Digital trace and their attributes evaluate for criminalistic

Digital traces, their evaluation characteristics for criminology. Consideration of crimes related to misuse of information and communication technologies. Modern possibilities of studying and research of digital traces and their content in criminology.

Рубрика Государство и право
Вид статья
Язык английский
Дата добавления 11.11.2021
Размер файла 87,5 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Digital records can catch hold of a picture, sound, different operating values and conditions, user's activities or the activities associated with automated processes and programs, what is more, they record the values given by exact measurements, data transmission and many more.

Unlike subjective workings of human memory, we are able to reproduce the above - mentioned records over and over again in the same quality and in front of no matter how large the group of impartial observers and experts is.

The problematic issue related to digital traces is theoretical and in some cases also practical possibility of falsification and of challenging the legal quality of traces. However, this possibility occurs within all types traces processed in criminalistic and forensic way.

This leads to a relatively unworkable criminalistic but especially judicial practice of their acceptance and thus of search and exploration. This precedent is also reflected in the current legislation, which remains on the findings of more than 20 years, with reference to "sufficient modification of computer traces". Current trends, however, show that up to 40 percent of offenses are somehow linked to the way of committing or confiscating, which can be investigated using the knowledge of digital footprint theory. Estimates suggest that this percentage will grow for the long term, probably up to 60-80%.

In practice, we are more often confronted with the prejudices of individuals, which result largely from the ignorance of the issue much more than the real reference to the real weaknesses of the communication and information categories. Many information and communication information and related technologies are classified and certified to the same level as no other technologies and technical means. Communication and information technologies contain a sufficient number of logged information mechanisms, so that while observing objectively defined investigative and investigative procedures and corresponding handling of acquired digital footprints, these are credible and undisputable proofs of the activities that took place on the scene or through this technology.

The biggest problem at present is identifying the person who created the digital trace. At the moment, similar mechanisms of individualization and linking between the trace and its object are sought, as is the case with some criminalistic methods investigating static reflection. But more perspective is the plane of reflection of dynamic features known from handwriting, spoken speech, photographic recordings, as well as from the field of trasology or mechanoscopy.

19. Storing and quality of digital traces is influenced by subjective factors

From the point of safety storing and quality of digital traces is directly proportional to international, national or institutional legislation, experience of system administration and it depends on institutional culture. Regular monitoring and audit of key transactions, providing storage backup and data archiving from important data sources to a special medium and their long-tern storage, play primary role (Gragusovd, E., Gregus, M., Krehel', O., 2013).

Thus, it plays routine monitoring and audit of key transactions, backing up and archiving data from important data sources (corporate IS, e-mail, etc.) to special media - ideal disk arrays and their long-term storage and protection. From these media, it is then possible to restore required data if required, which are no longer available in production systems. The frequency and frequency of procurement of backup or archive media, the way they are preserved to avoid their harm, the observance of institutional standards and rules, defined primarily in the security information policy and subsequently in the operating order of the ICT department of the institution, are decisive.

The other side of this feature is the above-mentioned still low acceptance and the resulting ignorance and inability to search, secure and pre-examine - to decide on digital objects whether they are digital traces or not, and what will actually be a digital trace. The current situation not only in Slovakia, when we directly banned subjects for work in the city of crime, and during the tours, digital trace and mostly their carriers are ensured for long time unbearable. The need for substantial skills upgrading is a success story in this area, and the future in this area is no different than changing the current access to search and trace processes, as we have said in this section on the characteristics of digital traces.

Conclusion

digital trace criminology

We are exposed to prejudices of individuals made on grounds of unfamiliarity with the subject matter rather that to relevant reference to actual weak spots of communication and information categories. Much information and communication information along with the corresponding equipment is classified and certificated in the safety manner at such level that is simply incomparable with any other technologies. Communication and information technologies contain a satisfactory quantity of the record information mechanisms, so on condition the examination and investigation procedures, objectively defined are observed along with the appropriate handling with collected digital traces, these technologies are reliable and unimpeachable evidence of activities which took place at the crime scene or by means of this technology. Basis for searching, ensuring and research of digital traces are knowledge about criminalistic and forensic concept digital traces. Situation in the field is year pro year worst. More and more traces are not ensured for acknowledge in this area. There are other scientific problem too. One of the main problem is the identification of the person responsible for a particular digital trace.

Only long term basic and applicable criminalistic and forensic research can help to improve the negative situation in the area of digital traces.

This contribution is the result of the project implementation: Centrum excelentnosti bezpecnostneho vyskumu kod ITMS: 26240120034 supported by the Research & Development Operational Program funded by the ERDF, task 3.3.

References

1. GreguSovd, E., GreguS, M., Krehel', O., 2013: Styri kl'iicove discipliny Corporate Governance a IT Governance. In: Scientific reflection of new trends in management : Zbomlk . - Praha: Policejnl akademie Ceskd republiky, 2013. - S. 29-40.

2. Metehko. J., et. al.. 2004: Criminalistic methods and possibilities to check upon sophisticated crime. Bratislava 2004. Academy of PF in Bratislava. 356 p., p. 7.

3. Metenko, J., Metenko, M., Hejda J., 2005: Digital trace. 7th International symposium on forensic sciences Sep 29th - Oct 1st, 2005, Casta - Slovak republic. KEU PZ PPZ. Bratislava 2005. (s.182) s. 55-79.

4. Metenko, M., 2012: Hacker attack to IS, In.:. Ed. Jasek, R., Internet, competitivneness and organizational security. Process management and the Use of Modern Technologies : mezinarodni konference, : XIV. Annual Internationali conference : March 27.-28. 2012, Zlln. Czech republic, Univerzita T. Bati, Zlln 2012, CD anotacii aprispevkov. s. 65-69, www.utb.cz,.

5. Metehko, M., 2018: Stopy v informacnych systemoch. Dizertacna praca, Katedra informatiky a managementu Akademie Policajneho zboru v Bratislave, skolitefka doc. RNDr. Eudmila GraguSova, CSc.. Bratislava 2018, 167 str.

6. Pefovsky, M., Lbffler, B., 2017: Teoreticko-spolodensky a socialny rozmer met6d a postupov v sluzobnej Crnnosti policajtov. In.- Quo Vadis, socialni prace v CR? I David Zamek, Jana Firstova a koi. - Praha : Institut pro vefejnou spravu, 2017. - S. 196-203.

7. Raburu G., Omollo R, Okumu D.2018 : Applying Data Mining Principles in theExtraction of Digital Evidence, In.:International Journal of Computer Science and Mobile Computing, Vol.7 Issue.3, March- 2018, pg. 101-109, 2018, IJCSMC All Rights Reserved, Available Online at www.ijcsmc.com, International Journal of Computer Science and Mobile Computing, A Monthly ournal of Computer Science and Information Technology, 088X, IMPACT FACTOR: 6.017, IJCSMC, Vol. 7, Issue. 3, March 2018, pg.101 - 109.,

8. Rak R., Jan leek P. 2000: Identification in criminalistic and security practice supported by computer technology, Expertise n. 3/2000, volume V, p. 30-38, 2000.

9. Rak, R.2000: Information science in criminalistic and security practice. Prague, Police Presidium CR, 2000. (471),

10. Rak, R., Porada V., 2003:General and specific features of identification and verification of persons and things from the viewpoint of IT use in security practice in relation to criminalistics and forensic sciences, Criminalistics and forensic sciences, Booklet from specialized seminar, 2003, Academy of PF in Bratislava, p. 25-63.

Размещено на Allbest.ru

...

Подобные документы

  • Защита авторских прав как достаточно сложное правовое явление, что порождает неоднозначные подходы к его изучению, особенности и средства реализации данного процесса во Всемирной паутине. DRM – digital rights management как управление цифровыми правами.

    реферат [23,8 K], добавлен 18.04.2013

  • "E-democracy" is a public use of Internet technologies Analysis of the problems dialogue information and of the notional device, uniform and available for specialists, facilities of the electronic constitutional court, on-line participation of citizens.

    реферат [17,1 K], добавлен 14.02.2015

  • General characteristics of the personal security of employees. Bases of fight against a corruption in the tax service of Ukraine. Personal safety of the tax police, concept, content, principles. Legislative regulation of non-state security activity.

    реферат [24,7 K], добавлен 08.10.2012

  • Characteristics of the state apparatus Ukraine: the concept, content and features, fundamental principles of organization and operation of state apparatus. Structure of the state apparatus and its correlation with the mechanism of state.

    курсовая работа [25,1 K], добавлен 08.10.2012

  • Understanding the science of constitutional law. Organization of state power and the main forms of activity of its bodies. The study of the constitutional foundations of the legal status of the citizen, local government. Research on municipal authorities.

    реферат [15,3 K], добавлен 14.02.2015

  • The constitution, by the definition of K. Marx, the famous philosopher of the XIXth. Real purpose of the modern Constitution. Observance and protection of human rights and a citizen. Protection of political, and personal human rights in the society.

    реферат [19,2 K], добавлен 10.02.2015

  • Constitutionalism as political and legal theory and practice of development of the constitutional democratic state and civil society. Principles of modern constitutional system of board. Role of society in the course of formation of municipal authority.

    реферат [18,5 K], добавлен 07.01.2015

  • Globalization of the theory, ideology and practice of modern constitutionalism on the border of millennia. The development of the constitutional ideas and institutes. Analyze the model of the Ukrainian constitutionalism and its realization in practice.

    реферат [25,5 K], добавлен 07.01.2015

  • Placing the problem of human rights on foreground of modern realization. The political rights in of the Islamic Republic Iran. The background principles of vital activity of the system of judicial authorities. The executive branch of the power in Iran.

    реферат [30,2 K], добавлен 14.02.2015

  • The basic concepts of comprehension. The general theoretical study of the concept of law, its nature, content and form of existence in the context of the value of basic types of law and distinguishing features broad approach to understanding the law.

    курсовая работа [28,5 K], добавлен 08.10.2012

  • Concept, importance of the Constitution as the fundamental law of the state, the history of development. Features of the constitutions of the leading powers of the European continent. Factors that influence the content of the Constitution of Bulgaria.

    реферат [21,4 K], добавлен 14.02.2015

  • Consideration of sovereignty as a basic constitutional principles of state law (for example, the countries - members of the Commonwealth of Independent States). Legislative support in Ukraine national development in the socio-cultural (spiritual) sphere.

    реферат [20,1 K], добавлен 13.02.2015

  • Adoption of resolution about institution of the new Council on human rights. The role of the constitutional courts of the subjects of the RF is in rendering the influence upon adduction in correspondence of the legislation of the subjects of the RF.

    реферат [26,0 K], добавлен 14.02.2015

  • Проблеми становлення інформаційного суспільства в Україні. Світова електронна мережа правових документів global legal information network. Види і мета юридичної відповідальності в інформаційному праві. Перспективи розвитку загального законодавства.

    реферат [25,0 K], добавлен 22.05.2009

  • The concept and characteristics of the transaction. System of the rules operating social relations in the field of civil movement. Classification of transactions of various types. The validity of the transaction is recognized for it as a legal fact.

    реферат [19,5 K], добавлен 24.03.2009

  • The notion of substance, the principles and characteristics of their treatment, as well as a reflection of these processes in the legislation of the state. Methods of dealing with illegal distribution of substances, the their effects on the human psyche.

    презентация [3,0 M], добавлен 07.11.2014

  • The nature and justification of fundamental legal changes in modern society due to the globalization of cultures and civilizations. Directions and features of Ukrainian law, the requirements for the cost of litigation and particularly its improvement.

    реферат [18,4 K], добавлен 14.02.2015

  • Сritical comparison of Infrared analysis and Mass Spectrometry. Summary of the uses in forensic, the molecular structural mass spectral. The method provides better sensitivity in comparison. To conclude, both techniques are helpful in the forensic study.

    реферат [20,1 K], добавлен 21.12.2011

  • The characteristics and structure of constitutional law of Ukraine, factors affecting its formation and development, the current trend. Reform and the direction of change of the legal branch of the state. Principles of functioning of constitutional law.

    реферат [40,5 K], добавлен 13.02.2015

  • The concept of special tools and equipment. Implementation of technical means in the work of the Interior. Organizational-methodical and tactical basics of using technology in law enforcement agencies. Methods of the active defense, personal protection.

    реферат [35,6 K], добавлен 08.10.2012

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.