메뉴 건너뛰기




Volumn , Issue , 2008, Pages 41-58

Validating digital evidence for legal argument

Author keywords

Digital evidence; Legal argument; Validation of evidence; Weight of evidence

Indexed keywords

DIGITAL DOMAIN; DIGITAL EVIDENCE; LEGAL ARGUMENT; LEGAL CASE; ROADMAP; VALIDATION OF EVIDENCE; WEIGHT OF EVIDENCE;

EID: 84867718303     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (54)
  • 1
    • 84867697645 scopus 로고    scopus 로고
    • The forensic chain of evidence model: Improving the process of evidence collection in incident handling procedures
    • Ahmad A. (2002) The forensic chain of evidence model: Improving the process of evidence collection in incident handling procedures. The 6th Pacific Asia Conference on Information Systems.
    • (2002) The 6th Pacific Asia Conference on Information Systems
    • Ahmad, A.1
  • 2
    • 84979796792 scopus 로고    scopus 로고
    • Internet law: Authenticity of works: Authorship and authenticity in cyberspace
    • Akester, P. (2004) Internet law: authenticity of works: authorship and authenticity in cyberspace. Computer Law & Security Report, 20, 436-444.
    • (2004) Computer Law & Security Report , vol.20 , pp. 436-444
    • Akester, P.1
  • 6
    • 0021044014 scopus 로고
    • An introduction to sample selection bias in sociological data
    • Berk, R. A. (1983) An introduction to sample selection bias in sociological data. American Sociological Review, 48, 386 - 398.
    • (1983) American Sociological Review , vol.48 , pp. 386-398
    • Berk, R.A.1
  • 8
  • 10
    • 84867720924 scopus 로고    scopus 로고
    • Automated digital evidence target definition using outlier analysis and existing evidence
    • New Orleans
    • Carrier, B. D., & Spaford, Eugene. H. (2005b) Automated digital evidence target definition using outlier analysis and existing evidence. Digital Forensic Research Workshop. New Orleans.
    • (2005) Digital Forensic Research Workshop
    • Carrier, B.D.1    Spaford, E.H.2
  • 14
    • 84867699819 scopus 로고    scopus 로고
    • Ten things about DNA contamination that lawyers should know
    • Edwards, K. (2005) Ten things about DNA contamination that lawyers should know. Criminal Law Journal, 29, 71 - 93. (Pubitemid 40594878)
    • (2005) Criminal Law Journal - Sydney , vol.29 , Issue.2 , pp. 71-93
    • Edwards, K.1
  • 17
    • 55749107575 scopus 로고    scopus 로고
    • Australasian Centre for Policing Research
    • Etter, B. (2001b) The forensic challenges of e-crime. Australasian Centre for Policing Research, 3, 1-8.
    • (2001) The Forensic Challenges of E-crime , vol.3 , pp. 1-8
    • Etter, B.1
  • 19
    • 84867699628 scopus 로고    scopus 로고
    • Computer forensic case study: Espionage, Part 1 just finding the file is not enough!
    • Flusche, K. J. (2001) Computer forensic case study: Espionage, Part 1 Just finding the file is not enough! Information Security Journal, 10, 1 - 10.
    • (2001) Information Security Journal , vol.10 , pp. 1-10
    • Flusche, K.J.1
  • 20
    • 79959498789 scopus 로고    scopus 로고
    • Use of Bayesian belief networks in legal reasoning
    • Huygen, P. E. M. (2002) Use of Bayesian Belief Networks in legal reasoning. 17th BILETA Annual Conference.
    • (2002) 17th BILETA Annual Conference
    • Huygen, P.E.M.1
  • 21
    • 32544453278 scopus 로고    scopus 로고
    • The role of technology in computer forensic investigations
    • DOI 10.1016/S1363-4127(00)02006-9, PII S1363412700020069
    • Janes, S. (2000) The role of technology in computer forensic investigations. Information Security Technical Report, 5, 43 - 50. (Pubitemid 43231475)
    • (2000) Information Security Technical Report , vol.5 , Issue.2 , pp. 43-50
    • Janes, S.1
  • 23
    • 84867723764 scopus 로고    scopus 로고
    • On the possibility of constructing meaningful hash collisions for public keys
    • Brisbane, Lucent Technologies, Bell Laboratories, and Technische Universiteit Eindhoven
    • Lenstraand, A., & De Weger, Benne. (2005) On the possibility of constructing meaningful hash collisions for public keys. Australasian Conference on Information Security and Privacy 2005. Brisbane, Lucent Technologies, Bell Laboratories, and Technische Universiteit Eindhoven.
    • (2005) Australasian Conference on Information Security and Privacy 2005
    • Lenstraand, A.1    De Weger, B.2
  • 24
    • 33746202526 scopus 로고    scopus 로고
    • Gap analysis: Judicial experience and perception of electronic evidence
    • Losavio, M., Adams. J., & Rogers, M. (2006) Gap Analysis: Judicial experience and perception of electronic evidence. Journal of Digital Forensic Practice, 1, 13 - 17.
    • (2006) Journal of Digital Forensic Practice , vol.1 , pp. 13-17
    • Losavio, M.1    Adams, J.2    Rogers, M.3
  • 26
    • 33745192277 scopus 로고    scopus 로고
    • Challenges in forensic computing
    • DOI 10.1145/1101779.1101796
    • Mercuri, R. (2005) Challenges in forensic computing. Communications of the ACM 48, 17 - 21 (Pubitemid 43906404)
    • (2005) Communications of the ACM , vol.48 , Issue.12 , pp. 17-21
    • Mercuri, R.T.1
  • 29
    • 0011506513 scopus 로고
    • The use of statistical heuristics in everyday inductive reasoning
    • Nisbett, R. E., Krantz, D. H., Jepson, C., & Kunda, Z (1983) The use of statistical heuristics in everyday inductive reasoning. Psychological Review, 90, 339-363.
    • (1983) Psychological Review , vol.90 , pp. 339-363
    • Nisbett, R.E.1    Krantz, D.H.2    Jepson, C.3    Kunda, Z.4
  • 38
    • 23244453289 scopus 로고    scopus 로고
    • The coming paradigm shift in forensic identification science
    • DOI 10.1126/science.1111565
    • Saks, M. J., & Koehler Jonathan. J (2005) The coming paradigm shift in forensic identification science. Science, 309, 892 - 895. (Pubitemid 41099917)
    • (2005) Science , vol.309 , Issue.5736 , pp. 892-895
    • Saks, M.J.1    Koehler, J.J.2
  • 40
    • 14544271706 scopus 로고    scopus 로고
    • Opinion: Cryptanalysis of MD5 and SHA: Time for a new standard: Crypto researchers report weaknesses in common hash functions
    • Schneier, B. (2004) Opinion: Cryptanalysis of MD5 and SHA: Time for a new standard: Crypto researchers report weaknesses in common hash functions. Computerworld.
    • (2004) Computerworld
    • Schneier, B.1
  • 44
    • 0342952877 scopus 로고    scopus 로고
    • Digital footprints: Accessing computer evidence
    • Sommer, P. (2000) Digital footprints: Accessing computer evidence. Criminal Law Review, 61 - 78
    • (2000) Criminal Law Review , pp. 61-78
    • Sommer, P.1
  • 48
    • 84867697642 scopus 로고    scopus 로고
    • Gerechtigkeitswissenschaft: Kolloquium aus Anlass des 70: Geburtstages von Lothar Philipps. Berlin
    • Tillers, P. (2005) Picturing factual inference in legal settings. Gerechtigkeitswissenschaft: Kolloquium aus Anlass des 70: Geburtstages von Lothar Philipps. Berlin.
    • (2005) Picturing Factual Inference in Legal Settings
    • Tillers, P.1
  • 50
    • 84867692283 scopus 로고    scopus 로고
    • The virtual horizon: Meeting the law enforcement challenges: Developing an australasian law enforcement strategy for dealing with electronic crime: Scoping paper
    • Unamed Adelaide., Australasian Centre for Policing Research
    • Unamed (2000) The virtual horizon: meeting the law enforcement challenges: developing an Australasian law enforcement strategy for dealing with electronic crime: scoping paper. Police Commissioners' Conference - Electronic Crime Working Party 2000. Adelaide., Australasian Centre for Policing Research.
    • (2000) Police Commissioners' Conference - Electronic Crime Working Party 2000
  • 51
    • 79960288554 scopus 로고    scopus 로고
    • Cracking the computer forensics mystery
    • Wall C., & Paroff, Jason. (2004) Cracking the computer forensics mystery. UtahBar Journal, 17.
    • (2004) UtahBar Journal , vol.17
    • Wall, C.1    Paroff, J.2
  • 52
    • 56749186425 scopus 로고    scopus 로고
    • An historical perspective of digital evidence: A forensic scientist's view
    • Whitcomb, C. M. (2002) An historical perspective of digital evidence: A forensic scientist's view. International Journal of Digital Evidence, 1.
    • (2002) International Journal of Digital Evidence , vol.1
    • Whitcomb, C.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.