Minimization of Personal Information Infringement in Criminal investigation by Utilizing De-identified Communication Information

2019 ◽  
Vol 30 (1) ◽  
pp. 93-122
Author(s):  
Hyun-jun Park ◽  
Sang-jin Lee
2015 ◽  
Vol 23 (5) ◽  
pp. 450-475 ◽  
Author(s):  
Himanshu Srivastava ◽  
Shashikala Tapaswi

Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them. Design/methodology/approach – Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods. Findings – Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified. Research limitations/implications – The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices. Practical implications – The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation. Originality/value – This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.


2020 ◽  
Vol 43 ◽  
Author(s):  
John Corbit ◽  
Chris Moore

Abstract The integration of first-, second-, and third-personal information within joint intentional collaboration provides the foundation for broad-based second-personal morality. We offer two additions to this framework: a description of the developmental process through which second-personal competence emerges from early triadic interactions, and empirical evidence that collaboration with a concrete goal may provide an essential focal point for this integrative process.


2002 ◽  
Vol 30 (3) ◽  
pp. 466-474

In In re Pharmatrak, Inc. Privacy Litigation, website users brought suit claiming that major pharmaceutical corporations and a web monitoring company violated three federal statutes protecting electronic communications and data by collecting web traffic data and personal information about website users. On August 13,2002, the District Court of Massachusetts dismissed these allegations, holding that the defendants were parties to the communications and thus exempted under the statutory language.The court also found that plaintiffs had not suffered an amount of damages required to sustain private action.


2020 ◽  
Vol 10 (2) ◽  
pp. 27-35
Author(s):  
Suhyeon Kim ◽  
Sumin Kang ◽  
Jaein Yoo ◽  
Gahyeon Lee ◽  
Hyojeong Yi ◽  
...  

2019 ◽  
Vol 19 (2) ◽  
pp. 29-38
Author(s):  
Young-Hee Kim ◽  
◽  
Taek-Hyun Lee ◽  
Jong-Myoung Kim ◽  
Won-Hyung Park ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document