首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到2条相似文献,搜索用时 0 毫秒
1.
This paper discusses the use of communication technology to commit crimes, including crime facts and crime techniques. The analysis focuses on the security of voice over Internet protocol (VoIP), a prevention method against VoIP call attack and the attention points for setting up an Internet phone. The importance of digital evidence and digital forensics are emphasised. This paper provides the VoIP digital evidence forensics standard operating procedures (DEFSOP) to help police organisations and establishes an experimental platform to simulate phone calls, hacker attacks and forensic data. Finally, this paper provides a general discussion of a digital evidence strategy that includes VoIP for crime investigators who are interested in digital evidence forensics.  相似文献   

2.
This essay and review on criminal network analysis provides an introduction to the special issue “Human Capital and Social Capital in Criminal Networks”. It traces the history of the application of network analysis in the study of organized crime since the early 1970s. It argues that while criminal network analysis has brought a new level of methodological rigor to the study of organized crime, a number of limitations have become apparent. These include the problem of missing data and the challenges encountered in adequately capturing latent structures, individual characteristics of network members and socio-ecological conditions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号