首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
《Digital Investigation》2014,11(4):295-313
Distributed filesystems provide a cost-effective means of storing high-volume, velocity and variety information in cloud computing, big data and other contemporary systems. These technologies have the potential to be exploited for illegal purposes, which highlights the need for digital forensic investigations. However, there have been few papers published in the area of distributed filesystem forensics. In this paper, we aim to address this gap in knowledge. Using our previously published cloud forensic framework as the underlying basis, we conduct an in-depth forensic experiment on XtreemFS, a Contrail EU-funded project, as a case study for distributed filesystem forensics. We discuss the technical and process issues regarding collection of evidential data from distributed filesystems, particularly when used in cloud computing environments. A number of digital forensic artefacts are also discussed. We then propose a process for the collection of evidential data from distributed filesystems.  相似文献   

4.
The examination of certain legal aspects of xenophobia has shown that the law and its judicial interpretation do on the one hand server to safeguard against xenophobia and to eliminate it where it still prevails, on the other hand they can however serve to entrench it~. It is believed that in future, South African courts will continue to be proactive in the elimination of xenophobic tendencies wherever they may be encountered in the legal context and that law reform will eradicate laws which generate the impression that they are xenophobically motivated.  相似文献   

5.
6.
This paper examines the definition and context of official corruption in the emerging African nation of Sierra Leone. Historical, legal and sociological studies of the development of Sierra Leone and corruption within that nation are reviewed, as well as the content of official ljudicial inquiries into administrative corruption. These investigations and studies are supplemented with data from the primary author's experiences as a prosecutor and judge in Sierra Leone. Predisposing factors which facilitate corruption are identified and a variety of policies aimed at reform are discussed. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

7.
This article discusses the normative framework for the recognition of the right to adequate food under international and regional human rights law. It then examines the relevance of judicialisation of the right to food in India and South Africa. The article observes that while the right to food is not explicitly recognised in the Indian Constitution, the courts have purposively interpreted the Constitution with a view to holding the government accountable to its obligation under international and national law. It concludes by examining lessons South Africa can draw from the Indian experience.  相似文献   

8.
In fall 1997, a shortage of intravenous immunoglobulin (IVIG) developed in the United States because of increased demand for the product, reduced supply, and product recalls. This shortage is a useful model for understanding how our health care system responds to scarcity. Although the U.S. government took steps to inform the medical community of the shortage, with few exceptions, the government did not respond to the shortage in a timely or effective manner. Instead, it took a relatively passive role, leaving IVIG manufacturers and distributors, health care institutions, and clinicians to fend for themselves. The shortage likely had an uneven impact on patients, based on the relative market strength of the health care institutions in which they received care and the individual patient's ability to absorb the increasing out-of-pocket costs of scarce IVIG. Market mechanisms have now largely alleviated the shortage and significantly reduced its detrimental impact on patients. However, future shortages of IVIG or other scarce medical products, such as vaccines and antibiotics, would benefit from more immediate and coordinated efforts not only to make sure that scarce health care resources are distributed in a just manner but also to identify and remedy the sources of health product supply problems.  相似文献   

9.
Commitment to outpatient psychiatric treatment evolved in the courts to protect patients' right to freedom from compulsory hospitalization. This ruling has been criticized by the psychiatric profession, who prioritize treatment rather than liberty. The following case demonstrates the use of commitment as a therapeutic tool in the psychotherapy of a woman with severe borderline pathology. Although the use of coercion in psychotherapy is controversial, its potential use and its ramifications on transference and countertransference issues are discussed.  相似文献   

10.
Dynamic customer expectations and increased competitive pressures require manufacturing organizations to continually improve both their products and processes. To gain a better understanding of this improvement process so that other firms might benefit from the lessons learned, an in-depth study of a relatively small electronics manufacturing firm was conducted. A review of the organization's product and process improvements over an extended period of time highlighted the importance of the following four “areas”: the firm's sensitivity to its external environment in motivating and guiding product and process improvements, the firm's sensitivity to its product and process strengths as well as the potential advantage these might provide in the marketplace, the firm's management stability and style in motivating and guiding product and process improvements, and the synergistic relationship between the firm's competitive strategy and its product and process improvements.  相似文献   

11.
12.
In many countries it is left to the discretion of the court to accept or reject conclusions based on sampling procedures as applied to the total drug exhibit. As an alternative to this subjective approach, a statistical basis is presented using binomial and hypergeometric distributions to determine a lower limit for the proportion of units in a population which contains a drug, at a given confidence level. A method for calculating the total weight of a drug present in a population within a given confidence interval is also presented. In the event of no failures (all units sampled contain a drug), a sample size of six or seven units is generally sufficient to state that a proportion of at least 0.70 of the population contains a drug at a confidence level of at least 90%. When failures do occur in the sample, point estimation is used as the basis for selecting the appropriate sample size.  相似文献   

13.
For several years, the misuse of stimulant substances is increasingly observed both in the field of sport, to improve the functions of the body and therefore to be more performant, and also by non-athletes to make life more tolerable on a daily basis. Adrafinil, 2-((diphenylmethyl)sulfinyl)-N-hydroxyacetamide, is a drug designed for the treatment of narcolepsy by promoting an awakened state, and to treat alertness and neurological symptoms in the elderly. It is primarily metabolized in vivo to an active form, i.e. modafinil, 2-((diphenylmethyl)sulfinyl)acetamide. The World Anti-Doping Agency (WADA) banned these two drugs in sports in 2004. The authors report an authentic case involving adrafinil and modafinil. The laboratory was requested to test for adrafinil in a hair strand collected from a woman found in possession of vials of adrafinil and suspected of trafficking. A specific method was developed by liquid chromatography tandem mass spectrometry (LC-MS/MS). Unlike modafinil (varying from 6.8 to 13.9 ng/mg), adrafinil was not identified in the strand. The interpretation of the results was difficult because this is the first case describing human hair analysis. In order to be able to interpret the results, a self-administration study was conducted after an oral administration to a volunteer (200 mg) whose beard hair was collected 10 days after administration. The analysis of this specimen highlighted the presence of adrafinil at 0.8 ng/mg and modafinil at 0.5 ng/mg. These results demonstrate the dual identification of both compounds after a single consumption, even after administration of a low dose. According to these results, the analysis of the hair strand from the authentic case does not match with a consumption of adrafinil, in accordance with abuse of modafinil alone. Intelligence considered that this was a trafficking case of adrafinil, with no self-consumption.  相似文献   

14.

This article discusses the ways in which rhetorical theory and critical practice can inform our understanding of communication law. By looking at some of the culturetypal and countercultural myths that went into the construction of America's free speech doctrines during and after World War I, critics can gain an appreciation of the polysemic nature of law. Using the commentaries surrounding Learned Hand's decision in the Masses case as a point of departure, the article illustrates how legal decisions can be viewed as discursive fragments that are a part of the broader rhetorical culture.  相似文献   

15.
This article explores the basis for an international law framework for the adoption of binding minimum standards to govern the exploitation of uranium mining within States. By focusing on international environmental law, the following discourse exposes, a) the inimical impact of State sovereignty over natural resources to effective regulation of uranium mining; and b) the practical ramification of the impreciseness and wooliness of international regulation of uranium mining. This article suggests a need to re‐evaluate the extent to which States may be subject to standards imposed under international law in their exploitation of natural resources.  相似文献   

16.
《Science & justice》2022,62(4):448-454
This paper demonstrates a logical framework for evaluating forensic evidence, first described by Cook et al. [1,2], using a casework example of an alleged sexual assault involving semen transfer. Here we show in real time how the case strategy can change with additional information and how to use available experience and published data to interpret the findings obtained, given the background information provided. The findings of the case are interpreted using the Bayesian approach and are reported by giving the strength of support of scientific findings for one proposition rather than a competing proposition, as per the European Network of Forensic Science Institutes (ENSFI) guideline for evaluative reporting. We believe that using this paper as a template will aid other Forensic Science Practitioners (FSP) to add value and weight to their work by assisting them in evaluating and interpreting their own findings.  相似文献   

17.
Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, there is a simulated scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine (acting as the MMOG server) and Windows client devices running Minecraft. Server and client devices are then examined to reveal the type and extent of evidential artefacts that can be extracted.  相似文献   

18.
The NoSQL DBMS provides an efficient means of storing and accessing big data because its servers are more easily horizontally scalable and replicable than relational DBMSs. Its data model lacks a fixed schema, so that users can easily dynamically change the data model of applications. These characteristics of the NoSQL DBMS mean that it is increasingly used in real-time analysis, web services such as SNS, mobile apps and the storage of machine generated data such as logs and IoT (Internet of Things) data. Although the increased usage of the NoSQL DBMS increases the possibility of it becoming a target of crime, there are few papers about forensic investigation of NoSQL DBMS.In this paper, we propose a forensic investigation framework for the document store NoSQL DBMS. It is difficult to cover all of the NoSQL DBMS, as 'NoSQL' includes several distinct architectures; our forensic investigation framework, however, is focused on the document store NoSQL DBMS. In order to conduct an evaluative case study, we need to apply it to MongoDB, which is, a widely used document store NoSQL DBMS. For this case study, a crime scenario is created in an experimental environment, and then we propose in detail a forensic procedure and technical methods for MongoDB. We suggested many substantial technical investigation methods for MongoDB, including identifying real servers storing evidences in a distributed environment and transaction reconstruction method, using log analysis and recovering deleted data from the MongoDB data file structure.  相似文献   

19.
The paper discusses the interpretation of the rule of prevalence of Article 1 (7) NIS Directive, which has not been the subject of any academic debate so far. Article 1 (7) NIS Directive organises the interface between the NIS Directive regime and other European Union sector-specific legislations imposing (cyber)security obligations, by laying down the conditions according to which such obligations would prevail over the NIS Directive regime. Based on the case study of the recent proposal from the European Commission to regulate Cooperative Intelligent Transport Systems (‘C-ITS’), the paper unravels a number of issues and unclarities. Recommendations are made with respect to the interpretation and application of the rule of prevalence of Article 1 (7) NIS Directive. In anticipation of a potential future C-ITS regulation and in the context of a possible upcoming revision of the NIS Directive, the paper also makes suggestions to ease the regulation of the interface between the NIS Directive and other (cyber-)security regulation, particularly in the field of C-ITS.  相似文献   

20.
Two cases (involving five murder victims) of multiple homicide by inhalational chloroform intoxication are reported. In the discussion of the findings the valence of toxicological analyses is underlined with regard to the possibility of forcible external suffocation due to occlusion of the respiratory orifices by means of a chloroform-soaked soft covering. In addition storage experiments were performed at +4, +20 and -20 degrees C with cadaver blood mixed with chloroform. The optimal solution for avoiding volatile losses was stored in glass tubes with ground glass stoppers. In cases of unclear death in which involvement of volatile substances is suspected it is, therefore, advisable to preserve an additional blood sample at -20 degrees C in glass tubes that are only opened for the analysis of volatile substances.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号