scholarly journals Enkripcija mobilnog telefona kao prepreka otkrivanju i dokazivanju krivičnih dela – osvrt na uporedna rešenja

2021 ◽  
Vol 69 (2) ◽  
pp. 415-442
Author(s):  
Milana Pisarić

In detecting criminal offences, the police increasingly rely on electronic evidence. Due to ubiquitous digitization, data in electronic form with probative potential is found in an increasing number of sources. When the competent authorities need to collect potential electronic evidence from mobile phones, they face several normative and practical challenges. One of the important aggravating factors is the full-disk encryption of the device. Although functions of encryption cannot and must not be neglected in the modern digital environment, it has an obstructive role in criminal investigation. The competent authorities often have the appropriate authority to access the contents of a mobile phone, but they lack the technical ability to gain such access and collect data. After explaining the basic principles of encryption of mobile phones, the author analyzes the possible approaches for gaining access to a device protected by encryption, and indicates the possible legal basis for their application.

Author(s):  
Akhlesh Kumar ◽  
Bhushan Ghode ◽  
Khevna Maniar ◽  
Dr. S. K. Jain

Forensic laboratories are frequently subjected to mobile devices that are assailed by shock or forced damage which might be the result of intentional efforts to destroy proof from the devices or accidental exposure. Chip-off technique is an effective method for data retrieval from such kind of exhibits. However, nowadays all mobiles phones are securely encrypted with full disk encryption (FDE) or file-based encryption (FBE) which makes chip-off forensics an improbable process to successfully retrieve data. In many of these cases, the encryption is on the hardware and hence, the device could be successfully decrypted by bringing it in its original condition. Thus, the original user data can be obtained for investigative purposes. This process can be enabled by replacement of electronic parts of the original device which contains user data and decryption keys i.e. PCB to the new host. This research paper covers a case study of a mobile phone obtained in broken and shattered condition whose diagnosis of PCB and subsequent actions led to data recovery.


2016 ◽  
Vol 4 (02) ◽  
Author(s):  
Haris Richard Adrian Taruma Selej

in the era of technology has greatly advanced, mobile phones have become a necessity and a means of communicating with each other. even though they are separated by a considerable distance, no longer need to spend the time to meet physically. This reason also makes the phone as the primary choice for criminals to communicate. communication used a variety of purposes, such as positive or negative. In 2010, digital forensic analyst team has examined such as network Puslabfor drugs, pornography, gambling, corruption, defamation, fraud, bribery, and others. Of these, as many as 118 types of mobile phones in the form of evidence. It means that offenders still consider mobile phones as a primary communication tool. Digital forensic analysts and investigators, it shall be able to anticipate these things, so that when there is evidence of mobile phone, which was confiscated from criminals, can be checked properly in accordance with the basic principles of digital forensics. This study uses DFIF (Digital Forensic Investigation Framework) smartphone investigation by searching for evidence of a conversation via text message. the results of the investigation evidence to prove the offender information, the information will be presented in the form of a forensic report which will be used as evidence in court.


2014 ◽  
Vol 35 (3) ◽  
pp. 158-165 ◽  
Author(s):  
Christian Montag ◽  
Konrad Błaszkiewicz ◽  
Bernd Lachmann ◽  
Ionut Andone ◽  
Rayna Sariyska ◽  
...  

In the present study we link self-report-data on personality to behavior recorded on the mobile phone. This new approach from Psychoinformatics collects data from humans in everyday life. It demonstrates the fruitful collaboration between psychology and computer science, combining Big Data with psychological variables. Given the large number of variables, which can be tracked on a smartphone, the present study focuses on the traditional features of mobile phones – namely incoming and outgoing calls and SMS. We observed N = 49 participants with respect to the telephone/SMS usage via our custom developed mobile phone app for 5 weeks. Extraversion was positively associated with nearly all related telephone call variables. In particular, Extraverts directly reach out to their social network via voice calls.


Author(s):  
Huyen Thi Nguyen ◽  
Ngoc Minh Nguyen

The purpose of this study is to examine the effect of prestige sensitivity on mobile phone customer’s price acceptance in Vietnam and the mediating role of product knowledge and price mavenism on this relationship. We used the convenience sampling method for data collection via questionnaires with a sample of 605 consumers who purchased mobile phones. The collected data was analysed by applying a structural equation modelling method. The result indicates that prestige sensitivity has both direct and indirect effects on price acceptance via product knowledge and price mavenism. The findings suggest that prestige sensitivity can be used as a market segmentation criterion for mobile phones when making price decisions and providing customers with adequate information could improve price acceptance.


Author(s):  
Keith M. Martin

In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.


Author(s):  
Laura Stark

This chapter surveys and analyzes recent literature on mobile communication to examine its relationship to gender and development, more specifically how women in developing countries use and are impacted by mobile phones. Focusing on issues of power, agency, and social status, the chapter reviews how mobile telephony has been found to be implicated in patriarchal bargaining in different societies, how privacy and control are enabled through it, what benefits have been shown to accrue to women using mobile phones, and what barriers, limitations, and disadvantages of mobile use exist for women and why. The conclusion urges more gender-disaggregated analysis of mobile phone impact and use and offers policy and design recommendations based on the overview and discussion.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
S Pizzo ◽  
C Costantino ◽  
D Giliberti ◽  
I Calò ◽  
C Vella ◽  
...  

Abstract Background Nowadays, smartphone overuse affects massively teenagers and young adults. From 2014 to 2018 in Italy, for the 11-17 years age group, there has been an increase from 79.9% to 85.8% of daily mobile phone users. This project aims to investigate usage prevalence and misuse/addiction of mobile phones in a representative sample of first-grade secondary school students of the Province of Palermo, Italy, carrying out educational interventions to promote a proper and conscious use of smartphone. Materials and Methods An anonymous, standardized and previously validated pre-intervention questionnaire consisting of 39 items on general socio-demographic characteristics, attitudes and habits regarding smartphone usage, was administered online to 10-15 years old students of the Palermo's Province. Moreover, two additional sets of 11 and 15 items contributed to calculate a Misuse and an Addiction Score, respectively. After administration, educational interventions aimed at promoting the correct and conscious use of the smartphone, were carried out. Results A total of 1600 students belonging to 16 schools, responded to the questionnaire. 93% of the sample had a personal smartphone and 84% had a personal profile on at least one social network. About 15% of the sample experienced cyber bullying episodes and 30% accessed to adult content online (38% of parents didn't set parental control on the devices). Overall, 78.3% of the sample showed a moderate to severe misuse and 38.3% a moderate to severe addiction to mobile phones. Conclusions The uncontrolled and unconscious use of smartphones among adolescents exposes to different health risks including psycho-social and cognitive-relational problems. Results obtained demonstrate high levels of misuse and addiction to mobile devices in a representative sample of students in a developed Country, suggesting the need to implement educational interventions and the development of guidelines to encourage a responsible use of smartphones. Key messages The present study highlights an uncontrolled and unconscious use of mobile phones among 11-15 years old aged students in Southern Italy. The implementation of educational intervention at school and the development of guidelines regulating smartphone usage among adolescents, should represent a future global health priority.


Safety ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 17
Author(s):  
Miroslava Mikusova ◽  
Joanna Wachnicka ◽  
Joanna Zukowska

The topic of the use of mobile devices and headphones on pedestrian crossings is much less explored in comparison to the use of the mobile phone while driving. Recent years have seen many discussions on this issue, especially in foreign countries. The Slovak Republic, however, has not been giving it enough attention (and it is not mentioned in the National Road Safety Plan for the Slovak Republic from 2011 to 2020). This paper aims to draw attention to this issue. It presents basic outputs of a pilot study on pedestrian safety, with a focus on the use of mobile devices and headphones at selected non-signalized pedestrian crossings in three Slovak cities. Overall, 9% of pedestrians used headphones or mobile devices at observed pedestrian crossings (4% of them used headphones, 1% used headphones and at same time used their mobile phone, 2% made phone calls and 2% used their mobile phones). While these numbers can be considered relatively low, the study proved that during weekdays every 2 min someone was using the crossing without fully focusing on crossing the road safely. Another main finding was that although the safety risk at pedestrian crossings is increased by factors such as rush hour traffic or reduced visibility, pedestrian behavior related to the use of mobile phones and headphones does not change. A safety assessment was also carried out at the crossings. The results show that pedestrian behavior is not affected by the level of safety of the crossing (e.g., visibility of the crossing for drivers). The results of the presented analysis suggest that action is needed to change that. Due to the lack of information about accidents involving pedestrians using mobile phones and headsets when crossing the road, no relevant statistical data could be analyzed. The dataset collected can be used as a basis for further investigation or comparisons with other countries of the relevant indicators. In future work, we would like to include a pedestrian–driver interaction factor focusing on driver speed behavior in relation to pedestrians (who are on or are about to step onto a pedestrian crossing) and identify critical situations caused by improper behavior of drivers and/or pedestrians. This will help to understand speed adjustment problems related to pedestrian crossings.


2014 ◽  
Vol 602-605 ◽  
pp. 3363-3366
Author(s):  
Yi Ming Sun ◽  
Chun Lei Han

In order to automatically identify the mobile phones' reviews that the users comment on the mobile phone on the internet and obtain valuable information from the reviews, this paper presents the process of constructing ontology for the mobile phones' reviews and preliminarily establish a domain ontology of the mobile phones' reviews. The ontology construction adopts the Protégé tool and the Seven Steps method of Stanford University research. The ontology can provide convenience for the semantic information mining on Web mobile phones' reviews, and it can provide a new method to effectively mine the use feelings of the phone from a large number of mobile phone users' reviews.


Sign in / Sign up

Export Citation Format

Share Document