首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
《Digital Investigation》2014,11(2):102-110
Anti-forensics has developed to prevent digital forensic investigations, thus forensic investigations to prevent anti-forensic behaviors have been studied in various area. In the area of user activity analysis, “IconCache.db” files contain icon cache information related to applications, which can yield meaningful information for digital forensic investigations such as the traces of deleted files. A previous study investigated the general artifacts found in the IconCache.db file. In the present study, further features and structures of the IconCache.db file are described. We also propose methods for analyzing anti-forensic behaviors (e.g., time information related to the deletion of files). Finally, we introduce an analytical tool that was developed based on the file structure of IconCache.db. The tool parses out strings from the IconCache.db to assist an analyst. Therefore, an analyst can more easily analyze the IconCache.db file using the tool.  相似文献   

2.
This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs.  相似文献   

3.
Security concerns with regard to the use of electronic signatures in the electronic environment seem to represent a potential barrier to their usage. This paper presents an empirical study that examines businesses' perceived security concerns with the use of the electronic signature technology for executing contracts and commercial transactions and whether such issues represent a disincentive for their usage. The findings of the study reveal that there are significant security concerns in the business community with regard to the use of electronic signatures. However, such perceptions seem to be primarily driven by a lack of awareness and understanding. Advising prospective users of electronic signatures about the kind of safeguards that could be put in place to minimise risks associated with their usage can be a useful step towards overcoming their fears and hesitance.  相似文献   

4.
用PCR技术分析硬组织中DIS80位点基因型及其DNA含量。当DNA部分降解时.此法仍然可行。证实了在同一个体,骨-血液及牙齿-血液DIS80位点的AmP-FLP的一致性。可应用于微量硬组织个人识别及骨化遗骸身源鉴定。  相似文献   

5.
黄震 《科技与法律》2014,(3):407-415
互联网金融是中国近几年出现的一个新领域,其尚在不断的分化组合与发展过程中,因此,暂时不宜由国家直接立法对之实行规制,以控制其间产生的风险和对社会造成的负面冲击。一种可行思路是引导互联网金融企业形成产品的规则、企业的规则标准流程,并提炼出来形成行业标准,最后形成有关社会组织的公约和准则,在这一软法治理的基础上,监管层对软法进行调研,将其转化成为法律。  相似文献   

6.
王燕 《行政与法》2009,(7):103-106
核心卡特尔通过相同的定价、一致的行动、固定的份额来获取高额的利润,给竞争带来重大的危害,但是其隐蔽性强,难以为执法机关所侦破.宽恕制度,通过豁免卡特尔协议成员的方式以鼓励其对卡特尔协议的披露,成为西方国家打击卡特尔的重要武器.我国<反垄断法>虽对宽恕制度做了规制,但尚且不足.仍待完善.  相似文献   

7.
行政诉讼法律适用类批复、答复中的法律发现,主要集中在法律规范效力冲突与不确定法律概念解释两个方面。最高法院的规律性做法包括对行政机关的尊重、对一般性法理的依赖,以及支持下级法院避免地方干预。这体现了最高法院处理疑难案件时的一种安全裁判观。  相似文献   

8.
王启梁 《法学家》2012,(3):1-17,175
李昌奎案代表了一类"简单的""难办案件",无论法官如何决策,处理结果都不能取得良好的法律效果和社会效果。该案反映出这是一个法律世界观缺乏整体性和融贯性的时代。民意、司法与政治之间复杂的互动,以及社会对刑事司法系统的不信任,虽非中国特有的问题,但暴露出部分中国司法人员和学者对司法公信力、合法性、稳定性的理解是单维、偏颇的,缺乏健全的司法理念。经由对该案的讨论,本文强调,司法应该弥合而不是加大法律与社会的差距,如果司法要参与社会变革,它必须满足民众对公正的基本心理需求。另一方面,新媒体的兴起,使人们得以在事件流中辨识法律的社会意义,多元的法律世界观有可能获得融贯。  相似文献   

9.
李鹏展 《犯罪研究》2009,(6):31-38,69
随着社会治安形势的发展,基本刑事政策由“惩办与宽大相结合”向“宽严相济”演进,随之具体刑事政策亦将由“严打”向“破小案”演进。考量法律的严肃性和执法的公正性,在刑事执法层面,警察机关应树立起“破小案”的工作理念。  相似文献   

10.
详细分析了VMware的虚拟磁盘结构,并针对电子数据取证中的磁盘镜像虚拟加载、虚拟机数据迁移、虚拟磁盘文件的搜索和虚拟磁盘数据的鉴定与恢复等实际问题提出相应的解决方案。  相似文献   

11.
利用单片机设计IDE-USB只读硬盘接口   总被引:1,自引:0,他引:1  
目的在对IDE接口硬盘中的电子数据进行检验时保证其被写保护。方法利用单片机芯片、相关电路和固化程序拦截对硬盘的写指令。结果将一块IDE硬盘通过此接口连接到PC机实验表明,在对其进行写操作时已被写保护。结论利用单片机可以实现IDE硬盘的写保护。  相似文献   

12.
血清中盐酸曲马多的膜式固相萃取及GC/MS/SIM测定   总被引:1,自引:0,他引:1  
Zhu BL  Zhang L  Zhang SY 《法医学杂志》2006,22(6):428-430
目的建立血清中盐酸曲马多的膜式固相萃取(SPE)气-质联用分析方法。方法1mL血清用2mL0.1mol/L磷酸盐缓冲液(pH6)稀释后,用含有C18和强酸型强阳离子交换基团的SPECC18AR/MP3固相萃取柱萃取,洗脱液为含2%氨水的乙酸乙酯;选择SKF525作为内标物,用GC/MS/SIM定量测定。结果在加标量为0.1、0.2和0.5μg/mL的血清样品中,盐酸曲马多的回收率分别为98.9%、92.5%和84.8%,5次测定的RSD分别为3.2%、8.7%和10.9%;线性范围为0.1~4μg/mL,多项式回归相关系数r2=0.9939;检出限为21ng/mL;同一根萃取柱,连续使用5次,没有出现堵塞和污染,回收率及RSD未见下降。结论本方法适合于法医毒物分析。  相似文献   

13.
我国学界流行的商标法保护规则优先于反不正当竞争法规则适用的观点有可能是受德国法的影响。但是,德国法中存在的这个原则有其特殊历史原因和政策考虑,而且,德国联邦最高法院已经在司法实践中认定《反不正当竞争法》相关条款的适用并不与"《商标法》优先适用"相冲突。《商标法》等专门法无法禁止的行为,并不排除依然可以适用《反不正当竞争法》依法予以制止。《商标法》等专门法的适用,也并不排除《反不正当竞争法》的平行适用。  相似文献   

14.
Current global climate governance is characterized by increasing institutional proliferation. Within the last 5 years several non-legally binding initiatives have emerged, including (i) the Asia-Pacific Partnership on Clean Development and Climate and various other public–private partnerships working on the policy implementation level and (ii) the Group of Eight Gleneagles Dialogue on Climate Change, Clean Energy and Sustainable Development, and Major Economies Meeting on Energy Security and Climate Change as high-level political processes. As a first step toward analyzing the relationship between these parallel initiatives and the UN climate regime, this article looks at the negotiations of four UN-hosted climate meetings in 2007–2008, providing an examination of the interaction of ‘soft law’ climate initiatives and the ‘hard law’ UNFCCC/Kyoto Protocol process. The methodology of the study is based on participatory observations in the negotiations and document analysis of country and stakeholder positions. The analysis shows that the current multitude of processes in global climate governance entails potential institutional interaction. Deliberations of the key actors give some support to the claims of non-UN soft law being used to exert influence on the negotiations on a future climate regime within the UN context.
Antto VihmaEmail:
  相似文献   

15.
    
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users—and their businesses—to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research.  相似文献   

16.
Establishing correspondence between the upper portion of a white birch sapling, a suspected weapon, and a potential source from a stand of trees was posed to one of us (GMC). A bending force shattered the sapling, precluding physical matching. Three white birch saplings were taken from the same stand of trees in a similar manner. Correspondence was achieved by measuring the width of the annual rings along four radii from a disk cut above and below the break. The regression coefficient of the data from the two disks from the same sapling was r2 = 0.95. Regressing the upper disk against the lower disk of two other saplings resulted in r2 values of 0.26 and 0.17, respectively. The various characteristics that are confined to a wood stem as part of its normal process of growth can be used to eliminate candidate saplings and establish correspondence between two pieces of wood.  相似文献   

17.
The definition of the irrationality ground of judicial review recognises the constitutional principle of the separation of powers, in allowing for judicial control of the executive only very rarely. The author in a previous article in this study found that the courts, on occasions, had intervened in circumstances where administrative decisions arguably were not irrational. To this end, the purpose of this article is to assess the constitutionality of these seemingly low standards of irrationality. The author does so by reference either to the manner of review employed—the use of the proportionality principle, for example—or the context of the administrative decision under scrutiny, such as the infringement of the applicant’s fundamental rights. The author finds that the cases from the previous article where low standards of irrationality were arguably adopted were, in fact, legitimate according to these chosen methods of evaluation. However, this is an interim conclusion because, for reasons of word length, the author is unable to complete a full assessment here. It is therefore proposed that a subsequent article will continue to examine the constitutionality of these cases. Furthermore, the author will also try and establish a zone of executive decision-making, for reasons of democracy, where the courts are excluded from irrationality review. If the author is unsuccessful in this regard, the final conclusion of this study will inevitably be that low standards of judicial intervention exist without limit—a clear assault on the constitutional principle stated above.
Ian TurnerEmail:
  相似文献   

18.
The concept of avidyā is one of the central categories in the Advaita of Śaṇkara and Maṇḍana. Shifting the focus from māyā, interpreted either as illusion or as the divine power, this concept brings ignorance to the forefront in describing duality and bondage. Although all Advaitins accept avidyā as a category, its scope and nature is interpreted in multiple ways. Key elements in Maṇḍana’s philosophy include the plurality of avidyā, individual selves as its substrate and the Brahman as its field (viṣaya), and the distinction in avidyā between non-apprehension and misapprehension. A closer investigation shows that Maṇḍana is directly influenced by Bhartṛhari’s linguistic non-dualism in developing the concept of avidyā. This study also compares other key constituents such as vivartta and pariṇāma that are relevant to the analysis of avidyā. As the concept of counter-image (pratibimba) emerges as a distinct stream of Advaita subsequent to Maṇḍana, this study also compares the application of pratibimba in the writings of Bhartṛhari and Maṇḍana.  相似文献   

19.
《Science & justice》2022,62(6):785-794
This paper considers whether the adoption of a subject-specific, classroom-based, voluntary extra-curricular student mentoring scheme could provide an effective mechanism and andragogic approach to enhance higher education students’ employability potential pre-graduation.Over the three-year pilot, 26 more advanced (second to fourth year) undergraduate students actively mentored nearly 400 first year undergraduate students during workshops delivered annually within forensic and policing focused courses. In total, 17 mentors anonymously completed online, post-scheme surveys. Survey data was quantitatively analysed to evaluate the scheme, establish which skills and attributes mentors had developed and investigate whether mentors could appropriately identify example skills within professional terminology used during employer recruitment. In addition, this paper reflects on the implementation of remote student mentoring during the COVID-19 pandemic and its adoption within a blended learning framework.The results from this research strongly support mentoring as an effective mechanism to develop undergraduate employability skills, significantly developing mentors’ self-confidence and self-efficacy in their interpersonal and communication skills. Although mentors were aware of university graduate attributes and thought they could evidence these with appropriate examples, in practice this was not necessarily the case. As a result, a framework is proposed to enable mentors to identify their skills and how they may align with competencies sought by relevant forensic and policing employers. However, other andragogic practices may need to be implemented to maximise the potential for successful graduate employment.  相似文献   

20.
In his twelfth century alaṃkāraśāstra, the Candrāloka, Jayadeva Pīyūṣavarṣa reverses the sequence of topics found in Mammaṭa’s Kāvyapr-akāśa, an earlier and immensely popular work. With such a structural revisionism, Jayadeva asserts the autonomy of his own work and puts forth an ambitious critique of earlier approaches to literary analysis. Jayadeva investigates the technical and aesthetic components of poetry in the first part of the Candrāloka, prior to his formal semantic investigations in the latter half of the text, thus suggesting that aesthetic evaluations of poetry beneficially inform scientific investigations of language. Jayadeva’s organization of his chapters on the semantic operations, moreover, intimates that the study of suggestive and metaphoric functions of language clarifies our understanding of denotation, which is conventionally understood to be the primary and direct path of verbal designation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号