Essays about: "Forensic Evidence"
Showing result 1 - 5 of 35 essays containing the words Forensic Evidence.
-
1. Digital Forensic Analysis of Snapchat and BeReal : In Search of Artifacts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Snapchat and BeReal are popular social media platforms focused on photo sharing and instant messaging. A tool often used in police investigations is the analysis of communication, this includes different electronic devices and smartphone devices. READ MORE
-
2. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE
-
3. How evidence seizure times affect Swedish citizens’ willingness to report crimes
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Digital device usage has changed the ways in which crime is committed and investigated. In almost all criminal cases, the police seize mobile devices in search for digital evidence. READ MORE
-
4. Towards an Archaeology of Disaster : Opportunities and Difficulties
University essay from Linnéuniversitetet/Institutionen för kulturvetenskaper (KV)Abstract : This thesis examines the role of archaeology and its contribution to emergency relief work in areas struck by a disastrous event. At a time in our contemporary society where we may be extra vulnerable against disasters, archaeology can help us both prevent and reduce the risks of disasters. READ MORE
-
5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE