排序方式: 共有90条查询结果,搜索用时 15 毫秒
1.
2.
Andrew JointAuthor Vitae Edwin Baker Author Vitae 《Computer Law & Security Report》2011,27(4):407-415
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements. 相似文献
3.
血中碳氧血红蛋白饱和度测定影响因素的研究 总被引:1,自引:0,他引:1
目的 考察血中碳氧血红蛋白饱和度(HbCO%)测定的影响因素,为其结果评定和所需样品保存条件提供实验依据。方法 利用三种分光光度法,测定30d内不同条件下保存的CO阳性血的HbCO%的变化。结果 还原双波长法、双波长法测定结果比较稳定,单波长法抗干扰能力较差;尸检所取血样的保存条件包括温度、保存时间及与空气接触程度对HbCO%的测定均有影响,其中温度影响较为显著。结论 利用还原双波长法与双波长法,并结合光谱扫描观察峰形变化可得到比较可靠的结果。30d内4℃条件下,密闭容器中血样接触少量空气不影响其HbCO%的测定。 相似文献
4.
This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions. 相似文献
5.
Furkan Paligu M.Sc. Avinash Kumar M.Sc. Hyuk Cho Ph.D. Cihan Varol Ph.D. 《Journal of forensic sciences》2019,64(5):1370-1378
As the Internet and World Wide Web have rapidly evolved and revolutionized the applications in everyday life, it is a demanding challenge for investigators to keep up with the emerging technologies for forensic analyses. Investigating web browser usages for criminal activities, also known as web browser forensics, is a significant part of digital forensics as crucial browsing information of the suspect can be discovered. Particularly, in this study, an emerging web storage technology, called IndexedDB, is examined. Characteristics of IndexedDB technology in five major web browsers under three major operating systems are scrutinized. Also, top 15 US websites ranked by Alexa are investigated for their data storage in IndexedDB. User screen names, ids, and records of conversations, permissions, and image locations are some of the data found in IndexedDB. Furthermore, BrowStEx, a proof‐of‐concept tool previously developed, is extended and cultivated into BrowStExPlus, with which aggregating IndexedDB artifacts is demonstrated. 相似文献
6.
Feasibility of Canine Detection of Mass Storage Devices: A Study of Volatile Organic Compounds Emanating from Electronic Devices Using Solid Phase Microextraction 下载免费PDF全文
Lauryn E. DeGreeff Ph.D. Michelle Cerreta Ph.D. Mark Rispoli J.D. 《Journal of forensic sciences》2017,62(6):1613-1616
Detection of canines are well‐known to be valuable in the location of contraband, such as explosives or narcotics. More recently, canines have been trained and utilized in the detection of concealed mass storage devices that might contain evidence of illegal activity such as child pornography. To lay the analytical foundation for this detection work, research was carried out to determine the volatile organic compounds associated with mass storage devices (MSD) that could be used by trained canines for detection. Headspace analysis of a variety of electronic devices was performed using solid phase microextraction (SPME) with gas chromatography/mass spectrometry (GC/MS). Analyses found several volatile compounds common to SIM and SD cards, as well as USB drives, including 2‐propenenitrile, styrene, isophorone, hydroxycyclohexyl phenyl ketone, and 2‐furanmethanol, tetrahydro. Results indicated that mass storage devices do have a characteristic odor profile making detection with minimal false alerts feasible for trained canines. 相似文献
7.
Violence,Guns, and Suicide in New Orleans: Results from a Qualitative Study of Recent Suicide Decedents 下载免费PDF全文
Rajeev Ramchand Ph.D. Enchanté Franklin M.S.W. M.A. Elizabeth Thornton M.A. Sarah M. Deland M.D. Jeffrey C. Rouse M.D. 《Journal of forensic sciences》2018,63(5):1444-1449
Many Americans own guns to protect themselves against other people, but there is evidence that both victimization and gun access increase suicide risk. We conducted qualitative interviews with informants of 17 suicide cases in New Orleans of the 60 who died between January 2015 and April 2016 to understand the relationship between past trauma, gun access and storage, and suicide. Nine cases had experienced a past trauma, including three who had recently had a family member killed by homicide. Eight died via firearm; of those, seven owned the guns they used to take their lives and stored them locked (but loaded) at home or in their cars. Preventing community violence and addressing its sequelae may be important for reducing suicides. A multi‐pronged strategy consisting of policies, education, and marketing will likely be needed to address the risk of suicide conferred by gun access. 相似文献
8.
This paper looks at EU banks' use of public cloud computing services. It is based primarily on anonymised interviews with banks, cloud providers, advisers, and financial services regulators. The findings are presented in three parts. Part 1 explored the extent to which banks operating in the EU, including global banks, use public cloud computing services.Part 2 of this paper covers the main legal and regulatory issues that may affect banks' use of cloud services. It sets out how EU banking regulators have approached banks' use of cloud services and considers regulators' lack of cloud computing knowledge. The paper further considers how the regulation of outsourcing applies to banks' use of cloud services, including whether cloud computing constitutes “outsourcing”. It analyses the contentious issue of contractual audit rights for regulators as well as legal and practical issues around risk assessments, security, business continuity, concentration risk, bank resolution, and banking secrecy laws.Part 3 looks at the key contractual issues that arise between banks and cloud service providers, including data protection requirements, termination, service changes, and liability.All three parts of the paper can be accessed via Computer Law and Security Review's page on ScienceDirect at: http://www.sciencedirect.com/science/journal/02673649?sdc=2. The full list of sources is available via the same link and will be printed alongside the third part of the article. 相似文献
9.
张晋 《安徽警官职业学院学报》2013,(6):88-90
云计算,作为近年来发展迅速的信息技术手段,给社会各机构、普通群众的生活提供了很大的便利。云存储作为云计算的一个延伸技术,越来越多的融入到人们的生活中。在这一新形势下,犯罪分子也越来越多的使用该技术规避侦查人员的侦查取证活动。有鉴于云存储技术的新颖性与复杂性,有必要针对性地分析研究新的侦查取证策略,以应对新挑战。 相似文献
10.
This report examines possession and storage of firearms in low-income urban families with at least one child between 8 and 12 years of age. The data primarily consisted of responses to a survey administered to parents, but these data were supplemented by records obtained from discussion groups composed of children between 8 and 12 years of age. The data were collected from five low-income neighborhoods in a medium sized city in the Pacific Northwest as part of a larger study focusing on the presence of risk factors for substance abuse, violence, and gang activity. All five neighborhoods are known to be plagued by poverty, violence, substance abuse, and gang activity. To make our findings more understandable, we compared our findings from these neighborhoods to similar data from a middle-class neighborhood. Middle-class parents were twice as likely to have firearms in their homes, but were much less likely to keep them loaded and/or unlocked. High rates of victimization, fear of crime, self-protective behavior, and exposure to threats or attacks were associated with keeping firearms for protection and engaging in risky gun behavior in the home. 相似文献