2023
DOI: 10.1016/j.fsisyn.2022.100313
|View full text |Cite
|
Sign up to set email alerts
|

Interpol review of digital evidence for 2019–2022

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…It is said that every human activity leaves a digital trace [ 14 ]. There are multiple instances where digital data are used to solve the crime in a court of law [ 15 ].…”
Section: Discussionmentioning
confidence: 99%
“…It is said that every human activity leaves a digital trace [ 14 ]. There are multiple instances where digital data are used to solve the crime in a court of law [ 15 ].…”
Section: Discussionmentioning
confidence: 99%
“…The findings indicate that virtual reality factors influence the behavior of HR personnel in their response to the adoption of new technology and the utilization of renewable energy in waste management companies in Indonesia. (Reedy, 2023) this type of technology has the potential to completely transform workers' behavior, leading to wholehearted acceptance of its implementation to enhance business growth and HR performance.…”
Section: Discussionmentioning
confidence: 99%
“…Virtual reality (VR) is widely regarded as a momentous advancement in the evolution of human-computer interaction. When compared to traditional interfaces, it generates a more engaging and interactive experience (Reedy, 2023). Moreover, virtual reality exerts a substantial influence on the corporate realm, particularly in the domains of marketing, training, and education.…”
Section: Virtual Reality Technologymentioning
confidence: 99%
“…On the other hand, AI-powered technologies assist with the swift processing of digital evidence by automating activities such as file and memory forensics (Reedy, 2023). The data gathered through these methods is invaluable for creating prevention methods and strengthening network defenses.…”
Section: Forensic Approaches and Security Framework For Critical Infr...mentioning
confidence: 99%