229 resultados para Digital Forensics, Forensic Computing, Forensic Science


Relevância:

50.00% 50.00%

Publicador:

Resumo:

Acepromazine (ACP) is a useful therapeutic drug, but is a prohibited substance in competition horses. The illicit use of ACP is difficult to detect due to its rapid metabolism, so this study investigated the ACP metabolite 2-(1-hydroxyethyl)promazine sulphoxide (HEPS) as a potential forensic marker. Acepromazine maleate, equivalent to 30 mg of ACP, was given IV to 12 racing-bred geldings. Blood and urine were collected for 7 days post-administration and analysed for ACP and HEPS by liquid chromatography–mass spectrometry (LC–MS). Acepromazine was quantifiable in plasma for up to 3 h with little reaching the urine unmodified. Similar to previous studies, there was wide variation in the distribution and metabolism of ACP. The metabolite HEPS was quantifiable for up to 24 h in plasma and 144 h in urine. The metabolism of ACP to HEPS was fast and erratic, so the early phase of the HEPS emergence could not be modelled directly, but was assumed to be similar to the rate of disappearance of ACP. However, the relationship between peak plasma HEPS and the y-intercept of the kinetic model was strong (P = 0.001, r2 = 0.72), allowing accurate determination of the formation pharmacokinetics of HEPS. Due to its rapid metabolism, testing of forensic samples for the parent drug is redundant with IV administration. The relatively long half-life of HEPS and its stable behaviour beyond the initial phase make it a valuable indicator of ACP use, and by determining the urine-to-plasma concentration ratios for HEPS, the approximate dose of ACP administration may be estimated.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Deep Raman Spectroscopy is a domain within Raman spectroscopy consisting of techniques that facilitate the depth profiling of diffusely scattering media. Such variants include Time-Resolved Raman Spectroscopy (TRRS) and Spatially-Offset Raman Spectroscopy (SORS). A recent study has also demonstrated the integration of TRRS and SORS in the development of Time-Resolved Spatially-Offset Raman Spectroscopy (TR-SORS). This research demonstrates the application of specific deep Raman spectroscopic techniques to concealed samples commonly encountered in forensic and homeland security at various working distances. Additionally, the concepts behind these techniques are discussed at depth and prospective improvements to the individual techniques are investigated. Qualitative and quantitative analysis of samples based on spectral data acquired from SORS is performed with the aid of multivariate statistical techniques. By the end of this study, an objective comparison is made among the techniques within Deep Raman Spectroscopy based on their capabilities. The efficiency and quality of these techniques are determined based on the results procured which facilitates the understanding of the degree of selectivity for the deeper layer exhibited by the individual techniques relative to each other. TR-SORS was shown to exhibit an enhanced selectivity for the deeper layer relative to TRRS and SORS whilst providing spectral results with good signal-to-noise ratio. Conclusive results indicate that TR-SORS is a prospective deep Raman technique that offers higher selectivity towards deep layers and therefore enhances the non-invasive analysis of concealed substances from close range as well as standoff distances.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Podiatry is the medical science of the bones, muscle and skin of the foot. Paul Bennett is sometimes called on by police to help solve crime. He can provide vital evidence by applying his medical expertise and extraordinary talent for pattern recognition to footprints left at crime-scenes. Paul is a senior lecturer at the Quensland University of Technology's School of Clinical Sciences.

Relevância:

50.00% 50.00%

Publicador:

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Individual and/or co-offenders fraudulent activities can have a devastating effect on a company’s reputation and credibility. Enron, Xerox, WorldCom, HIH Insurance and One.Tel are examples where stakeholders incurred substantial financial losses as a result of fraud and led to a loss of confidence in corporate dealings by the public in general. There are numerous theoretical approaches that attempt to explain how and why fraudulent acts occur, drawing on the fields of sociology, organisational, management and economic literature, but there is limited empirical evidence published in accounting literature. This qualitative inductive study analyses perceptions and experiences of forensic accountants to gain insights into individual fraud and co-offending in order to determine whether the conceptual framework developed from literature accurately depicts the causes of fraud committed by individuals and groups in the twenty-first century. Findings from the study both support and extend the conceptual framework, demonstrating that strain and anomie can result in fraud, that deviant sub-groups recruit and coerce members by providing relief from strain, and that inadequate corporate governance mechanisms both contribute to fraud occurring, and provide the opportunity for fraudulent activities to be executed and often remain undetected. Additional factors emerging from this study (the ‘technoconomy’, addiction and IT measures) were also identified as contributors to fraud, particularly relevant to the twenty-first century, and consequently, a refined conceptual framework is presented in the discussion and conclusion to the paper.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

There are two aspects to the problem of digital scholarship and pedagogy. One is to do with scholarship; the other with pedagogy. In scholarship, the association of knowledge with its printed form remains dominant. In pedagogy, the desire to abandon print for ‘new’ media is urgent, at least in some parts of the academy. Film and media studies are thus at the intersection of opposing forces – pulling the field ‘back’ to print and ‘forward’ to digital media. These tensions may be especially painful in a field whose own object of study is another form of communication, neither print nor digital but broadcast. Although print has been overtaken in the popular marketplace by audio-visual forms, this was never achieved in the domain of scholarship. Even when it is digitally distributed, the output of research is still a ‘paper.’ But meanwhile, in the realm of teaching, production- and practice-based pedagogy has become firmly established. Nevertheless a disjunction remains, between high-end scholarship in research universities and vocational training in teaching institutions; but neither is well equipped to deal with the digital challenge.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A considerable proportion of convicted sex offenders maintain a stance of innocence and thus do not engage in recommended treatment programs. As a result, such offenders are often deemed to have outstanding criminogenic needs which may negatively impact upon risk assessment procedures and parole eligibility. This paper reports on a study that aimed to investigate a group of forensic psychologists’ attitudes regarding the impact of denial on risk assessment ratings as well as parole eligibility. Participants completed a confidential open-ended questionnaire. Analysis indicated that considerable variability exists among forensic psychologists in regards to their beliefs about the origins of denial and what impact such denial should have on post-prison release eligibility. In contrast, there was less disparity regarding beliefs about the percentage of innocent yet incarcerated sex offenders. This paper also reviews current understanding regarding the impact of denial on recidivism as well as upon general forensic assessments.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impact their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The emergence of mobile and ubiquitous computing has created what is referred to as a hybrid space – a virtual layer of digital information and interaction opportunities that sits on top and augments the physical environment. The increasing connectedness through such media, from anywhere to anybody at anytime, makes us less dependent on being physically present somewhere in particular. But, what is the role of ubiquitous computing in making physical presence at a particular place more attractive? Acknowledging historic context and identity as important attributes of place, this work embarks on a ‘global sense of place’ in which the cultural diversity, multiple identities, backgrounds, skills and experiences of people traversing a place are regarded as social assets of that place. The aim is to explore ways how physical architecture and infrastructure of a place can be mediated towards making invisible social assets visible, thus augmenting people’s situated social experience. Thereby, the focus is on embodied media, i.e. media that materialise digital information as observable and sometimes interactive parts of the physical environment hence amplify people’s real world experience, rather than substituting or moving it to virtual spaces.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in the design of various system components. Using the model, we also define a few fundamental design and evaluation parameters. To demonstrate the significance of the proposed model, we provide an example of how it can be applied to formally define common attacks.