91 research outputs found

    Significance of Semantic Reconciliation in Digital Forensics

    Get PDF
    Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the same neighbourhood, they may not be aware of the existence of the semantic disparities, and probably might not easily realize it. The aim of this paper, therefore, is to discuss semantic disparity in DF and further elaborates on how to manage it. In addition, this paper also presents the significance of semantic reconciliation in DF. Semantic reconciliation refers to reconciling the meaning (including the interpretations and descriptions) of terminologies and data used in digital forensics. Managing semantic disparities and the significance of semantic reconciliation in digital forensics constitutes the main contributions of this paper. Keywords: Digital forensics, semantic disparity, managing semantic disparity, semantic reconciliation, significance of semantic reconciliatio

    Predictors of HPV Vaccination Series Completion in Philadelphia Adolescents

    Get PDF
    Research Aim: This study analyzed data from the Philadelphia KidsPlus Immunization information System (IIS) to look at factors associated with HPV vaccine series completion. Note: Student capstone presentation also available at: http://jdc.jefferson.edu/mphcapstone_presentation/190

    Adding Digital Forensic Readiness as a Security Component to the IoT Domain

    Get PDF
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart environments”. This experience has begun to be felt across different IoT-based domains like healthcare, surveillance, energy systems, home appliances, industrial machines, smart grids and smart cities. These developments have, however, brought about a more complex and heterogeneous environment which is slowly becoming a home to cyber attackers. Digital Forensic Readiness (DFR) though can be employed as a mechanism for maximizing the potential use of digital evidence while minimizing the cost of conducting a digital forensic investigation process in IoT environments in case of an incidence. The problem addressed in this paper, therefore, is that at the time of writing this paper, there still exist no IoT architectures that have a DFR capability that is able to attain incident preparedness across IoT environments as a mechanism of preparing for post-event response process. It is on this premise, that the authors are proposing an architecture for incorporating DFR to IoT domain for proper planning and preparing in the case of security incidents. It is paramount to note that the DFR mechanism in IoT discussed in this paper complies with ISO/IEC 27043: 2015, 27030:2012 and 27017: 2015 international standards. It is the authors’ opinion that the architecture is holistic and very significant in IoT forensics

    Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments

    Get PDF
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. This evidence can be used to prove or disprove facts if a cyber-incident is detected. However, the world has seen a shift on how devices communicate and connect as a result of increased devices and connectivity, which has led to the creation of “smart environments” where the Internet of Things (IoT) plays a key role. Still, we can harness this proliferation of digital devices and smart environments to Digital Forensic (DF) technology which might help to solve the puzzle of how proactive strategies can help to minimise the time and cost needed to conduct a digital investigation. This article introduces the Functional Requirements (FRs) and processes needed when Digital Forensic Readiness (DFR) process is employed as a security component in the IoT-based environment. The paper serves as a continuation of the initially proposed architecture for adding DFR as a security component to IoT environment. The aspects and claims presented in this paper can be used as basic building blocks for implementing DFR technologies that guarantee security in the IoT-based environment. It is worth noting again that the processes that have been defined in this paper comply with the ISO/IEC 27043: 2015 International Standard

    Ontology‐driven perspective of CFRaaS

    Get PDF
    A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during a post‐event response process. The benefit of applying a CFRaaS model in a cloud environment, is that, it is designed to prevent the modification/tampering of the cloud architectures or the infrastructure during the reactive process, which if it could, may end up having far‐reaching implications. The authors of this article present the reactive process as a very costly exercise when the infrastructure must be reprogrammed every time the process is conducted. This may hamper successful investigation from the forensic experts and law enforcement agencies perspectives. The CFRaaS model, in its current state, has not been presented in a way that can help to classify or visualize the different types of potential evidence in all the cloud deployable models, and this may limit the expectations of what or how the required PDE may be collected. To address this problem, the article presents the CFRaaS from a holistic ontology‐driven perspective, which allows the forensic experts to be able to apply the CFRaaS based on its simplicity of the concepts, relationship or semantics between different form of potential evidence, as well as how the security of a digital environment being investigated could be upheld. The CFRaaS in this context follows a fundamental ontology engineering approach that is based on the classical Resource Description Framework. The proposed ontology‐driven approach to CFRaaS is, therefore, a knowledge‐base that uses layer‐dependencies, which could be an essential toolkit for digital forensic examiners and other stakeholders in cloud‐security. The implementation of this approach could further provide a platform to develop other knowledge base components for cloud forensics and security

    Parental Mentalizing during Middle Childhood: How Is the Adoption of a Reflective Stance Associated with Child’s Psychological Outcomes?

    Get PDF
    This exploratory cross-sectional study attempts to understand the mechanisms underlying the role of parental mentalizing in a child’s psychological functioning during middle childhood by using Parental Reflective Functioning (PRF) and Parental Insightfulness (PI) constructs. The main aims are to examine the role of PI and PRF as processes capable of influencing a child’s psychological functioning in terms of emotional–behavioral difficulties and social–emotional competencies. Eighty-six community parents (48 mothers, 38 fathers) and their 50 children in middle childhood (Mage = 10.10, SD = 1.13) participated in this study, recruited through a non-probabilistic sampling. The following measures were used to assess the aims of this study: Insightfulness Assessment, Parental Reflective Functioning Questionnaire, Child Behavior Check-list (CBCL) and Devereux Student Strengths Assessment (DESSA) questionnaires. Results showed that parental mentalizing was found to be significantly associated with both child’s internalizing and externalizing symptoms and social–emotional competencies as reported by parents through the CBCL and DESSA questionnaires. This study may offer a contribution to the study of parental mentalizing during middle childhood, supporting the hypothesis that both parents’ ability to understand their child’s mental states could affect the child’s psychological functioning. Clinical and theoretical implications are geared toward a family-based view with a specific focus on the importance of fostering in both parents a positive attitude toward mentalizing processes

    Taxonomy for digital forensic evidence

    Get PDF
    The conference aimed at supporting and stimulating active productive research set to strengthen the technical foundations of engineers and scientists in the continent, through developing strong technical foundations and skills, leading to new small to medium enterprises within the African sub-continent. It also seeked to encourage the emergence of functionally skilled technocrats within the continent.Modern society has increased its dependencies on digital systems and computer networks in almost every area of life today. Although this dependency is good it has opened a whole new world of possibilities for criminals to exploit. This has been seen in areas where criminals are able to use existing digital systems to share information and to reinforce their hacking techniques for nefarious purposes. As a result, major potential security risks, such as malicious insiders, data loss or leakage and policy violations have now invaded our digital world with worrying trends of digital and cyber-crimes. This, therefore, has made computer based information a primary source of digital evidence in many legal matters and digital investigations. The understanding of the different types of information generated by computer systems is thus an importance aspect of any digital forensic investigation process. For this reason, this paper reviews existing digital forensic research literature and highlights the different types of digital evidence that can potentially be admissible in our courts of law today. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. The taxonomy classifies a large number of Digital Forensic Evidence (DFE) into a few well-defined and easily understood categories which can be useful, for example, the future developments of digital forensic tools. In addition, the taxonomy can also be helpful to practitioners, for example, in classifying the different types of DFE that can be admissible in courts. The main contribution of this research is, therefore, to propose a taxonomy for DFE that can assist digital forensic analysts and forensic practitioners to understand the different types of evidence with ease and their applicability in different legal matters.Strathmore University; Institute of Electrical and Electronics Engineers (IEEE

    Hunters and Their Perceptions of Public Access: A View from Afield

    Get PDF
    Declining hunter participation threatens cultural traditions and public support for conservation, warranting examination of the forces behind the downward trajectory. Access to lands for hunting, an often-cited reason for non participation, may play a critical role in the retention and recruitment of hunters. Meeting the access needs of a diverse hunting constituency requires understanding how hunters use and perceive access opportunities, particularly public-access sites. Given that perceptions of access are entirely place based and degrade with time, traditional postseason survey methods may fail to adequately quantify the value of public access to the hunting constituency. To overcome the potential limitations of postseason surveys, we conducted on-site assessments of hunter perceptions of habitat quality, game abundance, ease of access, and crowding as well as whether the experience met the hunters’ expectations and their likelihood to return to hunt. Over 3 y, we interviewed 3,248 parties of which 71.5% were hunting. Most parties (65.9%) reported having no private access within the region of Nebraska where they were interviewed. Parties (67.6%) were largely limited to two or fewer hunters, most of whom were adult males (84.3%) who were, on average, 41.2 y old. The perception of public-access sites was generally positive, but 43.1% of parties indicated that game abundance was below average despite 59.2% of parties seeing game and 37.3% harvesting at least one animal. Similar to other explorations of hunter satisfaction, we found game abundance, and in particular harvest success, had the most consistent relationship with hunter perception of public access. By surveying multiple types of hunters across sites that encompass a range of social and ecological conditions, we gained a broader understanding of how hunters perceive public access in real time, which will help to inform future management decisions to foster and improve public-access programs

    Translating statistical species-habitat models to interactive decision support tools

    Get PDF
    Understanding species-habitat relationships is vital to successful conservation, but the tools used to communicate species-habitat relationships are often poorly suited to the information needs of conservation practitioners. Here we present a novel method for translating a statistical species-habitat model, a regression analysis relating ring-necked pheasant abundance to landcover, into an interactive online tool. The Pheasant Habitat Simulator combines the analytical power of the R programming environment with the user-friendly Shiny web interface to create an online platform in which wildlife professionals can explore the effects of variation in local landcover on relative pheasant habitat suitability within spatial scales relevant to individual wildlife managers. Our tool allows users to virtually manipulate the landcover composition of a simulated space to explore how changes in landcover may affect pheasant relative habitat suitability, and guides users through the economic tradeoffs of landscape changes. We offer suggestions for development of similar interactive applications and demonstrate their potential as innovative science delivery tools for diverse professional and public audience
    • 

    corecore