首页 | 本学科首页   官方微博 | 高级检索  
     


Digital forensics and the issues of identity
Authors:Andy Jones  T Martin
Affiliation:1. Khalifa University of Science Technology and Research, United Arab Emirates;2. Edith Cowan University, Australia;1. School of Life Science and Technology, China Pharmaceutical University, Nanjing, China;2. Huadong Research Institute for Medicine and Biotechnics, Nanjing, China;3. Department of Infectious Diseases, The First Affiliated Hospital with Nanjing Medical University, Nanjing, China;4. Department of Biochemistry and Molecular Biology, School of Basic Medicine, Nanjing Medical University, Nanjing, China;5. Department of Clinical Laboratory, Nanjing Second Hospital, Nanjing, China;6. Department of Clinical Laboratory, Yixing People’s Hospital, Yixing, China;1. Electronics Department, Faculty of Engineering Sciences, Laboratories of Automation and Signals of Annaba (LASA), Badji Mokhtar Annaba University, 23000, Annaba, Algeria;2. Computer Science Department, Faculty of Sciences and Technology, Artificial Intelligence and Information Technology Laboratory (LINATI), University of Kasdi Merbah, 30000, Ouargla, Algeria;1. School of Life Science and Technology, China Pharmaceutical University, Nanjing, China;2. Huadong Research Institute for Medicine and Biotechnics, Nanjing, China;3. Department of Infectious Diseases, The First Affiliated Hospital with Nanjing Medical University, Nanjing, China;4. Department of Biochemistry and Molecular Biology, School of Basic Medicine, Nanjing Medical University, Nanjing, China;5. Jiangsu Food & Pharmaceutical Science College, Huaian, China;6. Department of Clinical Laboratory, Nanjing Second Hospital, Nanjing, China;7. Department of Clinical Laboratory, Yixing People’s Hospital, Yixing, China
Abstract:The issue of what we consider to be the identity of a person has become increasingly complex as we have made ever greater use of the facilities and services that have been made available by developing technologies and the Internet. In the past people normally had one identity, while in the current environment it is acceptable to maintain separate ‘identities’ for different aspects of our on-line interactions.Proving beyond a reasonable doubt that an individual that is suspected of a crime that is based on the technologies that we increasingly rely on was the actual perpetrator has always been problematic. It is relatively easy to determine the device that was used, but proving that the suspect was the person that used it has always been more difficult.This paper looks at a range of issues that have affected what we consider to be reasonable proof of identity and a number of the problems that this causes in identifying the perpetrator of a crime.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号