviews were free enough to allow for subjective information to be solicited where possible as to the journey experienced towards sustainability. Of the responses collated, there were several points of advice from journalism entrepreneurs worthy of note. These are detailed below in the intention of helping those planning their own startup by giving some lived experience of more established entrepreneurs. These are not intended as a definitive list but go some way to identify the scope and reach of possible skills development and research in the future

    Digital Forensics Practices: A Road Map for Building Digital Forensics Capability

    Get PDF
    Identifying the needs for building and managing Digital Forensics Capability (DFC) are important because these can help organisations to stay abreast of criminal’s activities and challenging pace of technological advancement. The field of Digital Forensics (DF) is witnessing rapid development in investigation procedures, tools used, and the types of digital evidence. However, several research publications confirm that a unified standard for building and managing DF capability does not exit. Therefore, this thesis identifies, documents, and analyses existing DF frameworks and the attitudes of organisations for establishing the DF team, staffing and training, acquiring and employing effective tools in practice and establishing effective procedures. First, this thesis looks into the existing practices in the DF community for carrying out digital investigations and more importantly the precise steps taken for setting up the laboratories. Second, the thesis focuses on research data collected from organisations in the United Kingdom and the United Arab Emirates and based on this collection a framework has been developed to understand better the building and managing the capabilities of the DFOs (DFOs). This framework has been developed by applying Grounded Theory as a systematic and comprehensive qualitative methodology in the emerging field of DF research. This thesis, furthermore, provides a systematic guideline to describe the procedures and techniques of using grounded theory in DF research by applying three Grounded Theory coding methods (open, axial, and selective coding) which have been used in this thesis. Also the techniques presented in this thesis provide a thorough critique, making it a valuable contribution to the discussion of methods of analysis in the field of DF. Finally, the thesis proposes a framework in the form of an equation for analysing the capability of DFOs. The proposed framework, called the Digital Forensics Organisation Core Capability Framework, offers an explanation of the factors involved in establishing the capability for a digital forensics organisation. Also software was developed for applying the framework in real lif

    Mobile Forensics – The File Format Handbook

    Get PDF
    This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints about the forensic value of possible artefacts, along with an outline of tools that can decode the relevant data. The book is organized into two distinct parts: Part I describes several different file systems that are commonly used in mobile devices. · APFS is the file system that is used in all modern Apple devices including iPhones, iPads, and even Apple Computers, like the MacBook series. · Ext4 is very common in Android devices and is the successor of the Ext2 and Ext3 file systems that were commonly used on Linux-based computers. · The Flash-Friendly File System (F2FS) is a Linux system designed explicitly for NAND Flash memory, common in removable storage devices and mobile devices, which Samsung Electronics developed in 2012. · The QNX6 file system is present in Smartphones delivered by Blackberry (e.g. devices that are using Blackberry 10) and modern vehicle infotainment systems that use QNX as their operating system. Part II describes five different file formats that are commonly used on mobile devices. · SQLite is nearly omnipresent in mobile devices with an overwhelming majority of all mobile applications storing their data in such databases. · The second leading file format in the mobile world are Property Lists, which are predominantly found on Apple devices. · Java Serialization is a popular technique for storing object states in the Java programming language. Mobile application (app) developers very often resort to this technique to make their application state persistent. · The Realm database format has emerged over recent years as a possible successor to the now ageing SQLite format and has begun to appear as part of some modern applications on mobile devices. · Protocol Buffers provide a format for taking compiled data and serializing it by turning it into bytes represented in decimal values, which is a technique commonly used in mobile devices. The aim of this book is to act as a knowledge base and reference guide for digital forensic practitioners who need knowledge about a specific file system or file format. It is also hoped to provide useful insight and knowledge for students or other aspiring professionals who want to work within the field of digital forensics. The book is written with the assumption that the reader will have some existing knowledge and understanding about computers, mobile devices, file systems and file formats

    Propelling the Potential of Enterprise Linked Data in Austria. Roadmap and Report

    Get PDF
    In times of digital transformation and considering the potential of the data-driven economy, it is crucial that data is not only made available, data sources can be trusted, but also data integrity can be guaranteed, necessary privacy and security mechanisms are in place, and data and access comply with policies and legislation. In many cases, complex and interdisciplinary questions cannot be answered by a single dataset and thus it is necessary to combine data from multiple disparate sources. However, because most data today is locked up in isolated silos, data cannot be used to its fullest potential. The core challenge for most organisations and enterprises in regards to data exchange and integration is to be able to combine data from internal and external data sources in a manner that supports both day to day operations and innovation. Linked Data is a promising data publishing and integration paradigm that builds upon standard web technologies. It supports the publishing of structured data in a semantically explicit and interlinked manner such that it can be easily connected, and consequently becomes more interoperable and useful. The PROPEL project - Propelling the Potential of Enterprise Linked Data in Austria - surveyed technological challenges, entrepreneurial opportunities, and open research questions on the use of Linked Data in a business context and developed a roadmap and a set of recommendations for policy makers, industry, and the research community. Shifting away from a predominantly academic perspective and an exclusive focus on open data, the project looked at Linked Data as an emerging disruptive technology that enables efficient enterprise data management in the rising data economy. Current market forces provide many opportunities, but also present several data and information management challenges. Given that Linked Data enables advanced analytics and decision-making, it is particularly suitable for addressing today's data and information management challenges. In our research, we identified a variety of highly promising use cases for Linked Data in an enterprise context. Examples of promising application domains include "customization and customer relationship management", "automatic and dynamic content production, adaption and display", "data search, information retrieval and knowledge discovery", as well as "data and information exchange and integration". The analysis also revealed broad potential across a large spectrum of industries whose structural and technological characteristics align well with Linked Data characteristics and principles: energy, retail, finance and insurance, government, health, transport and logistics, telecommunications, media, tourism, engineering, and research and development rank among the most promising industries for the adoption of Linked Data principles. In addition to approaching the subject from an industry perspective, we also examined the topics and trends emerging from the research community in the field of Linked Data and the Semantic Web. Although our analysis revolved around a vibrant and active community composed of academia and leading companies involved in semantic technologies, we found that industry needs and research discussions are somewhat misaligned. Whereas some foundation technologies such as knowledge representation and data creation/publishing/sharing, data management and system engineering are highly represented in scientific papers, specific topics such as recommendations, or cross-topics such as machine learning or privacy and security are marginally present. Topics such as big/large data and the internet of things are (still) on an upward trajectory in terms of attention. In contrast, topics that are very relevant for industry such as application oriented topics or those that relate to security, privacy and robustness are not attracting much attention. When it comes to standardisation efforts, we identified a clear need for a more in-depth analysis into the effectiveness of existing standards, the degree of coverage they provide with respect the foundations they belong to, and the suitability of alternative standards that do not fall under the core Semantic Web umbrella. Taking into consideration market forces, sector analysis of Linked Data potential, demand side analysis and the current technological status it is clear that Linked Data has a lot of potential for enterprises and can act as a key driver of technological, organizational, and economic change. However, in order to ensure a solid foundation for Enterprise Linked Data include there is a need for: greater awareness surrounding the potential of Linked Data in enterprises, lowering of entrance barriers via education and training, better alignment between industry demands and research activities, greater support for technology transfer from universities to companies. The PROPEL roadmap recommends concrete measures in order to propel the adoption of Linked Data in Austrian enterprises. These measures are structured around five fields of activities: "awareness and education", "technological innovation, research gaps, standardisation", "policy and legal", and "funding". Key short-term recommendations include the clustering of existing activities in order to raise visibility on an international level, the funding of key topics that are under represented by the community, and the setup of joint projects. In the medium term, we recommend the strengthening of existing academic and private education efforts via certification and to establish flagship projects that are based on national use cases that can serve as blueprints for transnational initiatives. This requires not only financial support, but also infrastructure support, such as data and services to build solutions on top. In the long term, we recommend cooperation with international funding schemes to establish and foster a European level agenda, and the setup of centres of excellence

    Mobile Forensics – The File Format Handbook

    Get PDF
    This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints about the forensic value of possible artefacts, along with an outline of tools that can decode the relevant data. The book is organized into two distinct parts: Part I describes several different file systems that are commonly used in mobile devices. · APFS is the file system that is used in all modern Apple devices including iPhones, iPads, and even Apple Computers, like the MacBook series. · Ext4 is very common in Android devices and is the successor of the Ext2 and Ext3 file systems that were commonly used on Linux-based computers. · The Flash-Friendly File System (F2FS) is a Linux system designed explicitly for NAND Flash memory, common in removable storage devices and mobile devices, which Samsung Electronics developed in 2012. · The QNX6 file system is present in Smartphones delivered by Blackberry (e.g. devices that are using Blackberry 10) and modern vehicle infotainment systems that use QNX as their operating system. Part II describes five different file formats that are commonly used on mobile devices. · SQLite is nearly omnipresent in mobile devices with an overwhelming majority of all mobile applications storing their data in such databases. · The second leading file format in the mobile world are Property Lists, which are predominantly found on Apple devices. · Java Serialization is a popular technique for storing object states in the Java programming language. Mobile application (app) developers very often resort to this technique to make their application state persistent. · The Realm database format has emerged over recent years as a possible successor to the now ageing SQLite format and has begun to appear as part of some modern applications on mobile devices. · Protocol Buffers provide a format for taking compiled data and serializing it by turning it into bytes represented in decimal values, which is a technique commonly used in mobile devices. The aim of this book is to act as a knowledge base and reference guide for digital forensic practitioners who need knowledge about a specific file system or file format. It is also hoped to provide useful insight and knowledge for students or other aspiring professionals who want to work within the field of digital forensics. The book is written with the assumption that the reader will have some existing knowledge and understanding about computers, mobile devices, file systems and file formats

    D4.6 Report on the results of cycle 3 demonstrators:Aggregates internal deliverables ID4.12, ID4.13, ID4.14, ID4.15, ID4.16

    Get PDF
    Hernández-Leo, D., Sligte, H., Glahn, C., Krekels, B., Keuls, C., Louys, A., Stefanov, K., Perez, M., Chacón, J., Santos, P., Mazzetti, A., Herder, E., Maxwell, K., Kiercheben, J., Griffiths, D., & Kluijfhout, E. (2009). D4.6 - Report on the results of cycle 3 demonstrators. Aggregates internal deliverables ID4.12, ID4.13, ID4.14, ID4.15, ID4.16. TENCompetence.This document includes the evaluation results of the Cycle 3 real-life evaluation activities. A cross-analysis of the results is compiled in order to present the impact indicators of the project in terms of outreach, learning benefits, organizational implications, and business opportunities identified in these experiences. The implementations and eight business/market-relevant demonstrators conducted in collaboration with external "adopter organizations" from different countries in Europe. These external organizations are Associated Partners or different units within the partners'organization. The revised pilots and the demonstrators test the tooling achieved along DIP-3. Both pilots and business demonstrators show to provide benefits to socially- and industrially-relevant scenarios. Areas of proven special impact include adult competence developmentfor social inclusion, provision of learning paths to support competence development of distributed professionals, informal competence development, human resources personal competence development, and sharing of competence profiles between organizations to support the mobility of their professionals.The work on this publication has been sponsored by the TENCompetence Integrated Project that is funded by the European Commission's 6th Framework Programme, priority IST/Technology Enhanced Learning. Contract 027087 [http://www.tencompetence.org
    • …
    corecore