2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.49
|View full text |Cite
|
Sign up to set email alerts
|

Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks

Abstract: Abstract-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…Child pornography refers to pictures, videos, and audio recordings of children wearing inappropriate, few, or no clothes who are in inappropriate positions, specifically sexual positions. Many studies have been conducted to minimize the number of child pornography cases [21]. In general, child pornography contents are distributed for two purposes either for profit or nonprofit.…”
Section: Child Pornographymentioning
confidence: 99%
See 1 more Smart Citation
“…Child pornography refers to pictures, videos, and audio recordings of children wearing inappropriate, few, or no clothes who are in inappropriate positions, specifically sexual positions. Many studies have been conducted to minimize the number of child pornography cases [21]. In general, child pornography contents are distributed for two purposes either for profit or nonprofit.…”
Section: Child Pornographymentioning
confidence: 99%
“…Another research by Mutawa et al [21] used a combination of forensic technical skills and a Bureau d'Enquetes et d' Analyses's (BEA) investigation system to investigate child pornography transmitted through a peer-to-peer (P2P) file-sharing network. They have applied a BEA analysis methodology to analyze the evidence they obtained in each of the 15 cases obtained from the Department of Electronic Evidence of the Dubai police.…”
Section: G Cybercrime Detection Using Other Techniquesmentioning
confidence: 99%
“…Suggestions by practitioners align with a body of literature which studies the applicability of Behavioural Evidence Analysis (BEA) to IIOC cases [34,35]. Preliminary empirical evaluation (using DF evidence from actual IIOC cases) has indi-500 cated that BEA can in fact assist investigators in several aspects.…”
mentioning
confidence: 95%
“…Preliminary empirical evaluation (using DF evidence from actual IIOC cases) has indi-500 cated that BEA can in fact assist investigators in several aspects. For example, it helps to focus an investigation, enables better understanding and interpretation of victim and offender behaviour, and assists in inferring traits of the offender from avail-505 able digital evidence [35]. However, caution should be taken to ensure objectivity in the use of this method, as expressed by the following comment by a practitioner who participated in the survey.…”
mentioning
confidence: 99%
“…As a result, search engines have been acknowledged for their role in facilitating access to illicit pharmaceuticals and substances (4), prolonging the existence of and access to hate speech online (5,6), providing access to information on topics such as self-harm and suicide (7)(8)(9), and have sparked much legal debate surrounding privacy and "the right to be forgotten" (10). In addition, search engines have previously been (and arguably still are; albeit subject to greater regulation) utilized as a tool to seek access to extremist material and images depicting child sexual abuse sparking much critical commentary, prompting the proactive blocking of specific search results (11)(12)(13)(14). While content-based offenses are arguably easier to regulate and detect (through the use of specific illicit search criteria) offenses surrounding an individual's collective search habits provide a greater challenge.…”
mentioning
confidence: 99%