A Brief Introduction

Author(s):  
Julia Hörnle

Chapter 1 introduces the Jurisdictional Challenge, that is, the situation where multiple courts may be competent or no court may be competent, and briefly explains the key features of internet technologies such as remoteness, decentralization, and ubiquity, which have given rise to the Jurisdictional Challenge. It briefly explains how internet technologies such as wireless networking, ubiquitous broadband, peer-to-peer file sharing, cloud computing, and blockchain are all increasing this trend. This chapter analyses why law enforcement on the internet is difficult and provides an overview of the book chapters.

Author(s):  
Amin Ibrahim

The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This chapter focuses on the child pornography and IT, and the various methods to combat this problem. The ease of acquiring IT and digital equipments, the global reach of Internet and freely available peer-to-peer services have made child pornography a very complex issue to undertake. The borderless nature of the Internet and the lack of unified criminal code among nations further escalated the complexity of law enforcement against child pornography.


Author(s):  
Jerald Hughes ◽  
Karl Reiner Lang

In 1999, exchanges of digital media objects, especially files of music, came to constitute a significant portion of Internet traffic, thanks to a new set of technologies known as peer-to-peer (P2P) file-sharing systems. The networks created by software applications such as Napster and Kazaa have made it possible for millions of users to gain access to an extraordinary range of multimedia files. However, the digital product characteristics of portability and replicability have posed great challenges for businesses that have in the past controlled the markets for image and sound recordings. ‘Peer-to-peer’ is a type of network architecture in which the various nodes may communicate directly with other nodes, without having to pass messages through any central controlling node (Whinston, Parameswaran, & Susarla, 2001). The basic infrastructure of the Internet relies on this principle for fault tolerance; if any single node ceases to operate, messages can still reach their destination by rerouting through other still-functioning nodes. The Internet today consists of a complex mixture of peer-to-peer and client-server relationships, but P2P file-sharing systems operate as overlay networks (Gummadi, Saroiu, & Gribble, 2002) upon that basic Internet structure. P2P file-sharing systems are software applications which enable direct communications between nodes in the network. They share this definition with other systems used for purposes other than file sharing, such as instant messaging, distributed computing, and media streaming. What these P2P technologies have in common is the ability to leverage the combined power of many machines in a network to achieve results that are difficult or impossible for single machines to accomplish. However, such networks also open up possibilities for pooling the interests and actions of the users so that effects emerge which were not necessarily anticipated when the network technology was originally created (Castells, 2000). In a narrow sense, P2P file-sharing systems refer to applications that exchange content over computer networks where the nodes act both as client and server machines, requesting and serving files (e.g., Kazaa, BitTorrent). In a wider sense, P2P file-sharing systems also include any application that lets peer users exchange digital content among themselves (e.g., YouTube, Flickr).


Author(s):  
K. Ravikumar ◽  
S. Ambika

Many Internet renovate supplier (ISPs) have organize peer-to-peer (P2P) hoard in their system in order to decrease valuable inter-ISP transfer. Capable heading question is important to the in general presentation of peer-to-peer (P2P) file contribution systems. Come together aristocracy by their extensive soothe can significantly get better the good quality association of file hesitation. Clustering aristocracy by their corporeal nearness can also get better file enquiry recital. P2P rose to successful profitable system in the internet. It represent the best embodiment of the end to end quarrel, the regularly doubtful plan philosophy that guide the intend of the internet. A work of fiction P2P architecture is planned which attaches ratings to the uploaded text directly. These ratings then develop into as score constituent in its XML statement which has quite a few youngster basics for in twist classification. Eventually, we communicate possible attack on the secrecy of these system and provide examples of demanding attack and martial protector second-hand by the organization we elucidate.


2018 ◽  
Vol 7 (4.35) ◽  
pp. 866
Author(s):  
Gopinath Muruti ◽  
Siti Hawa Mokhtar ◽  
Fiza Abdul Rahim ◽  
Zul-Azri Ibrahim ◽  
Abbas M. Al-Ghaili

Forensics is a vital point for law enforcement, civil litigators, and different experts who manage complex advanced examinations. Digital forensics has assumed a noteworthy part in a portion of the biggest criminal and civil investigations. However, the ascent in the prevalence of big data as a better approach for unraveling the challenges exhibited by huge, complex data due to the progression of innovations such as the Internet, Internet of Things (IoT), and Cloud Computing. These challenges have contributed to data deluge and forensics tool limitations in the digital forensics investigation. In this paper, a number of challenges faced by the digital forensics investigator in a big data environment are discussed. The identified challenges could significantly contribute to a more efficient digital forensics process in the big data environment. 


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Sign in / Sign up

Export Citation Format

Share Document