scholarly journals The Forensic Curator: Digital Forensics as a Solution to Addressing the Curatorial Challenges Posed by Personal Digital Archives

2012 ◽  
Vol 7 (2) ◽  
pp. 40-63
Author(s):  
Gareth Knight

The growth of computing technology during the previous three decades has resulted in a large amount of content being created in digital form. As their creators retire or pass away, an increasing number of personal data collections, in the form of digital media and complete computer systems, are being offered to the academic institutional archive. For the digital curator or archivist, the handling and processing of such digital material represents a considerable challenge, requiring development of new processes and procedures. This paper outlines how digital forensic methods, developed by the law enforcement and legal community, may be applied by academic digital archives. It goes on to describe the strategic and practical decisions that should be made to introduce forensic methods within an existing curatorial infrastructure and how different techniques, such as forensic hashing, timeline analysis and data carving, may be used to collect information of a greater breadth and scope than may be gathered through manual activities.

Author(s):  
David A. Dampier ◽  
A. Chris Bogen

This chapter introduces the field of digital forensics. It is intended as an overview to permit the reader to understand the concepts and to be able to procure the appropriate assistance should the need for digital forensics expertise arise. Digital forensics is the application of scientific techniques of discovery and exploitation to the problem of finding, verifying, preserving, and exploiting digital evidence for use in a court of law. It involves the use of hardware and software for finding evidence of criminal activity on digital media, either in a computer or in a network device, and attributing that evidence to a suspect for the purposes of conviction. Digital forensics can also be used for non-law enforcement purposes. Data recovery is a form of computer forensics used outside of the legal arena. The authors hope that the reader will understand some of the intricacies of digital forensics and be able to intelligently respond to incidents requiring a digital forensic response.


2012 ◽  
Vol 30 (3) ◽  
pp. 513-522
Author(s):  
Jason Bengtson

PurposeThe purpose of this paper is to define and stimulate interest in a potential new specialty within the information science field.Design/methodology/approachSources on digital forensics and digital archeology are discussed, and the topic is examined critically from a librarian perspective. The author examines the possibility of an information science specialty pursuing the reconstruction of “digital palimpsests”, where data that later becomes historically significant has been deleted or partially overwritten on digital media.FindingsThe author identifies at least one key incident (the NASA moon landing tapes) where this potential field has already started to be defined. Examination of the literature indicates that emphasis in data recovery to this point has centered on the needs of law enforcement and disaster recovery rather than on the considerations of manuscript preservation, recovery, and curation. The author emphasizes the need for librarians to bring together the skills of multiple fields, especially that of information technology, in order to shape the tools needed to take the lead in “digital palimpsest” recovery.Originality/valueThe author asserts that the recovery of “digital palimpsests” will become important as digital archives age and society's position on what has historical value inevitably shifts. The author further asserts that members of the information science field must actively work to take ownership of the field before it is subsumed by information technology or another discipline less equipped to manage its nebulous considerations effectively.


2017 ◽  
Vol 20 (9) ◽  
pp. 3304-3322 ◽  
Author(s):  
Holger Pötzsch

This article reconceptualizes the archive in the context of digital media ecologies. Drawing upon archival theory and critical approaches to the political economy of the Internet, I account for new dynamics and implications afforded by digital archives. Operating at both a user-controlled explicit and a state- and corporate-owned implicit level, the digital archive at once facilitates empowerment and enables unprecedented forms of management and control. Connecting the politics and economy of digital media with issues of identity formation and curation on social networking sites, I coin the terms iArchive and predictive retention to highlight how recent technological advances both provide new means for self-expression, mobilization and resistance and afford an almost ubiquitous tracking, profiling and, indeed, moulding of emergent subjectivities.


2018 ◽  
Vol 62 (10) ◽  
pp. 1319-1337 ◽  
Author(s):  
Yong Jin Park ◽  
Jae Eun Chung ◽  
Dong Hee Shin

This study presents a conceptual model of understanding algorithmic digital surveillance systems, borrowing insight from Giddens, who proposed the notion of structuration as social practices deriving from the intersection between structure and agents. We argue that the status of privacy, or lack of it, is a product of these interactions, of which the personal data practices and related interests constitute the reproduction of a data ecosystem. We trace the process of data production and consumption, dissecting the interactive dynamics between digital media producers (personal data users) and users (personal data producers). Inadequacies, limits, and social and policy implications of data surveillance and its algorithmic reproduction of identities are discussed.


2012 ◽  
Vol 4 (2) ◽  
pp. 28-48 ◽  
Author(s):  
George Grispos ◽  
Tim Storer ◽  
William Bradley Glisson

Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments, amongst other organizations. Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment, as well as discussing and identifying several new research challenges addressing this changing context.


2019 ◽  
Vol 3 (1) ◽  
pp. 157-183 ◽  
Author(s):  
Benedita Menezes Queiroz

Counter-terrorism and public security measures have significantly altered EU immigration law. Under the premise that EU instruments which regulate EU immigration databases influence the legal regime of irregularity of migrants’ statuses, the present article argues that the latest developments in the area of data technology contribute to the phenomenon of “crimmigration”. This is so not only because they may generate a sort of “digital illegality” due to their impact on the categorisation of migrants, but also because they enable a conflation of treatment of irregularity, asylum seeking and criminality. This article focuses on the recent amendments and proposals for amendments to the EURODAC Regulation, a database that regulates the asylum fingerprint system in the EU. This is revealing of the ongoing broadening of the purpose of that data and law enforcement access to the collected information. The argument finds its basis in three main trends common to these databases: the erosion of the principle of purpose limitation, the widening of access to data by law enforcement authorities, and the digitalisation of borders through biometrics. Ultimately, this article claims that the level of surveillance of certain categories of migrants that may cross the borders of the EU puts at risk the distinction between illegally staying irregular migrants and criminals, given that the treatment of their personal data is insufficiently clear in practice.


Author(s):  
Khoerul Umam

The spread of digital media on the internet was very broad, fast, and cannot be monitored in a structured manner about what media has been uploaded and distributed on the internet network. The spread of digital media like this was very difficult to detect whether the media that shared was privately owned or that of others that is re-shared by media theft or digital media piracy. One step to overcome the theft of digital works is to give them a watermark, which is an identity that is placed on top of the work. However, this is still considered unsafe because the identity attached can be cut and manipulated again until it is not visible. In addition, the use of Steganography method to hide messages in an image can still be manipulated by adding messages continuously so that it accumulates and damages the original owner of the image. In this article, the author provides a solution called Digital Watermarking, a step of encrypting the data of the original owner of the work and putting it into the image of his work. This watermark cannot be seen clearly, but actually in the media there is encrypted data with a strong Advanced Encryption Standard (AES) method. As a result, a tool that can improve the security of media owner data by combining the AES and Steganogaphy methods in the formation of new media that cannot be changed anymore. So, when the media is stolen and used by others and has been edited, the owner's personal data can never be changed.


Author(s):  
Catarina Sampaio ◽  
Luísa Ribas

The representation of identity in digital media does not necessarily have to be conceived on the basis of criteria that mimic physical reality. This article presents a model for representing individual identity, based on the recording of human experience in the form of personal data, as an alternative to the common forms of mimetic portraiture. As such, the authors developed the project Data Self-Portrait that aims to explore the creative possibilities associated with the concept of data portrait. It can be described as a means of representing and expressing identity through the application of data visualization techniques to the domain of portraiture, according to an exploratory design approach, based on visualizing the digital footprint. It thus seeks to develop design proposals for representing identity that respond to the growing dematerialization of human activities and explores the representational and expressive role of data visualization, according to a creative use of computational technologies.


2019 ◽  
pp. 281-292
Author(s):  
Gina Neff

The Internet and digital media are increasingly seen as having enormous potential for solving problems facing healthcare systems. This chapter traces emerging “digital health” uses and applications, focusing on the political economy of data. For many people, the ability to access their own data through social media and connect with people with similar conditions holds enormous potential to empower them and improve healthcare decisions. For researchers, digital health tools present new forms of always-on data that may lead to major discoveries. Technology and telecommunications companies hope their customers? data can answer key health questions or encourage healthier behavior. At the same time, Gina Neff argues that digital health raises policy and social equity concerns regarding sensitive personal data, and runs a risk of being seen as a sort of silver bullet instead of mere technological solutionism.


Sign in / Sign up

Export Citation Format

Share Document