3 resultados para Crime analysis

em CentAUR: Central Archive University of Reading - UK


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing use of social media, applications or platforms that allow users to interact online, ensures that this environment will provide a useful source of evidence for the forensics examiner. Current tools for the examination of digital evidence find this data problematic as they are not designed for the collection and analysis of online data. Therefore, this paper presents a framework for the forensic analysis of user interaction with social media. In particular, it presents an inter-disciplinary approach for the quantitative analysis of user engagement to identify relational and temporal dimensions of evidence relevant to an investigation. This framework enables the analysis of large data sets from which a (much smaller) group of individuals of interest can be identified. In this way, it may be used to support the identification of individuals who might be ‘instigators’ of a criminal event orchestrated via social media, or a means of potentially identifying those who might be involved in the ‘peaks’ of activity. In order to demonstrate the applicability of the framework, this paper applies it to a case study of actors posting to a social media Web site.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This case study from North Spain, highlights the importance of the collection of mites in addition to insects, from crime scenes or corpses subjected to environmental constraints that reduce or minimise insect activity, such as hanged corpses. In addition, this analysis highlights the relevance of arthropods’ collection in the field, even after the corpse has been moved away for autopsy. Four species of mites, phoretic on carrion (Silphidae) and rove (Staphylinidae) beetles, complemented and reinforced the autopsy analysis as well as the scarce information provided by insect activity. Poecilochirus carabi Canestrini & Canestrini, 1882 and Poecilochirus (Physoparasitus) davydovae Hyatt, 1980 (Mesostigmata: Parasitidae) were found in association with two Silphidae, Nicrophorus Fabricius, 1775 and Necrodes Leach, 1815, only when sampled in the autopsy room; this is suggestive of host-switching of mites and was likely due to the lack of availability of specific carriers in the field. The interpretation of the activity of Parasitidae mites both in the field and the autopsy room allows a better understanding of the timing and circumstances of decomposition. Phoretic deutonymphs of Pelzneria Scheucher 1957 (Astigmata: Histiostomatidae) were highly abundant, mostly P. crenulata Oudemans, 1909 and are reported for the first time on a Staphylinidae rove beetle, Creophilus maxillosus (L., 1758). Surprisingly, in this case study no Pelzneria were associated with the Silphidae found, which are their most common hosts, such as Necrodes littoralis (L., 1758) and Nicrophorus interruptus (Stephens, 1830). All histiostomatids were removed from the staphylinid (rove beetle) collected from the soil, at the scene of death, suggesting a recent arrival of the beetle. The occurrence of Staphylinidae beetles and their associated mites, such as Parasitidae and Pelzneria, and the information they provided would have been easily overlooked or lost if only the autopsy sampling would have been considered in the analysis of the case. The four mite species are reported for the first time for the Iberian Peninsula.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyber warfare is an increasingly important emerging phenomenon in international relations. The focus of this edited volume is on this notion of cyber warfare, meaning interstate cyber aggression, as distinct from cyber-terrorism or cyber-crime. Waging warfare in cyberspace has the capacity to be as devastating as any conventional means of conducting armed conflict. However, while there is a growing amount of literature on the subject within disciplines, there has been very little work done on cyber warfare across disciplines, which necessarily limits our understanding of it. This book is a major multidisciplinary analysis of cyber warfare, featuring contributions by world-leading experts from a mixture of academic and professional backgrounds.