共查询到20条相似文献,搜索用时 0 毫秒
1.
《Digital Investigation》2014,11(2):102-110
Anti-forensics has developed to prevent digital forensic investigations, thus forensic investigations to prevent anti-forensic behaviors have been studied in various area. In the area of user activity analysis, “IconCache.db” files contain icon cache information related to applications, which can yield meaningful information for digital forensic investigations such as the traces of deleted files. A previous study investigated the general artifacts found in the IconCache.db file. In the present study, further features and structures of the IconCache.db file are described. We also propose methods for analyzing anti-forensic behaviors (e.g., time information related to the deletion of files). Finally, we introduce an analytical tool that was developed based on the file structure of IconCache.db. The tool parses out strings from the IconCache.db to assist an analyst. Therefore, an analyst can more easily analyze the IconCache.db file using the tool. 相似文献
2.
This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs. 相似文献
3.
A. Srivastava 《Computer Law & Security Report》2009,25(5):432-446
Security concerns with regard to the use of electronic signatures in the electronic environment seem to represent a potential barrier to their usage. This paper presents an empirical study that examines businesses' perceived security concerns with the use of the electronic signature technology for executing contracts and commercial transactions and whether such issues represent a disincentive for their usage. The findings of the study reveal that there are significant security concerns in the business community with regard to the use of electronic signatures. However, such perceptions seem to be primarily driven by a lack of awareness and understanding. Advising prospective users of electronic signatures about the kind of safeguards that could be put in place to minimise risks associated with their usage can be a useful step towards overcoming their fears and hesitance. 相似文献
4.
5.
互联网金融是中国近几年出现的一个新领域,其尚在不断的分化组合与发展过程中,因此,暂时不宜由国家直接立法对之实行规制,以控制其间产生的风险和对社会造成的负面冲击。一种可行思路是引导互联网金融企业形成产品的规则、企业的规则标准流程,并提炼出来形成行业标准,最后形成有关社会组织的公约和准则,在这一软法治理的基础上,监管层对软法进行调研,将其转化成为法律。 相似文献
6.
论核心卡特尔中的宽恕制度及我国《反垄断法》对其规制和完善 总被引:1,自引:0,他引:1
核心卡特尔通过相同的定价、一致的行动、固定的份额来获取高额的利润,给竞争带来重大的危害,但是其隐蔽性强,难以为执法机关所侦破.宽恕制度,通过豁免卡特尔协议成员的方式以鼓励其对卡特尔协议的披露,成为西方国家打击卡特尔的重要武器.我国<反垄断法>虽对宽恕制度做了规制,但尚且不足.仍待完善. 相似文献
7.
行政诉讼法律适用类批复、答复中的法律发现,主要集中在法律规范效力冲突与不确定法律概念解释两个方面。最高法院的规律性做法包括对行政机关的尊重、对一般性法理的依赖,以及支持下级法院避免地方干预。这体现了最高法院处理疑难案件时的一种安全裁判观。 相似文献
8.
李昌奎案代表了一类"简单的""难办案件",无论法官如何决策,处理结果都不能取得良好的法律效果和社会效果。该案反映出这是一个法律世界观缺乏整体性和融贯性的时代。民意、司法与政治之间复杂的互动,以及社会对刑事司法系统的不信任,虽非中国特有的问题,但暴露出部分中国司法人员和学者对司法公信力、合法性、稳定性的理解是单维、偏颇的,缺乏健全的司法理念。经由对该案的讨论,本文强调,司法应该弥合而不是加大法律与社会的差距,如果司法要参与社会变革,它必须满足民众对公正的基本心理需求。另一方面,新媒体的兴起,使人们得以在事件流中辨识法律的社会意义,多元的法律世界观有可能获得融贯。 相似文献
9.
随着社会治安形势的发展,基本刑事政策由“惩办与宽大相结合”向“宽严相济”演进,随之具体刑事政策亦将由“严打”向“破小案”演进。考量法律的严肃性和执法的公正性,在刑事执法层面,警察机关应树立起“破小案”的工作理念。 相似文献
10.
详细分析了VMware的虚拟磁盘结构,并针对电子数据取证中的磁盘镜像虚拟加载、虚拟机数据迁移、虚拟磁盘文件的搜索和虚拟磁盘数据的鉴定与恢复等实际问题提出相应的解决方案。 相似文献
11.
12.
血清中盐酸曲马多的膜式固相萃取及GC/MS/SIM测定 总被引:1,自引:0,他引:1
目的建立血清中盐酸曲马多的膜式固相萃取(SPE)气-质联用分析方法。方法1mL血清用2mL0.1mol/L磷酸盐缓冲液(pH6)稀释后,用含有C18和强酸型强阳离子交换基团的SPECC18AR/MP3固相萃取柱萃取,洗脱液为含2%氨水的乙酸乙酯;选择SKF525作为内标物,用GC/MS/SIM定量测定。结果在加标量为0.1、0.2和0.5μg/mL的血清样品中,盐酸曲马多的回收率分别为98.9%、92.5%和84.8%,5次测定的RSD分别为3.2%、8.7%和10.9%;线性范围为0.1~4μg/mL,多项式回归相关系数r2=0.9939;检出限为21ng/mL;同一根萃取柱,连续使用5次,没有出现堵塞和污染,回收率及RSD未见下降。结论本方法适合于法医毒物分析。 相似文献
13.
我国学界流行的商标法保护规则优先于反不正当竞争法规则适用的观点有可能是受德国法的影响。但是,德国法中存在的这个原则有其特殊历史原因和政策考虑,而且,德国联邦最高法院已经在司法实践中认定《反不正当竞争法》相关条款的适用并不与"《商标法》优先适用"相冲突。《商标法》等专门法无法禁止的行为,并不排除依然可以适用《反不正当竞争法》依法予以制止。《商标法》等专门法的适用,也并不排除《反不正当竞争法》的平行适用。 相似文献
14.
Current global climate governance is characterized by increasing institutional proliferation. Within the last 5 years several
non-legally binding initiatives have emerged, including (i) the Asia-Pacific Partnership on Clean Development and Climate
and various other public–private partnerships working on the policy implementation level and (ii) the Group of Eight Gleneagles
Dialogue on Climate Change, Clean Energy and Sustainable Development, and Major Economies Meeting on Energy Security and Climate
Change as high-level political processes. As a first step toward analyzing the relationship between these parallel initiatives
and the UN climate regime, this article looks at the negotiations of four UN-hosted climate meetings in 2007–2008, providing
an examination of the interaction of ‘soft law’ climate initiatives and the ‘hard law’ UNFCCC/Kyoto Protocol process. The
methodology of the study is based on participatory observations in the negotiations and document analysis of country and stakeholder
positions. The analysis shows that the current multitude of processes in global climate governance entails potential institutional
interaction. Deliberations of the key actors give some support to the claims of non-UN soft law being used to exert influence
on the negotiations on a future climate regime within the UN context.
相似文献
Antto VihmaEmail: |
15.
Ming Di Leom B.Sc. Kim‐Kwang Raymond Choo Ph.D. Ray Hunt Ph.D. 《Journal of forensic sciences》2016,61(6):1473-1492
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users—and their businesses—to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. 相似文献
16.
Gerard M. Courtin Ph.D.; Scott I. Fairgrieve Ph.D. 《Journal of forensic sciences》2013,58(5):1300-1305
Establishing correspondence between the upper portion of a white birch sapling, a suspected weapon, and a potential source from a stand of trees was posed to one of us (GMC). A bending force shattered the sapling, precluding physical matching. Three white birch saplings were taken from the same stand of trees in a similar manner. Correspondence was achieved by measuring the width of the annual rings along four radii from a disk cut above and below the break. The regression coefficient of the data from the two disks from the same sapling was r2 = 0.95. Regressing the upper disk against the lower disk of two other saplings resulted in r2 values of 0.26 and 0.17, respectively. The various characteristics that are confined to a wood stem as part of its normal process of growth can be used to eliminate candidate saplings and establish correspondence between two pieces of wood. 相似文献
17.
Ian Turner 《Liverpool Law Review》2008,29(3):309-333
The definition of the irrationality ground of judicial review recognises the constitutional principle of the separation of
powers, in allowing for judicial control of the executive only very rarely. The author in a previous article in this study
found that the courts, on occasions, had intervened in circumstances where administrative decisions arguably were not irrational.
To this end, the purpose of this article is to assess the constitutionality of these seemingly low standards of irrationality.
The author does so by reference either to the manner of review employed—the use of the proportionality principle, for example—or
the context of the administrative decision under scrutiny, such as the infringement of the applicant’s fundamental rights.
The author finds that the cases from the previous article where low standards of irrationality were arguably adopted were,
in fact, legitimate according to these chosen methods of evaluation. However, this is an interim conclusion because, for reasons
of word length, the author is unable to complete a full assessment here. It is therefore proposed that a subsequent article
will continue to examine the constitutionality of these cases. Furthermore, the author will also try and establish a zone
of executive decision-making, for reasons of democracy, where the courts are excluded from irrationality review. If the author
is unsuccessful in this regard, the final conclusion of this study will inevitably be that low standards of judicial intervention
exist without limit—a clear assault on the constitutional principle stated above.
相似文献
Ian TurnerEmail: |
18.
Sthaneshwar Timalsina 《Journal of Indian Philosophy》2009,37(4):367-382
The concept of avidyā is one of the central categories in the Advaita of Śaṇkara and Maṇḍana. Shifting the focus from māyā, interpreted either as illusion or as the divine power, this concept brings ignorance to the forefront in describing duality
and bondage. Although all Advaitins accept avidyā as a category, its scope and nature is interpreted in multiple ways. Key elements in Maṇḍana’s philosophy include the plurality
of avidyā, individual selves as its substrate and the Brahman as its field (viṣaya), and the distinction in avidyā between non-apprehension and misapprehension. A closer investigation shows that Maṇḍana is directly influenced by Bhartṛhari’s
linguistic non-dualism in developing the concept of avidyā. This study also compares other key constituents such as
vivartta and pariṇāma that are relevant to the analysis of avidyā. As the concept of counter-image (pratibimba) emerges as a distinct stream of Advaita subsequent to Maṇḍana, this study also compares the application of pratibimba in the writings of Bhartṛhari and Maṇḍana. 相似文献
19.
《Science & justice》2022,62(6):785-794
This paper considers whether the adoption of a subject-specific, classroom-based, voluntary extra-curricular student mentoring scheme could provide an effective mechanism and andragogic approach to enhance higher education students’ employability potential pre-graduation.Over the three-year pilot, 26 more advanced (second to fourth year) undergraduate students actively mentored nearly 400 first year undergraduate students during workshops delivered annually within forensic and policing focused courses. In total, 17 mentors anonymously completed online, post-scheme surveys. Survey data was quantitatively analysed to evaluate the scheme, establish which skills and attributes mentors had developed and investigate whether mentors could appropriately identify example skills within professional terminology used during employer recruitment. In addition, this paper reflects on the implementation of remote student mentoring during the COVID-19 pandemic and its adoption within a blended learning framework.The results from this research strongly support mentoring as an effective mechanism to develop undergraduate employability skills, significantly developing mentors’ self-confidence and self-efficacy in their interpersonal and communication skills. Although mentors were aware of university graduate attributes and thought they could evidence these with appropriate examples, in practice this was not necessarily the case. As a result, a framework is proposed to enable mentors to identify their skills and how they may align with competencies sought by relevant forensic and policing employers. However, other andragogic practices may need to be implemented to maximise the potential for successful graduate employment. 相似文献
20.
David Mellins 《Journal of Indian Philosophy》2007,35(3):227-251
In his twelfth century alaṃkāraśāstra, the Candrāloka, Jayadeva Pīyūṣavarṣa reverses the sequence of topics found in Mammaṭa’s Kāvyapr-akāśa, an earlier and immensely popular work. With such a structural revisionism, Jayadeva asserts the autonomy of his own work
and puts forth an ambitious critique of earlier approaches to literary analysis. Jayadeva investigates the technical and aesthetic
components of poetry in the first part of the Candrāloka, prior to his formal semantic investigations in the latter half of the text, thus suggesting that aesthetic evaluations of
poetry beneficially inform scientific investigations of language. Jayadeva’s organization of his chapters on the semantic
operations, moreover, intimates that the study of suggestive and metaphoric functions of language clarifies our understanding
of denotation, which is conventionally understood to be the primary and direct path of verbal designation. 相似文献