Emerging Role of Digital Forensics in the Investigation of Online Child Pornography

2019 ◽  
Vol 13 (3) ◽  
pp. 199
Author(s):  
Nirmal Rallan ◽  
Komal Vig
2019 ◽  
Vol 22 (4) ◽  
pp. 744-752
Author(s):  
Sisira Dharmasri Jayasekara ◽  
Iroshini Abeysekara

Purpose The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context. Design/methodology/approach This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study. Findings The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions. Research limitations/implications This study was limited to the members of the BIMSTEC. Originality/value This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.


2012 ◽  
Vol 25 (2) ◽  
pp. 121-136 ◽  
Author(s):  
Zaklina Spalevic ◽  
Zeljko Bjelajac ◽  
Marko Caric

Scientific-technological development, along with initiating integrative forces that offer improvement of the quality of human life, concurrently created prerequisites for individuals to exploit certain innovations for performing criminal activities. Modern criminals wander through electronic networks, and assisted by high technology, perform a variety of criminal acts and ?launder? large sums of money. Computer forensics is a technological, systemic control of the computer system and its content for the purpose of gathering evidence of a criminal act or other abuse that it has been used for. Digital forensics requires particular expertise that goes beyond traditional data collection, as well as employment of techniques available to the final user or system support personnel. In this context, this article examines principles, methods and procedures in mobile device investigation, which nowadays represent a multifunctional, powerful computer weapon, and considers the necessity to update concrete procedures in accordance with the development and growth of IT.


2019 ◽  
Vol 20 (1) ◽  
pp. 1-19
Author(s):  
Yohanes Benedicktus Meninu Nalele

Commercial sexual exploitation of children is a social problem that has several categories. This issue is scattered in many countries, especially in Asian countries. Child’s commercial sexual exploitation or eksploitasi seksual komersial anak (ESKA) can ruin the future of the children who are victims, of which they are the successors of the nation. Childhood should be filled by playing and learning but changing with the dark. The role of government as the supreme authority of a country in overcoming the problem of ESKA looks not maximized. The purpose of this research is to find out the role of international organizations in addressing the ESKA problem. International organizations, in this case, are ECPAT or End Child Prostitution, child pornographic grapy, and Trafficking of Children for Sexual Purposes. How are their efforts and roles in overcoming ESKA and its cooperation with the Indonesian government, obstacles, and challenges faced? The benefits of this journal are useful in the development of International Relations, especially those involving the role of international organizations in addressing the problems of ESKA. The method used is descriptive – qualitative, where this method illustrates and analyzes the role of ECPAT as an international organization in addressing the ESKA in Indonesia (2011 – 2015).


Author(s):  
Kathryn C. Seigfried-Spellar

The impact of both intentional and unintentional exposure to internet pornography on adolescents has been debated in the literature for decades. However, the differences in the operational definitions of pornography and exposure, not to mention the differences in methodology and sampling, make it difficult to synthesize findings and identify patterns across studies. In addition, the majority of the research has employed a rather broad measure of “exposure to general pornography” by adolescents in order to understand the impact of early exposure to pornography; however, internet pornography includes a wide range of sexually explicit materials, not just adult pornography. Thus, the goal of this chapter is to explore the relationship between nondeviant pornography use and deviant pornography use (e.g., child pornography) by discussing the Seigfried-Spellar study which examined the role of individual differences and age of onset in deviant pornography use.


Author(s):  
Mohammad Zunnun Khan ◽  
Anshul Mishra ◽  
Mahmoodul Hasan Khan

This chapter includes the evolution of cyber forensics from the 1980s to the current era. It was the era when computer forensics came into existence after a personal computer became a viable option for consumers. The formation of digital forensics is also discussed here. This chapter also includes the formation of cyber forensic investigation agencies. Cyber forensic life cycle and related phases are discussed in detail. Role of international organizations on computer evidence is discussed with the emphasize on Digital Forensic Research Workshop (DFRWS), Scientific Working Group on Digital Evidence (SWDGE), chief police officers' involvement. Authenticity-, accuracy-, and completeness-related pieces of evidence are also discussed. The most important thing that is discussed here is the cyber forensics data.


2004 ◽  
Vol 1 (4) ◽  
pp. 298-309 ◽  
Author(s):  
Florian Buchholz ◽  
Eugene Spafford

Author(s):  
Jim Fraser

‘Investigating crime’ explains how the police investigate criminal activity, setting out some of the principles and procedures involved and how forensic science provides them with answers. Radical changes in English law and forensic science practices resulted in the introduction of formal quality assurance systems to standardize laboratory practices and the Police and Criminal Evidence Act (1984), which specifies how police deal with accused persons, go about their investigations, and are accountable for their actions. The ‘trace, interview, eliminate’ (TIE) method of systematic elimination of individuals from an investigation is described, as well as the role of digital forensics to extract and interpret data from a wide range of devices.


Sign in / Sign up

Export Citation Format

Share Document