首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
电子文件归档与保存情况,现已成为档案工作的重要内容。本报告主要用于评估开封市部分事业单位电子文件归档与保存方面的状况,事业单位档案工作者实施电子文件归档管理的能力,了解《电子文件归档管理规定》在事业单位档案机构中落实的实际情况。  相似文献   

3.
The archives of Trinity College Dublin represent the corporate, administrative, and cultural memory of the university. This hybrid collection presents several challenges in relation to its management and long-term preservation. Appropriate storage conditions are vital for analogue records, as is the exercise over them of physical and intellectual control. However, born-digital archival records require the preservation of not only their data, but also evidence of their authenticity. For archivists, meeting these preservation challenges necessitates the integration of digital preservation strategies into traditional archival practices, advocacy of good records management, as well as close co-operation with legal and IT professionals.  相似文献   

4.
High-speed archival and indexing solutions of streaming traffic are growing in importance for applications such as monitoring, forensic analysis, and auditing. Many large institutions require fast solutions to support expedient analysis of historical network data, particularly in case of security breaches. However, ??turning back the clock?? is not a trivial task. The first major challenge is that such a technology needs to support data archiving under extremely high-speed insertion rates. Moreover, the archives created have to be stored in a compressed format that is still amenable to indexing and search. The above requirements make general-purpose databases unsuitable for this task and dedicated solutions are required. This work describes a solution for high-speed archival storage, indexing, and data querying on network flow information. We make the two following important contributions: (a) we propose a novel compressed bitmap index approach that significantly reduces both CPU load and disk consumption and, (b) we introduce an online stream reordering mechanism that further reduces space requirements and improves the time for data retrieval. The reordering methodology is based on the principles of locality-sensitive hashing (LSH) and also of interest for other bitmap creation techniques. Because of the synergy of these two components, our solution can sustain data insertion rates that reach 500,000?C1?million records per second. To put these numbers into perspective, typical commercial network flow solutions can currently process 20,000?C60,000 flows per second. In addition, our system offers interactive query response times that enable administrators to perform complex analysis tasks on the fly. Our technique is directly amenable to parallel execution, allowing its application in domains that are challenged by large volumes of historical measurement data, such as network auditing, traffic behavior analysis, and large-scale data visualization in service provider networks.  相似文献   

5.
The importance of curriculum development on archives and records management in the digital era, especially on the African continent, cannot be overemphasized. While many universities in the global hub have included studies on all aspects of archives and records management programs with many emphasizing records created in networked environments, the same cannot be said about universities on the African continent. In Africa, education and training of archives and records professionals can be traced back several decades. Archives and records practitioners in Africa’s different countries have, over the years, taken varying paths to attain their professional qualifications. This study outlines progress on an ongoing study by InterPARES Trust Africa Team that examines the curricula in different African educational institutions and investigates the extent to which they address the increasingly complex environment that includes the management of digital records in networked environments. It is hoped that the study will inform curriculum development and review in the area of digital records at the institutions of higher learning in Africa.  相似文献   

6.
The use of satellite automotive navigation systems has increased rapidly worldwide in recent years. Forensic analysis of these devices can be identified information of evidential value in criminal cases. Mappy GPS navigation software is one of the most popular products of satellite navigation software in Korea. Mappy records the usage history, such as the most frequently visited locations and routes, in an external storage medium for convenience and accessibility. These artifacts can be extracted, examined, and analyzed to trace location entries or recent vehicle routes. It can be used to investigate diverse crimes such as kidnap and murder cases; thus, they are of great value in digital forensics. This paper outlines test-driven forensic analysis for Mappy location records and shows how these can be recovered, including deleted location entries.  相似文献   

7.
电子数据证据收集系统的研究与保护   总被引:2,自引:0,他引:2  
随着计算机犯罪的不断增加,电子数据取证技术(digital forensic technology)越来越受到人们的重视.电子数据证据不同于传统的犯罪证据,它们更加容易消失和被破坏,为了获得完整可信的电子数据证据,提出应在敏感主机中预先安装设置电子数据证据收集系统(digital evidence collecting system.DECS),用来收集系统中的相关证据.由于DECS的某些模块往往存在于被攻击系统之中,提出使用安全隔离环境是保护电子数据证据收集机制有效的方法,并设计了一个安全保护机制——I-LOMAC.  相似文献   

8.
目的 数字图像的真实性问题备受人们关注,被动取证是解决该问题的有效途径。然而,如果伪造者在篡改图像的同时利用反取证技术对篡改的痕迹进行消除或伪造,那么已有的大量被动取证技术都将失效。回顾图像反取证技术的研究现状(包括兴起原因、实现原理、技术特点以及应用前景),并根据已有文献总结反取证技术面临的主要挑战和机遇。方法 由于现有的被动取证技术大都基于遗留痕迹和固有特征的异同来辨识图像真伪,因此本文以不同的取证特征为线索来评述和比较反取证技术的原理和策略。结果 根据取证特征的不同,将反取证技术归纳为遗留痕迹隐藏、固有特征伪造和反取证检测等三类,并展示了当前各类反取证技术面临的难点和挑战。结论 对数字图像反取证技术进行总结和展望,并指出其算法未来在通用性、安全性、可靠性等方面将有待进一步的深入研究。  相似文献   

9.
The paper sets out the challenges facing the Police in respect of the detection and prevention of the volume crime of burglary. A discussion of data mining and decision support technologies that have the potential to address these issues is undertaken and illustrated with reference the authors’ work with three Police Services. The focus is upon the use of “soft” forensic evidence which refers to modus operandi and the temporal and geographical features of the crime, rather than “hard” evidence such as DNA or fingerprint evidence. Three objectives underpin this paper. First, given the continuing expansion of forensic computing and its role in the emergent discipline of Crime Science, it is timely to present a review of existing methodologies and research. Second, it is important to extract some practical lessons concerning the application of computer science within this forensic domain. Finally, from the lessons to date, a set of conclusions will be advanced, including the need for multidisciplinary input to guide further developments in the design of such systems. The objectives are achieved by first considering the task performed by the intended systems users. The discussion proceeds by identifying the portions of these tasks for which automation would be both beneficial and feasible. The knowledge discovery from databases process is then described, starting with an examination of the data that police collect and the reasons for storing it. The discussion progresses to the development of crime matching and predictive knowledge which are operationalised in decision support software. The paper concludes by arguing that computer science technologies which can support criminal investigations are wide ranging and include geographical information systems displays, clustering and link analysis algorithms and the more complex use of data mining technology for profiling crimes or offenders and matching and predicting crimes. We also argue that knowledge from disciplines such as forensic psychology, criminology and statistics are essential to the efficient design of operationally valid systems.  相似文献   

10.
一种抽象的数字取证模型   总被引:2,自引:0,他引:2  
介绍了数字取证和数字取证模型的概念,然后通过对基于刑事侦查和基于企业内部网的数字取证异同点的比较,结合数字取证在非数字化犯罪领域应用中的特点,在前人工作的基础上,提出了一种不局限于特定数字取证类型、以取证实施者为中心、使用状态转换图描述的抽象数字取证模型,采用取证循环的形式描述了数字取证的过程和特征。  相似文献   

11.
This paper discusses the challenges of long-term preservation of digital geometric models and the engineering processes associated with them. For engineering, design, manufacturing, and physics-based simulation data this requires formats that are accessible potentially indefinitely into the future. One of the fundamental challenges is the development of digital geometry-centric engineering representations that are self describing and assured to be interpretable over the long lifespans required by archival applications. Additionally, future users may have needs that require other information, going beyond geometry, be also accessible to fully interpret the model. These problems are highly interdisciplinary and not exclusively algorithmic or technical. To provide context, the paper introduces a case study illustrating an overall portrait of the problem. Based on observations from this case study, we present a framework for enhancing the preservation of geometry-centric engineering knowledge. This framework is currently being used on a number of projects in engineering education.  相似文献   

12.
Written laws, records and legal materials form the very foundation of a democratic society. Lawmakers, legal scholars and everyday citizens alike need, and are entitled, to access the current and historic materials that comprise, explain, define, critique and contextualize their laws and legal institutions. The preservation of legal information in all formats is imperative. Thus far, the twenty-first century has witnessed unprecedented mass-scale acceptance and adoption of digital culture, which has resulted in an explosion in digital information. However, digitally born materials, especially those that are published directly and independently to the Web, are presently at an extremely high risk of permanent loss. Our legal heritage is no exception to this phenomenon, and efforts must be put forth to ensure that our current body of digital legal information is not lost. The authors explored the role of the United States law library community in the preservation of digital legal information. Through an online survey of state and academic law library directors, it was determined that those represented in the sample recognize that digitally born legal materials are at high risk for loss, yet their own digital preservation projects have primarily focused upon the preservation of digitized print materials, rather than digitally born materials. Digital preservation activities among surveyed libraries have been largely limited by a lack of funding, staffing and expertise; however, these barriers could be overcome by collaboration with other institutions, as well as participation in a large-scale regional or national digital preservation movement, which would allow for resource-sharing among participants. One such collaborative digital preservation program, the Chesapeake Project, is profiled in the article and explored as a collaborative effort that may be expanded upon or replicated by other institutions and libraries tackling the challenges of digital preservation.  相似文献   

13.
信息系统的发展目前正处于感知智能迈向认知智能的关键阶段,传统信息系统难以满足发展要求,数字化转型势在必行.数字线索(digitalthread)是面向全生命周期的数据处理框架,通过连接生命周期的各阶段数据,实现物理世界与数字空间的映射与分析.知识图谱(knowledgegraph)是结构化的语义知识库,以符号形式描述物理世界中的概念及其相互关系,通过知识驱动形成体系化的构建与推理流程.两者对知识赋能的信息系统研究具有重要意义.综述了知识赋能的新一代信息系统的研究现状、发展与挑战.首先,从数字线索系统出发,介绍数字线索的概念和发展,分析数字线索的六维数据构成和6个数据处理阶段;然后介绍知识图谱系统,给出普遍认同的知识图谱的定义和发展,概括知识图谱的架构与方法;最后,分析和探索数字线索与知识图谱结合的方向,列举KG4DT (knowledge graph for digital thread)和DT4KG (digital thread for knowledge graph)的受益方向,对未来知识赋能的新一代信息系统提出开放问题.  相似文献   

14.
Following Derrida (1995), our article explores the relationship between archival practices and archival documents on the assumption that “archivization produces as much as it records the event” (Derrida 1995, 17). On this approach, archival practices are understood as non-innocent practices that, in the act of “preservation,” help make specific “memories” at the expense of others (Barad 2007; Derrida 1995; Foucault 1972). We take up this issue in relation to the curation of social science quantitative research data and argue that the ontological identity of data is constituted through historically- and culturally-specific data curation practices including data cleaning, data anonymization, and metadata preparation.  相似文献   

15.
Digital devices are increasingly being used in various crimes, and therefore, it becomes important for law enforcement agencies to be able to investigate and analyze digital devices. Accordingly, there is an increasing demand for digital forensic technologies which can recover the data concealed or deleted by criminals that are of prime importance. There are various digital forensic tools available for Windows-based systems and relatively a few of those for Linux-based systems. Thus, this paper suggests a deleted file recovery technique for the Ext 2/3 filesystem, which is commonly used in Linux. The research involved the analysis of the Ext filesystem structure, file storage structure, and metadata information of file. The shortcomings of the existing methods and methods implemented by the proposed technique to address them are presented. Further, a comparison of the performance of the proposed technique and that of the existing methods is presented.  相似文献   

16.
ABSTRACT

e-crime is increasing and e-criminals are becoming better at masking their activities. The task of forensic data analysis is becoming more difficult and a systematic approach towards evidence validation is necessary. With no standard validation framework, the skills and interpretation of forensic examiners are unchecked. Standard practices in forensics have emerged in recent years, but none has addressed the development of a model of valid digital evidence. Various security and forensic models exist, but they do not address the validity of the digital evidence collected. Research has addressed the issues of validation and verification of forensic software tools but failed to address the validation of forensic evidence. The forensic evidence collected using forensic software tools can be questioned using an anti-forensic approach. The research presented in this paper is not intended to question the skills of forensic examiners in using forensic software tools but rather to guide forensic examiners to look at evidence in an anti-forensic way. This paper proposes a formal procedure to validate evidence of computer crime.  相似文献   

17.
This paper describes a literature review, institutional audit and analysis of practice in the area of digital literacy provision, based on research across the UK Higher Education sector. It concludes that institutions need to place greater value on ‘literacies of the digital’, and better prepare their students and their own organizational processes to thrive in an age of digital knowledge practices. It extends the debate about individual entitlement and provision to ask whether digital literacy offers an opportunity for the academy to redefine its relationship to knowledge in society.  相似文献   

18.
In this paper a World Wide Web (WWW)-based medical system, called MITIS, is designed and developed for the management and processing of obstetrical, gynecological and radiological medical data. The system records all the necessary medical information in terms of patient data, examinations, and operations and provides the user-expert with advanced image processing tools for the manipulation, processing and storage of ultrasound and mammographic images. The system can be installed in a hospital's Local Area Network (LAN) where it can access picture archival and communication systems (PACS) servers (if available), or any other server within the radiology department, for image archiving and retrieval, based on the digital imaging and communication in medicine (DICOM) 3.0 protocol, over TCP/IP and also it is accessible to external physicians via the hospital's Internet connection. MITIS is composed as a set of independent WWW modules (ISAPI server extension dlls) and a Win32 application (COM+ server) for mammography image processing and evaluation.  相似文献   

19.
Persuasive system features have been widely adopted to encourage attitude and behaviour change. Recently, most social networking sites (SNS) adopt some form of persuasive system features that leverage social influence to deliberately induce prescribed behaviours in their users. However, studies on how these features can be used to promote knowledge sharing are inadequate; particularly, regarding how SNS that have been developed solely for academic purposes can adopt these features to promote knowledge sharing. To address this knowledge gap, this study integrates constructs from the social capital theory and persuasive systems design model to investigate the impact of persuasive social features on knowledge sharing among students of tertiary institutions on academic social networking sites. Data are quantitatively gathered from 218 respondents from tertiary institutions and statistically analyzed. The results suggest that perceived dialogue support and perceived social support have strong influences on knowledge sharing behaviour.  相似文献   

20.
In digital forensic, evidence images are stored on the disk by a forensic tool. However, the stored images can be damaged due to unexpected internal and external electromagnetic effects. Existing forensic tools only provide integrity and authenticity of the evidence images by utilizing legacy cryptographic methods, i.e., applying hash values and digital signatures. Accordingly, such integrity and authenticity applied to those evidence images can be easily corrupted when the disk is damaged. In this paper, we focus on such limitations of the existing forensic tools and introduce a new scheme that can recover and protect the evidence images on the disk. Specifically, evidence images are divided into blocks; linkage relations between those blocks are formed; and a meta-block is applied to restore the damaged blocks. Blocks in the damaged areas detected using CRC information are subject to a multi-dimensional block operation for recovery of damaged blocks and protection for evidence images.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号