首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 704 毫秒
1.
《Science & justice》2023,63(3):349-363
This paper reports on coastal exhumations performed during 2006–2022, under the framework of the Committee on Missing Persons in Cyprus (CMP) humanitarian identification programme. CMP archaeologists investigated 217 coastal locations and recovered skeletal remains on 44 occasions. Challenging environmental conditions required a customized exhumation plan, which could be executed swiftly without compromising operational integrity or standards. The author performed a retrospective analysis to propose an optimized strategy, which includes a survey, exhumation, digital documentation, and post-processing components, with the aim of minimizing the effects of adverse environmental conditions. The proposed strategy is based on scientific standards and observations in the field; it can satisfy the needs of a humanitarian or criminal investigation if appropriate measures are taken to uphold legislative and forensic standards. The author also discussed the taphonomic effects of coastal erosion and wave activity in tandem with exhumation recommendations to assist forensic practitioners involved in similar investigations.  相似文献   

2.
3.
Pushed by the transition towards the knowledge economy, as well as several other change drivers, an ever-increasing number of knowledge intensive ventures are relying on operational knowledge intensity in order to generate value. Through their interaction with their varied stakeholders—from actors within their supply chains to educational and financial institutions—knowledge intensive enterprises are increasingly becoming a key component of regional economic stability. Within their complex environment, these organisations lack the support of suitable frameworks to inform their efforts to optimise, adapt and improve their underlying business processes in order to maximise the efficiency of their performance and pursue growth ambitions. This paper examines the distinct nature of knowledge intensive entrepreneurial ventures (KIEs) and the applicability of current business process improvement (BPI) frameworks to their setting. Finally, a KIE-oriented business process improvement framework is developed through an integrative adaptation of the concepts of knowledge intensity and knowledge management to the principles of business process redesign and re-engineering reported in existing literature. The proposed framework contributes to the existing literature in the subject of BPI modelling for knowledge intensive entrepreneurial ventures by addressing a distinct set of improvement concerns that this type of organisations face at a process level.  相似文献   

4.
In this paper, I introduce the Forensic Field Map (FFM) that provides a two-dimensional view on the forensic field. This field is by definition very broad, encompassing a wide range of scientific areas and activities. The forensic work that supports solving criminal cases ranges from recognizing and preserving traces at crime scenes to explaining forensic results as expert witness in court. This goes hand in hand with the development of scientifically based methods and tooling as well as legal, forensic and laboratory procedures. Although the FFM came into being while developing a (visual) framework for digital forensic investigations, the framework turned out to be generically applicable to other forensic disciplines.  相似文献   

5.
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics.  相似文献   

6.
This paper questions the current approach to forensic incident response and network investigations. Although claiming to be ‘forensic’ in nature it shows that the basic processes and mechanisms used in traditional computer forensics are rarely applied in the live incident investigation arena. This paper demonstrates how the newly proposed Digital Evidence Bag (DEB) storage format can be applied to a dynamic environment. A DEB is a universal container for digital evidence from any source. It allows the provenance to be recorded and continuity to be maintained throughout the life of the investigation. With a small amount of forethought a forensically rigorous approach can be applied to incident response, network investigations and system administration with minimal overhead.  相似文献   

7.
Trust has been defined in many ways, but at its core it involves acting without the knowledge needed to act. Trust in records depends on four types of knowledge about the creator or custodian of the records: reputation, past performance, competence, and the assurance of confidence in future performance. For over half a century society has been developing and adopting new computer technologies for business and communications in both the public and private realm. Frameworks for establishing trust have developed as technology has progressed. Today, individuals and organizations are increasingly saving and accessing records in cloud computing infrastructures, where we cannot assess our trust in records solely on the four types of knowledge used in the past. Drawing on research conducted at the University of British Columbia into the nature of digital records and their trustworthiness, this article presents the conceptual archival and digital forensic frameworks of trust in records and data, and explores the common law legal framework within which questions of trust in documentary evidence are being tested. Issues and challenges specific to cloud computing are introduced.  相似文献   

8.
In December 2022 the European Commission, the European Parliament and the Council of the European Union jointly signed the European Declaration on Digital Rights and Principles, a document aiming to steer the EU digital agenda upon EU constitutional values and fundamental rights. Digital constitutionalism scholars regard the Declaration as a positive step forward within the process of constitutionalization of the digital environment in Europe. The Declaration includes both traditional rights enshrined in the EU Charter of Fundamental Rights and digital principles. Some of these principles have progressively underpinned the EU digital policy framework while others have been expanded in the Declaration or are of completely new formulation. In this contribution, we assess the Declaration's value in terms of relevance and novelty within the landscape of protection of online needs and interests in the EU. By assessing the Declaration's normative approach and using Lawrence Lessig's distinction between codifying and transformative constitutional regimes, we evaluate the Declaration's progressive and transformative character under a constitutional perspective.  相似文献   

9.
Digital image evidence is now widely available from criminal investigations and surveillance operations, often captured by security and surveillance CCTV. This has resulted in a growing demand from law enforcement agencies for automatic person-recognition based on image data. In forensic science, a fundamental requirement for such automatic face recognition is to evaluate the weight that can justifiably be attached to this recognition evidence in a scientific framework. This paper describes a pilot study carried out by the Forensic Science Service (UK) which explores the use of digital facial images in forensic investigation. For the purpose of the experiment a specific software package was chosen (Image Metrics Optasia). The paper does not describe the techniques used by the software to reach its decision of probabilistic matches to facial images, but accepts the output of the software as though it were a 'black box'. In this way, the paper lays a foundation for how face recognition systems can be compared in a forensic framework. The aim of the paper is to explore how reliably and under what conditions digital facial images can be presented in evidence.  相似文献   

10.
Contemporary criminal investigation assisted by computing technology imposes challenges to the right to a fair trial and the scientific validity of digital evidence. This paper identifies three categories of unaddressed threats to fairness and the presumption of innocence during investigations – (i) the inappropriate and inconsistent use of technology; (ii) old procedural guarantees, which are not adapted to contemporary digital evidence processes and services; (iii) and the lack of reliability testing in digital forensics practice. Further, the solutions that have been suggested to overcome these issues are critically reviewed to identify their shortcomings. Ultimately, the paper argues for the need of legislative intervention and enforcement of standards and validation procedures for digital evidence in order to protect innocent suspects and all parties in the criminal proceedings from the negative consequences of technology-assisted investigations.  相似文献   

11.
We used a decision-making conceptual framework from family resource management combined with procedural justice frameworks from social psychology to (i) articulate the elements and rules of procedural fairness, (ii) develop a theoretical organization and code to include procedural fairness principles as applied to legal decision processes in divorce, and (iii) describe the perceptions of divorcing parties about the violations of procedural fairness principles in their own divorce process. Procedural fairness principles included accuracy, consistency, ethicality, bias suppression, correctability, and representativeness. Results of qualitative data analyses were consistent with experimental studies in that divorced people were concerned with fair procedures and particularly with violations of the principles of ethicality, consistency, accuracy, and representativeness.  相似文献   

12.
Event reconstruction is an important phase in digital forensic investigation, which determines what happened during the incident. The digital investigator uses the findings of this phase to prepare reports for the court. Since the results must be reproducible and verifiable, it is necessary that the event reconstruction methods be rigorous and strict. In order to fulfill the legal requirements, this study proposes an event reconstruction framework which is based on the formal mathematical methods. In particular, it uses the temporal logic model checking that is an automatic verification technique. The idea is that the system under investigation is modeled as a transition system. Then the digital forensic property is specified using the modal μ-calculus. Finally, a model checking algorithm verifies whether the transition system meets the property. In order to demonstrate the proposed formal event reconstruction framework, an abstract model of the FAT file system is presented and some digital forensic properties are formulated. A big problem in model checking is the so-called state space explosion. This study addresses this problem and suggests some solutions to it. Finally, the proposed framework is applied to a case study to demonstrate how some hypotheses can be proved or refuted.  相似文献   

13.
With a reliance on the various forms of forensic science evidence in complex criminal investigations, the measures for ensuring its quality are facing increasing scrutiny. Improvements to quality management systems, to ensure both the robust application of scientific principles and the accurate interpretation and reporting of results, have arisen as a consequence of high-profile rebuttals of forensic science evidence, combined with process improvements driven by evaluation of current practice. These improvements are crucial to ensure validity of results as well as providing assurance for all those involved in the Criminal Justice System. This work first examines the quality management systems utilised for the examination and analysis of fingerprint, body fluid and DNA evidence. It then proceeds to highlight an apparent lack of comparable quality assurance mechanisms within the field of digital forensics, one of the newest branches of forensic science. Proposals are provided for the improvement of quality assurance for the digital forensics arena, drawing on the experiences of, and more well-established practices within, other forensic disciplines.  相似文献   

14.
通过对交通事故鉴定现状和多个案例的分析.讨论交通事故鉴定和事故勘查在事故分析中的作用,以及交通事故鉴定部门和事故勘查部门在具体案例中协作的关联性,认为在交通事故发生后,交通事故勘查部门和鉴定部门应各司其职,在证据的发现、收集及补全上相互协作。才能科学地做出交通事故鉴定,保证事故成因分析的客观性,公正性。  相似文献   

15.
In the early 1990s, unmanned aerial vehicles (UAV) were used exclusively in military applications by various developed countries. Now with its ease of availability and affordability in the electronic device market, this aerial vehicular technology has augmented its familiarity in public and has expanded its usage to countries all over the world. However, expanded use of UAVs, colloquially known as drones, is raising understandable security concerns. With the increasing possibility of drones' misuse and their abilities to get close to critical targets, drones are prone to potentially committing crimes and, therefore, investigation of such activities is a much-needed facet. This motivated us to devise a comprehensive drone forensic framework that includes hardware/physical and digital forensics, proficient enough for the post-flight investigation of drone's activity. For hardware/physical forensics, we propose a model for investigating drone components at the crime scene. Additionally, we propose a robust digital drone forensic application with a primary focus on analyzing the essential log parameters of drones through a graphical user interface (GUI) developed using JavaFX 8.0. This application interface would allow users to extract and examine onboard flight information. It also includes a file converter created for easy and effective 3D flight trajectory visualization. We used two popular drones for conducting this research; namely, DJI Phantom 4 and Yuneec Typhoon H. The interface also provides a visual representation of the sensor recordings from which pieces of evidence could be acquired. Our research is intended to offer the forensic science community a powerful approach for investigating drone-related crimes effectively.  相似文献   

16.
Situating events and traces in time is an essential problem in investigations. To date, among the typical questions issued in forensic science, time has generally been unexplored. The reason for this can be traced to the complexity of the overall problem, addressed by several scientists in very limited projects usually stimulated by a specific case. Considering that such issues are recurrent and transcending the treatment of each trace separately, the formalisation of a framework to address dating issues in criminal investigation is undeniably needed. Through an iterative process consisting of extracting recurrent aspects discovered from the study of problems encountered by practitioners and reported in the literature, common mechanisms were extracted and provide understanding of underlying factors encountered in forensic practise. Three complementary approaches are thus highlighted and described to formalise a preliminary framework that can be applied for the dating of traces, objects, persons and indirectly events.  相似文献   

17.
张虎  毛立新 《政法学刊》2007,24(2):28-32
侦查法治是程序之治、规则之治,更是“良法”之治。科学、合理的程序规则,在形式上应具备以下特征:规则清晰、明确,规则无内在矛盾,规则可循,规则逻辑结构完备,规则体系完整等。以“良法”之标准审视我国现行侦查程序规则,其明确性、协调性、完备性、可循性等均存有缺陷。为推进侦查法治化,亟需对这些缺陷加以改进和完善。  相似文献   

18.
协调性是竞争法律体系的根本属性,对于衡量竞争立法的科学性和竞争执法的有效性具有重要价值。研究竞争法律体系的协调性,可以有效防止和化解竞争法律冲突。竞争法律体系的协调性是由竞争法律调整目标的协调性、竞争法律原则的协调性、调整对象的协调性、法律责任的协调性以及执法体制的协调性所构成的。从应然角度分析,中国竞争法律体系协调化应当具备形式、内容和价值三个要件。  相似文献   

19.
Following the enactment of the Police and Crime Act 2017, subsequent amendments to the Police and Criminal Evidence Act 1984 have seen a ‘cap’ placed on the length of time a suspect can be released on bail; a process commonly referred to as ‘police bail’ or ‘pre-charge bail’. Whilst designed to instil consistency and certainty into bail processes to prevent individuals being subject to lengthy periods of regulation and uncertainty, it places additional pressures on forensic services. With a focus on digital forensics, examination of digital media is a complex and time-consuming process, with existing backlogs well documented. The need for timely completion of investigations to adhere to pre-charge bail rules places additional stress on an already stretched service. This comment submission provides an initial analysis of new pre-charge bail regulations, assessing their impact on digital forensic services.  相似文献   

20.
Android智能手机的取证   总被引:3,自引:0,他引:3  
作为一种新兴的智能手机,Android手机发展势头极为迅猛,并越来越多的受到人们的关注。通过对Android智能手机的取证研究,在介绍了Android手机的基本工作原理后,详细描述了取证方式。通过Android SDK工具对手机内外置存储进行镜像备份,逻辑分析利用文件系统分析,查找每个应用程序自带的数据库文件来获得有价值信息,物理分析通过对内存镜像进行数据恢复以寻找删除的文件,两者互相结合。结果表明,能够从Android手机中有效寻找到潜在证据。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号