scholarly journals Indicative Method of Human Failure in Sustainable Chain of Custody Management

2021 ◽  
Vol XXIV (Special Issue 5) ◽  
pp. 709-725
Author(s):  
Malgorzata Slawinska ◽  
Kamil Wrobel
Author(s):  
Matthew N.O. Sadiku ◽  
Adebowale E. Shadare ◽  
Sarhan M. Musa

Digital chain of custody is the record of preservation of digital evidence from collection to presentation in the court of law. This is an essential part of digital investigation process.  Its key objective is to ensure that the digital evidence presented to the court remains as originally collected, without tampering. The chain of custody is important for admissible evidence in court. Without a chain of custody, the opposing attorney can challenge or dismiss the evidence presented. The aim of this paper is to provide a brief introduction to the concept of digital chain custody.


Circular ◽  
1997 ◽  
Author(s):  
Christine M. Murphy ◽  
Paul H. Briggs ◽  
Betty M. Adrian ◽  
Steve A. Wilson ◽  
Phil L. Hageman ◽  
...  
Keyword(s):  

2021 ◽  
Author(s):  
Toni Wäfler ◽  
Rahel Gugerli ◽  
Giulio Nisoli

We all aim for safe processes. However, providing safety is a complex endeavour. What is it that makes a process safe? And what is the contribution of humans? It is very common to consider humans a risk factor prone to errors. Therefore, we implement sophisticated safety management systems (SMS) in order to prevent potential "human failure". These SMS provide an impressive increase of safety. In safety science this approach is labelled "Safety-I", and it starts to be questioned because humans do not show failures only. On the contrary, they often actively contribute to safety, sometimes even by deviating from a procedure. This "Safety-II" perspective considers humans to be a "safety factor" as well because of their ability to adjust behaviour to the given situation. However, adaptability requires scope of action and this is where Safety-I and Safety-II contradict each other. While the former restricts freedom of action, the latter requires room for manoeuvring. Thus, the task of integrating the Safety-II perspective into SMS, which are traditionally Safety-I based, is difficult. This challenge was the main objective of our project. We discovered two methods that contribute to the quality of SMS by integrating Safety-II into SMS without jeopardizing the Safety-I approach.


2007 ◽  
Vol 66 (2) ◽  
pp. 146-162
Author(s):  
Stefan Van den Bossche

Het menselijke tekort in het algemeen, het rampzalige van de oorlog, de sociale en  culturele aspecten van de Vlaamse beweging, het Vlaams kunstleven aan de IJzer, het activisme, het frontisme: al die geladen thema’s komen rechtstreeks of onrechtstreeks aan bod in de bijdrage van Stefan Van den Bossche over Jos Verdegem (1897-1957). Deze minder bekende Gentse schilder uit het interbellum kwam eerst in nauwe betrekking met de expressionistische dichter en journalist Wies Moens en met andere vooraanstaande Vlaamsgezinde kunstenaars. Verdegems (tijdelijk) verblijf in Parijs en zijn huwelijk met een Française leidde er uiteindelijk toe dat hij vervreemde van het Vlaamsgezinde milieu. Daarenboven droegen zijn hoekige karaktereigenschappen er toe bij dat hij “eerder berucht dan beroemd” werd.________"A quiet, ill-mannered working-class lad". Jos Verdegem (1897-1957), Wies Moens and "Ter Waarheid"This contribution by Stefan Van den Bossche about Jos Verdegem (1897-1957) deals directly or indirectly with a variety of very meaningful topics such as human failure in general, the calamity of war, the social and cultural aspects of the Flemish movement, Flemish art life on the IJzer, activism, and frontism.This lesser-known painter from Ghent from the Interbellum period first came in close contact with the expressionist poet and journalist Wies Moens and with other prominent Flemish nationalist artists. Verdegem's (temporary) stay in Paris and his marriage to a Frenchwoman caused his ultimate estrangement from the Flemish nationalist environment. Moreover, his awkward characteristics contributed to his becoming "infamous rather than famous".


Data ◽  
2021 ◽  
Vol 6 (7) ◽  
pp. 71
Author(s):  
Gonçalo Carnaz ◽  
Mário Antunes ◽  
Vitor Beires Nogueira

Criminal investigations collect and analyze the facts related to a crime, from which the investigators can deduce evidence to be used in court. It is a multidisciplinary and applied science, which includes interviews, interrogations, evidence collection, preservation of the chain of custody, and other methods and techniques of investigation. These techniques produce both digital and paper documents that have to be carefully analyzed to identify correlations and interactions among suspects, places, license plates, and other entities that are mentioned in the investigation. The computerized processing of these documents is a helping hand to the criminal investigation, as it allows the automatic identification of entities and their relations, being some of which difficult to identify manually. There exists a wide set of dedicated tools, but they have a major limitation: they are unable to process criminal reports in the Portuguese language, as an annotated corpus for that purpose does not exist. This paper presents an annotated corpus, composed of a collection of anonymized crime-related documents, which were extracted from official and open sources. The dataset was produced as the result of an exploratory initiative to collect crime-related data from websites and conditioned-access police reports. The dataset was evaluated and a mean precision of 0.808, recall of 0.722, and F1-score of 0.733 were obtained with the classification of the annotated named-entities present in the crime-related documents. This corpus can be employed to benchmark Machine Learning (ML) and Natural Language Processing (NLP) methods and tools to detect and correlate entities in the documents. Some examples are sentence detection, named-entity recognition, and identification of terms related to the criminal domain.


2005 ◽  
Vol 7 (3) ◽  
pp. 345-355 ◽  
Author(s):  
Natalia Vidal ◽  
Robert Kozak ◽  
David Cohen

2019 ◽  
Vol 9 (15) ◽  
pp. 3097 ◽  
Author(s):  
Diego Renza ◽  
Jaime Andres Arango ◽  
Dora Maria Ballesteros

This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and cloud storage. When the audio is recorded, a hash code is generated in situ by the capture module (an application), and it is sent immediately to the cloud. Later, the integrity of the audio recording given as evidence can be verified according to the information stored in the cloud. To validate the properties of the proposed scheme, we conducted several tests to evaluate if two different inputs could generate the same hash code (collision resistance), and to evaluate how much the hash code changes when small changes occur in the input (sensitivity analysis). According to the results, all selected audio signals provide different hash codes, and these values are very sensitive to small changes over the recorded audio. On the other hand, in terms of computational cost, less than 2 s per minute of recording are required to calculate the hash code. With the above results, our system is useful to verify the integrity of audio recordings that may be relied on as digital evidence.


Sign in / Sign up

Export Citation Format

Share Document