Search results

1 – 10 of 267
Open Access
Article
Publication date: 9 February 2023

Gunnar Lindqvist and Joakim Kävrestad

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the…

Abstract

Purpose

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the research seeks to examine whether privacy concerns and lower willingness correlate with one another and thereby investigate whether privacy concerns could lead to fewer crimes being reported and resolved.

Design/methodology/approach

A mobile phone survey was distributed to 400 Swedish adults to identify their hypothetical willingness to report certain crimes with and without handing in their mobile phones as evidence. The results were then analysed using inferential statistics.

Findings

The result suggests that there is no meaningful correlation between privacy attitudes and willingness to report crime when the handover of a mobile phone is necessary. The results of this study however show a significant lower willingness to report crimes when the mobile phone must be handed in.

Research limitations/implications

Because the chosen target group were Swedish adults, the research results may lack generalisability for other demographics. Therefore, researchers are encouraged to test other demographics.

Originality/value

This paper’s contribution is the novel exploration of attitudes and behaviours regarding the combination of privacy, digital forensics, mobile phones and crime reportage. This research effort examined the problematic situation that can arise for victims of crime, the invasion of privacy when providing evidence by handing in a mobile phone to the police’s forensic unit for examination.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 October 2019

Sisira Dharmasri Jayasekara and Iroshini Abeysekara

The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral…

Abstract

Purpose

The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context.

Design/methodology/approach

This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study.

Findings

The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions.

Research limitations/implications

This study was limited to the members of the BIMSTEC.

Originality/value

This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.

Details

Journal of Money Laundering Control, vol. 22 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 9 November 2015

Himanshu Srivastava and Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

1498

Abstract

Purpose

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.

Design/methodology/approach

Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.

Findings

Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.

Research limitations/implications

The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.

Practical implications

The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.

Originality/value

This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 February 2019

Vinayak Agrawal and Shashikala Tapaswi

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this…

Abstract

Purpose

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.

Design/methodology/approach

Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.

Findings

Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.

Research limitations/implications

As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.

Practical implications

Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.

Originality/value

This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 June 2012

Ahmed Patel, Wei Qi and Mona Taghavi

Mobile agent‐based e‐marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their…

Abstract

Purpose

Mobile agent‐based e‐marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their businesses to outreach larger markets without regional and continental boundaries. Every distributed system is unable to avoid security problems due to the open internet environment. Mobile agent‐based e‐marketplaces are no exceptions. The purpose of this paper is to design and implement a framework and system of a secure and trustworthy mobile agent‐based e‐marketplace to overcome this problem.

Design/methodology/approach

The authors present an analysis and evaluation of a secure and trustworthy mobile agent‐based e‐marketplace, which was specified and prototyped. The experimental results of the implemented system are used to address the evaluation of the system. The discussion of the solution is also presented.

Findings

The evaluation and performance results show that the proposed framework and system have the ability to provide a secure and efficient e‐marketplace environment for trading products. The authors draw conclusions and highlight future work on this specific research area.

Originality/value

The performance and scalability are the two most important issues for mobile‐agent based systems together with their feasibility. The evaluation and performance results are used to reflect the results of the research in its entirety.

Details

Information Management & Computer Security, vol. 20 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
308

Abstract

Details

Library Hi Tech News, vol. 32 no. 6
Type: Research Article
ISSN: 0741-9058

Open Access
Article
Publication date: 16 July 2021

Karen Renaud and Jacques Ophoff

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…

6510

Abstract

Purpose

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.

Design/methodology/approach

In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.

Findings

The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.

Research limitations/implications

While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.

Practical implications

The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.

Originality/value

This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 31 December 2006

Maulin Patel, S. Venkateson and R. Chandrasekaran

A critical issue in the design of routing protocols for wireless sensor networks is the efficient utilization of resources such as scarce bandwidth and limited energy supply. Many…

Abstract

A critical issue in the design of routing protocols for wireless sensor networks is the efficient utilization of resources such as scarce bandwidth and limited energy supply. Many routing schemes proposed in the literature try to minimize the energy consumed in routing or maximize the lifetime of the sensor network without taking into consideration limited capacities of nodes and wireless links. This can lead to congestion, increased delay, packet losses and ultimately to retransmission of packets, which will waste considerable amount of energy. This paper presents a Minimum‐cost Capacity‐constrained Routing (MCCR) protocol which minimize the total energy consumed in routing while guaranteeing that the total load on each sensor node and on each wireless link does not exceed its capacity. The protocol is derived from polynomial‐time minimum‐cost flow algorithms. Therefore protocol is simple and scalable. The paper improves the routing protocol in (1) to incorporate integrality, node capacity and link capacity constraints. This improved protocol is called Maximum Lifetime Capacity‐constrained Routing (MLCR). The objective of MLCR protocol is to maximize the time until the first battery drains its energy subject to the node capacity and link capacity constraints. A strongly polynomial time algorithm is proposed for a special case of MLCR problem when the energy consumed in transmission by a sensor node is constant. Simulations are performed to analyzed the performance of the proposed protocols.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 10 October 2018

Zabihollah Rezaee and Jim Wang

This paper aims to examine the relevance of Big Data to forensic accounting practice and education by gathering opinions from a sample of academics and practitioners in China.

5467

Abstract

Purpose

This paper aims to examine the relevance of Big Data to forensic accounting practice and education by gathering opinions from a sample of academics and practitioners in China.

Design/methodology/approach

The authors conduct a survey of academics and practitioners regarding the desired demand, importance and content of Big Data educational skills and topics for forensic accounting education to effectively respond to challenges and opportunities in the age of Big Data.

Findings

Results indicate that the demand for and interest in Big Data/data analytics and forensic accounting will continue to increase; Big Data/data analytics and forensic accounting should be integrated into the business curriculum; many of the suggested Big Data topics should be integrated into forensic accounting education; and some attributes and techniques of Big Data are important in improving forensic accounting education and practice.

Research limitations/implications

Readers should interpret the results with caution because of the sample size (95 academics and 103 practitioners) and responses obtained from academics and practitioners in one country (China) that may not be representative of the global population.

Practical implications

The results are useful in integrating Big Data topics into the forensic accounting curriculum and in redesigning the forensic accounting courses/programs.

Social implications

The results have implications for forensic accountants in effectively fulfilling their responsibilities to their profession and society by combating fraud.

Originality/value

This study provides educational, research and practical implications as Big Data and forensic accounting are advancing.

Details

Managerial Auditing Journal, vol. 34 no. 3
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 14 May 2020

Di Wu, Lei Wu, Alexis Palmer, Dr Kinshuk and Peng Zhou

Interaction content is created during online learning interaction for the exchanged information to convey experience and share knowledge. Prior studies have mainly focused on the…

Abstract

Purpose

Interaction content is created during online learning interaction for the exchanged information to convey experience and share knowledge. Prior studies have mainly focused on the quantity of online learning interaction content (OLIC) from the perspective of types or frequency, resulting in a limited analysis of the quality of OLIC. Domain concepts as the highest form of interaction are shown as entities or things that are particularly relevant to the educational domain of an online course. The purpose of this paper is to explore a new method to evaluate the quality of OLIC using domain concepts.

Design/methodology/approach

This paper proposes a novel approach to automatically evaluate the quality of OLIC regarding relevance, completeness and usefulness. A sample of OLIC corpus is classified and evaluated based on domain concepts and textual features.

Findings

Experimental results show that random forest classifiers not only outperform logistic regression and support vector machines but also their performance is improved by considering the quality dimensions of relevance and completeness. In addition, domain concepts contribute to improving the performance of evaluating OLIC.

Research limitations/implications

This paper adopts a limited sample to train the classification models. It has great benefits in monitoring students’ knowledge performance, supporting teachers’ decision-making and even enhancing the efficiency of school management.

Originality/value

This study extends the research of domain concepts in quality evaluation, especially in the online learning domain. It also has great potential for other domains.

Details

The Electronic Library , vol. 38 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

1 – 10 of 267