首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 302 毫秒
1.
电子证据作为一种新的证据形式,逐渐成为新的诉讼证据之一。电子数据取证技术(Digital Forensic Technologies)的研究主要集中在证据查找、恢复及数据分析等方面,而对取证过程本身的合法性、真实性、完整性没有得到监控。本文在对取证步骤和过程研究基础上,模拟社会审计工作,设计了一个电子数据取证鉴定流程监管系统,以解决电子证据在获取、传输、保存、分析过程中证据连续性(chain of custody)问题。  相似文献   

2.
电子证据作为一种新的证据形式,逐渐成为新的诉讼证据之一.电子数据取证技术(Digital Forensic Technologies)的研究主要集中在证据查找、恢复及数据分析等方面,而对取证过程本身的合法性、真实性、完整性没有得到监控.本文在对取证步骤和过程研究基础上,模拟社会审计工作,设计了一个电子数据取证鉴定流程监管系统,以解决电子证据在获取、传输、保存、分析过程中证据连续性(chain of custody)问题.  相似文献   

3.
面对当前日益增多的计算机犯罪,电子证据已成为这些案件侦办过程的关键证据。由于电子证据有一些不同于常规证据的特点,因此计算机取证成为了一个打击计算机犯罪中新的课题。计算机取证技术会随着工作的需求在实践中不断发展,但当前的计算机取证工作存在着反取证技术的制约、自身软硬件的不足、办案人员的取证意识等局限性。而为了克服这些局限性,计算机取证技术今后将朝着更先进的技术、更规范的制度等方向发展。  相似文献   

4.
电子取证应用研究综述   总被引:1,自引:0,他引:1  
近年来,电子数据取证对案件侦破起着重要的作用,由于电子数据具有易失性、易破坏性等特点,需要取证人员具备专业的电子取证技术和方法,才能最后分析出有用的证据,保证案件的真实性和客观性,详细分析三种取证技术和方法:基于Windows的电子取证、基于智能手机的电子取证,基于网络的电子取证,其中基于智能手机的电子取证包括Android手机和iPhone手机,并提出电子取证技术未来的发展方向.  相似文献   

5.
给出电子取证中主机电子证据保全、恢复和分析技术、网络数据捕获与分析、主动取证技术、密码分析与破解技术,以及电子证据法学等研究方向的主要研究内容,并进行简要的分析.  相似文献   

6.
电子数据取证技术是随着互联网的发展而出现的一门新兴学科,本文对电子数据取证技术的概念、特点、所应遵循的基本原则进行了归纳总结。对电子数据取证中的证据获取、证据分析等关键技术进行了研究分析,并以硬盘取证为例,详细讲解了电子物证采集中的硬件克隆技术和软件采集技术。  相似文献   

7.
为解决网络环境下电子证据分散、取证分析效率低、协作难度大等问题,在分析计算机犯罪特点以及当前数字取证所面临的相关问题基础上,针对数字取证与分析的协同需求,设计了一种具有正循环反馈机制的云计算支持下的协作式数字取证模型,并详细论述了其设计思想和体系架构.最后,研究了模型的系统实现方法、电子证据云存储调度策略、基于封锁机制的并发分析任务调度.实验表明,协作式数字取证技术可有效提高数字取证工作效率和分析结果的准确性.  相似文献   

8.
云计算是能为用户提供按需分配的计算能力、存储能力及应用服务能力,方便用户使用,大大降低用户软硬件采购费用的一种计算方式.云计算取证是一个新的战场,为了在这一战场中更好地打击网络犯罪,必须研究出一些新奇的调查方法.从静态的电子证据、动态的网络电子取证到云计算环境下的电子取证的相关概念、关键技术等进行了综述,探讨了云计算环境下的电子取证模型关键技术,提出了云计算思维模式,并指出了云取证技术的发展趋势和展望.  相似文献   

9.
随着现代信息技术的快速发展,电子取证技术在打击毒品犯罪活动中的作用日益凸显,该文分析毒品案件电子证据的定义、种类、取证原则,并重点研究取证技术的实现。  相似文献   

10.
目前,以计算机信.g-系统为犯罪对象和工具的新型犯罪活动越来越多,造成的危害也越来越大。侦破这些案件必须要用到计算机取证技术,而电子证据本身和取证过程有许多不同于传统物证和取证的特点,给司法工作和信息安全领域都提出了新的挑战。为此,文章设计开发了一款基于WindowsPE系统的便捷、实用、安全、有效的计算机便携式取证系统。电子证据的收集与处理是通过内置于u盘的WindowsPE系统来完成的;利用OpenSSL提供的编程接口和PKI相关技术实现对电子证据的保密、认证与保存等功能。最后通过测试与分析,表明该系统能实现对电子证据的收集、处理和电子证据的安全有效保存。  相似文献   

11.
1 December 2006, new rules of civil procedure take effect in the US court system. The product of nearly 10 years' effort, the core purpose of these rules is that if digital information is to be used as evidence with legal value, a set of procedures must govern the examination and use of that evidence. All you security people, archivists, and system administrators, pay attention: the quiz will take place under oath.  相似文献   

12.
Today, documents and data are likely to be encountered in electronic form. This creates a challenge for the legal system since its rules of evidence evolved to deal with tangible (physical) evidence. Digital evidence differs from tangible evidence in various respects, which raise important issues as to how digital evidence is to be authenticated, ascertained to be reliable and determined to be admissible in criminal or civil proceedings. This article explains how digital evidence differs from traditional physical evidence and reviews the current state of the law with regard to the processes of authentication, reliability and admissibility.  相似文献   

13.
ABSTRACT

With the advancement of Internet technologies and its wide usage, it has become easy to illegally copy, distribute, and manipulate digital products. Digital watermarking is a proven method to protect authenticity by identifying the owner of the digital content. Significant work has been reported in the last five years on legal and technical measures for protecting digital rights. This paper explains the concepts of ownership rights and related intellectual property rights and their technical and legal protection measures. It also introduces digital water marking, its classification, features, and applications.  相似文献   

14.
Ethical norms are believed to be followed more loosely on the Internet than in the ‘real world’. This proposition is often evoked to explain the prevalence of so-called digital piracy. In this study, we provide evidence from a vignette experiment that contradicts this claim. Analysing the case of sports broadcast, we compare explicitly the ethical judgement of legal and illegal sharing in the offline and online contexts. We find that the norms concerning legality, availability of alternatives and deriving material benefits from sharing content do not differ substantially between the virtual and real worlds. We also test explicitly for the role of legal awareness and find that emphasising what is prohibited (copyright infringement) is less effective than focusing on what is permitted (fair use) in reducing the disparity between legal and ethical norms.  相似文献   

15.
Policy actions against various cyberspace crimes should respond both systematically and specifically to the nature of each crime and its accompanying evidence. Voice phishing as an emerging internet fraud practice has already victimized many unsuspecting consumers and hit the headlines frequently; cyber prostitution, pornography, illegal duplication of software, and online gambling have also become routine problems. Anonymity and facelessness in cyberspace distort one’s sense of guilt and allow for rapid collection, modification, and distribution of illegal and harmful information that disrupts social order and public safety. The purpose of this research is to examine the concept and type of cyber crime and to trace its trend in the Republic of Korea in the recent years. Due to its informational, national, global, and networking properties, cyber crime often puts serious restraints on conventional criminal justice procedures that cannot compromise such legal issues as individual safety and protection of privacy. If made accessible, information stored in private computers has potential to serve as decisive evidence in many criminal litigations. The Korean criminal procedure law promulgated on July 18, 2011 and enforced since January 1, 2012 contains an express provision permitting the search and seizure of digital evidence. But this partial code does not explicitly define the admissibility of digital evidence and acceptable methods of examining it. Hence, it is one of the goals of this research to identify problems pertaining to this law and suggest ways to improve it.  相似文献   

16.
电子证据在国家:立法层面、学术界都给予高度重视,在公安工作中成为打击刑事犯罪的重要手段。实践中电子证据的价值还没有充分利用,本文结合电子证据的特点和司法实践的实际提出了若干对策,以促进电子证据在公安工作中的更大发展。  相似文献   

17.
Notwithstanding the biggest victim of digital piracy, we have a limited understanding of how TV drama piracy affects its legal consumption. Unlike movies or music, TV dramas are typically a series of episodes, where pirated past episodes may not necessarily carry a negative impact on the legal consumption of current episodes. The consumption boosted by piracy can promote Internet buzz, which may draw the attention of potential consumers and may result in broader legal consumption afterward. Based on an empirical analysis regarding the relationships among the viewership of 20 TV dramas broadcast in the US, social media activities on Twitter, Google and YouTube search trends, and the number of BitTorrent users who pirated these TV dramas, we show that although the direct effect of media consumption through BitTorrent to TV viewership is negative, the indirect effect that mediates Internet buzz is positive, which dilutes the negative effect of digital piracy. Such positive effects of digital piracy are more substantial for the second half of dramas, less popular dramas, and serial dramas. We discuss the theoretical contributions and managerial implications of our study.  相似文献   

18.
郑毅 《信息安全与技术》2012,3(10):56-58,62
当用户通过合法或非法途径获取了企业信息系统中数字文档的访问权限,即可以不受限地通过下载、拷贝、网络等方式传播他人,而导致带有企业机密的泄密,使得共享与保密之间存在突出的问题,集成基于DRM技术构建的文档安全管理系统,对于已联网的企业存储信息的机密性和完整性是一个快速有效的解决方法。在本文中,对企业非结构化数字文档信息安全现状与存在问题进行了分析,研究了使用DRM对数字文档在线与离线应用信息防泄密进行保护的技术原理,提出了一种在企业现有信息系统体系下,通过二次开发集成基于DRM技术专业机密文档保护产品的嵌入式架构设计。  相似文献   

19.
This study evaluates the current application of United States copyright law in music sampling cases and used the Danger Mouse's Grey Album as a case in point. The following research questions structured the investigation: Are the current applications of United States copyright law appropriate for digital sampling in an international intellectual property environment? Is the practice of digital sampling stealing or recycling? How might the American legislature change copyright law to more clearly guide musical artists on the use of digital sampling? The research includes a review of sampling and its history, international and American copyright history, and the applicable elements of the Copyright Act of 1976, as well as interviews with legal professionals and musicians. The research suggests that the Copyright Act of 1976 is not adequate to address the technology and practices of digital sampling musicians, and that Congress needs to act precisely to amend the law and meet international legal standards.  相似文献   

20.
手写试卷答题纸具有卷面信息长期保存和方便查卷取证的优点,在未来的很长一段时间内将仍然处于主流地位。但卷面信息难以信息化,导致信息化技术的优点无法在试卷管理上充分体现出来。针对笔试试卷卷面难以信息化的弊端,设计并实现了基于数码笔的数码答题纸原型系统。系统利用Maxell公司生产的数码笔,采集数码答题纸上留下的笔迹、所经过的X、Y坐标以及所在页码等参数来实现笔迹的还原,进而实现卷面信息化和部分客观题的自动判分的功能。经过实践测试,该系统能很好地实现上述功能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号