首页 | 本学科首页   官方微博 | 高级检索  
     检索      


An examination into Trillian basic 3.x contact identification
Institution:1. IKGPTU, Jalandhar (Pb.), India;2. Department of ECE, BBSBEC, Fatehgarh Sahib (Pb.), India;3. Department of ECE, G.N.D.U, Regional Campus Jalandhar (Pb.), India;4. Department of Computer Science, SSD Women’s Institute of Technology, Bathinda(pb.), India;5. Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA;1. University College London, Gower Street, WC1E 6BT, London, UK;2. Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str, 18534 Piraeus, Greece;1. Service de Pneumologie B et Transplantation Pulmonaire, Université Paris 7 Denis Diderot, Hôpital Bichat, Paris, France;2. INSERM U1152, Département Hospitalo-Universitaire FIRE, Laboratoire d''Excellence INFLAMEX, Université Paris 7 Denis Diderot, Paris, France;3. Département de Pathologie, Hôpital Bichat, Assistance Publique-Hôpitaux de Paris, Paris, France;4. Université Paris-Sud, AP-HP, Service de Pneumologie, Centre de Référence de l''Hypertension Pulmonaire Sévère, INSERM UMR_S 999, Hôpital de Bicêtre, Le Kremlin Bicêtre, Paris, France;5. Service de Chirurgie Thoracique et Vasculaire, Hôpital Bichat, Assistance Publique-Hôpitaux de Paris, Paris, France;6. Service d''Anatomie Pathologique, Hôpital Marie Lannelongue, Le Plessis-Robinson, France
Abstract:With the advent of new legislation in the United Kingdom – as well as several high-profile criminal cases – the issue of Internet grooming has been the subject of much recent focus. Of particular interest to the forensic examiner is the ability to trace back from a known suspect's computer system to identify contact with his alleged victims. Specifically, when an allegation of grooming is made, one of the first things the examiner should do is to determine that the suspect's computer system was used to contact the informant's account in the first place. This a strong evidential link between victim and suspect and clearly demonstrates that the suspect was responsible for that contact rather than a third party who may have taken control of the suspect's chat account.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号