排序方式: 共有38条查询结果,搜索用时 62 毫秒
31.
This study examines the Internet neutrality issue in Korea by analyzing the debates among the stakeholders. It addresses the dynamic discussions of the issues by identifying how diverse groups of stakeholders are affected by various actions taken by the emergence of Internet neutrality. It presents a statistical analysis that reveals the factors implicated in the Internet neutrality debate and significant differences among individuals on opposing sides in the debate. The findings reveal insights into the connection between specific factors and positions in the Internet neutrality debate. The findings show that the issue of Internet neutrality is complex and as multifaceted as the parties' diverse interests. It concludes by proposing an effective model to govern Internet neutrality in Korea, based on the typology proposed by Strover. 相似文献
32.
Brett Eterovic‐Soric M.S. Kim‐Kwang Raymond Choo Ph.D. Sameera Mubarak Ph.D. Helen Ashman Ph.D. 《Journal of forensic sciences》2017,62(4):1054-1070
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up‐to‐date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up‐to‐date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence. 相似文献
33.
JEAN‐LOUIS BRUGUIÈRE 《新观察季刊》2010,27(2):44-47
Though anti‐American terrorism springs these days as much from Yemen and the “virtual ummah” as from Afghanistan, President Obama has nontheless further committed US troops to stabilizing a country well‐known as the graveyard of empires. What can the only Muslim country that belongs to NATO offer by way of advice? How best can the US keep its focus on the terrorist threat despite its diversion in Afghanistan? Turkey's former envoy to Afghanistan and two of Europe's leading experts on Islamist terrorism offer their views. 相似文献
34.
35.
36.
37.
Christopher Hooper Ben Martini Kim-Kwang Raymond Choo 《Computer Law & Security Report》2013,29(2):152-163
The advent of cloud computing has led to a dispersal of user data across international borders. More than ever before, law enforcement investigations into cybercrime and online criminal activity require cooperation between agencies from multiple countries. This paper examines recent changes to the law in Australia in relation to the power of law enforcement agencies to effectively investigate cybercrime insofar as individuals and organisations make use of cloud infrastructure in connection with criminal activity. It concludes that effective law enforcement operations in this area require harmonious laws across jurisdictions and streamlines procedures for granting assistance between law enforcement agencies. In conjunction with these mechanical developments, this paper posits that law enforcement officers require a systematised understanding of cloud infrastructure and its operation in order to effectively make use of their powers. 相似文献
38.
Given the relatively new phenomenon of online child exploitation – an important area of criminological and policy concern – it is difficult to obtain long term trend data on reported convictions. Existing legislative and prosecution-based approaches, while important, are unlikely to be adequate. This analysis of the legislative and prosecution-based responses in five Commonwealth countries (Australia, Canada, New Zealand, South Africa and United Kingdom), highlights the need for clear national and international definitions as the lack of consistency in the international legislative environment creates opportunities for sexual exploitation of children. To provide a multi-faceted and non-prosecutorial approach to address online child exploitation including the commercial exploitation of children, this paper identifies five potential research questions. 相似文献