Journal articles on the topic 'Criminal investigation Data processing'

To see the other types of publications on this topic, follow the link: Criminal investigation Data processing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Criminal investigation Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lukić, Tatjana. "Automatic computer based data processing as a special investigation activity." Glasnik Advokatske komore Vojvodine 78, no. 9 (2006): 602–15. http://dx.doi.org/10.5937/gakv0611602l.

Full text
Abstract:
The application of special investigation activities is characteristic for proactive investigations related to the organized crime. One of these special investigation activities, that became more and more important, is a computer based automatic data processing which was introduced in Serbia by the new Law on Criminal Procedure. The subject matter of this paper is legal solution in Serbia related to this special investigation activity. Apart from that, the author demonstrated its comparative regulation by analyzing legal basis for its application, terms and means of its approval, duration, use of computer excerpts as evidence in the criminal procedure and supervision over its legality. The author paid special attention to the personal data processing on the international level and issue of criminal investigation analytics in combating terrorism.
APA, Harvard, Vancouver, ISO, and other styles
2

Pang, Xinzhao. "On the Protection of Personal Data Information in Big Data Investigation Activities." Journal of Social Science Studies 8, no. 2 (December 30, 2021): 160. http://dx.doi.org/10.5296/jsss.v8i2.19421.

Full text
Abstract:
In the context of the vigorous development of big data and network communication technologies, the universality of personal data information processing, the openness of concept definitions, and the potential risks in practice have led to theoretical and practical changes in the definition of personal data information. With the widespread use of big data technology in criminal investigations, the theoretical and practical activities of big data investigation have gradually formed. Big data investigation activities are often accompanied by infringements on citizens' personal data and other legitimate rights and interests. At present, the traditional model of personal data information protection cannot restrict the code of conduct in big data investigation activities. For this reason, it is necessary to introduce a comprehensive governance model, which mainly includes relative control of individuals, balance of multiple interests and dynamic risk adjustment. Etc., and focus on the transformation of the legal protection model of personal information.
APA, Harvard, Vancouver, ISO, and other styles
3

Dehtiarova, Olha. "Ensuring information security in criminal proceedings." Law Review of Kyiv University of Law, no. 2 (August 10, 2020): 401–4. http://dx.doi.org/10.36695/2219-5521.2.2020.78.

Full text
Abstract:
The scientific article considers the issue of information protection during the investigation of criminal proceedings, informationsecurity. The position of researchers and practitioners on information security at the stage of pre-trial investigation of criminal procee -dings is studied.The provisions of the Law of Ukraine «On Information», the Strategy for the Development of the System of the Ministry of InternalAffairs of Ukraine until 2020, the Regulations on the Procedure for Maintaining the Unified Register of Pre-trial Investigations toEnsure Information Security in Proceedings are analyzed.The introduction of information technology in criminal procedure has become an urgent issue, and their application has necessitatedthe need to address the issue of information security in criminal proceedings. When investigating proceedings, the investigatorsuse databases and enter into these databases information that must be securely protected. Information in criminal proceedings needsspecial protection, as it is subject to encroachment by interested parties on its disclosure and transmission.Ensuring information security is to create appropriate conditions for the storage, processing and exchange of information that inany way relates to the investigation of criminal proceedings. Interference in the activities of pre-trial investigation bodies through informationsystems is an undermining of the principle of independence of the law enforcement system. It is important not only to combatunauthorized interference, but also to increase the degree of responsibility for such actions. Because all data collected in criminal proceedingsare protected by law and are a secret of the investigation.Information security in criminal proceedings is the protection of the information environment of electronic criminal proceedingswith the help of means and methods of information storage, which ensures the proper functioning of criminal proceedings and facilitatesthe implementation of its tasks.
APA, Harvard, Vancouver, ISO, and other styles
4

Han, Mee Lan, Byung Il Kwak, and Huy Kang Kim. "CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis." Security and Communication Networks 2019 (December 20, 2019): 1–21. http://dx.doi.org/10.1155/2019/1901548.

Full text
Abstract:
Criminal profiling is a useful technique to identify the most plausible suspects based on the evidence discovered at the crime scene. Similar to offline criminal profiling, in-depth profiling for cybercrime investigation is useful in analysing cyberattacks and for speculating on the identities of the criminals. Every cybercrime committed by the same hacker or hacking group has unique traits such as attack purpose, attack methods, and target. These unique traits are revealed in the evidence of cybercrime; in some cases, these unique traits are well hidden in the evidence such that it cannot be easily perceived. Therefore, a complete analysis of several factors concerning cybercrime can provide an investigator with concrete evidence to attribute the attacks and narrow down the scope of the criminal data and grasp the criminals in the end. We herein propose a decision support methodology based on the case-based reasoning (CBR) for cybercrime investigation. This study focuses on the massive data-driven analysis of website defacement. Our primary aim in this study is to demonstrate the practicality of the proposed methodology as a proof of concept. The assessment of website defacement was performed through the similarity measure and the clustering processing in the reasoning engine based on the CBR. Our results show that the proposed methodology that focuses on the investigation enables a better understanding and interpretation of website defacement and assists in inferring the hacker’s behavioural traits from the available evidence concerning website defacement. The results of the case studies demonstrate that our proposed methodology is beneficial for understanding the behaviour and motivation of the hacker and that our proposed data-driven analytic methodology can be utilized as a decision support system for cybercrime investigation.
APA, Harvard, Vancouver, ISO, and other styles
5

Kāršenieks, Jānis. "INFORMATION PROCESSING ON CRIMINAL CONVICTIONS OF A PERSON FOR INVESTIGATIVE PURPOSES." Administrative and Criminal Justice 2, no. 87 (June 30, 2019): 43. http://dx.doi.org/10.17770/acj.v2i87.4299.

Full text
Abstract:
In the paper, the author analyzes the personal data protection problems of the individuals for investigative purposes in the context of operational actions. In order to understand the essence of the problem, the author of the paper, using legislation and judicial practice, analyzes the essence of the personal data (data relating to criminal offenses, criminal convictions) protection rights to of individuals, the procedure for conducting criminal procedure and operational actions and the necessary amount personal data information.The scientific basis of the research is the normative acts regulating both subjects of research, and judicial practice.The paper addresses the issues, which that have not previously been investigated. The research specifies the criteria, rules and principles, which have to be considered and applied in practice when processing information on individuals’ criminal record for investigative purposes in a operational actions’ context.The aim of the paper is to investigate the guidelines for the protection of natural persons in criminal proceedings while processing information on criminal convictions. The tasks of the investigation are as follows: to analyze the prerequisites for the personal data lawfulness’s processing relating to criminal convictions in the framework of criminal proceedings and operational activities; to identify the cases, in which the criminal prosecutors are entitled to obtain information on a person’s criminal record. The following research methods have been used in the paper: analytical, comparative, inductive, deductive and logical methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Carnaz, Gonçalo, Mário Antunes, and Vitor Beires Nogueira. "An Annotated Corpus of Crime-Related Portuguese Documents for NLP and Machine Learning Processing." Data 6, no. 7 (June 26, 2021): 71. http://dx.doi.org/10.3390/data6070071.

Full text
Abstract:
Criminal investigations collect and analyze the facts related to a crime, from which the investigators can deduce evidence to be used in court. It is a multidisciplinary and applied science, which includes interviews, interrogations, evidence collection, preservation of the chain of custody, and other methods and techniques of investigation. These techniques produce both digital and paper documents that have to be carefully analyzed to identify correlations and interactions among suspects, places, license plates, and other entities that are mentioned in the investigation. The computerized processing of these documents is a helping hand to the criminal investigation, as it allows the automatic identification of entities and their relations, being some of which difficult to identify manually. There exists a wide set of dedicated tools, but they have a major limitation: they are unable to process criminal reports in the Portuguese language, as an annotated corpus for that purpose does not exist. This paper presents an annotated corpus, composed of a collection of anonymized crime-related documents, which were extracted from official and open sources. The dataset was produced as the result of an exploratory initiative to collect crime-related data from websites and conditioned-access police reports. The dataset was evaluated and a mean precision of 0.808, recall of 0.722, and F1-score of 0.733 were obtained with the classification of the annotated named-entities present in the crime-related documents. This corpus can be employed to benchmark Machine Learning (ML) and Natural Language Processing (NLP) methods and tools to detect and correlate entities in the documents. Some examples are sentence detection, named-entity recognition, and identification of terms related to the criminal domain.
APA, Harvard, Vancouver, ISO, and other styles
7

Korostelova, L. A. "DATA CLEANING AS ONE OF THE METHODS OF DATA PROCESSING FOR CRIMINAL INVESTIGATIONS." Juridical scientific and electronic journal, no. 5 (2022): 568–70. http://dx.doi.org/10.32782/2524-0374/2022-5/136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tymchyshyn, Andriy, Anna Semeniaka, Serhii Bondar, Nataliia Akhtyrska, and Olena Kostiuchenko. "The use of big data and data mining in the investigation of criminal offences." Revista Amazonia Investiga 11, no. 56 (October 18, 2022): 278–90. http://dx.doi.org/10.34069/ai/2022.56.08.27.

Full text
Abstract:
The aim of this study was to determine the features and prospects of using Big Data and Data Mining in criminal proceedings. The research involved the methods of a systematic approach, descriptive analysis, systematic sampling, formal legal approach and forecasting. The object of using Big Data and Data Mining are various crimes, the common features of which are the seriousness and complexity of the investigation. The common tools of Big Data and Data Mining in crime investigation and crime forecasting as interrelated tasks were identified. The creation of databases is the result of the processing of data sources by Data Mining methods, each being distinguished by the specifics of use. The main risks of implementing Big Data and Data Mining are violations of human rights and freedoms. Improving the use of Big Data and Data Mining requires standardization of procedures with strict adherence to the fundamental ethical, organizational and procedural rules. The use of Big Data and Data Mining is a forensic innovation in the investigation of serious crimes and the creation of an evidence base for criminal justice. The prospects for widespread use of these methods involve the standardization of procedures based on ethical, organizational and procedural principles. It is appropriate to outline these procedures in framework practical recommendations, emphasizing the responsibility of officials in case of violation of the specified principles. The area of further research is the improvement of innovative technologies and legal regulation of their application.
APA, Harvard, Vancouver, ISO, and other styles
9

Bozhyk, Valerii I., Yan V. Streliuk, Vitaliy A. Maziychuk, Anatoliy O. Voightko, Myroslava V. Kokoshko, and Anatoliy M. Kisliy. "Problems of implementing international digitalisation standards of criminal investigation." Cuestiones Políticas 39, no. 71 (December 25, 2021): 317–33. http://dx.doi.org/10.46398/cuestpol.3971.16.

Full text
Abstract:
The study consisted of identifying the existing problems in the implementation of international standards of digitization of criminal investigation at the legislative level. The research was carried out in stages as a summary, based on the logic of presentation of the material, to achieve and meet the objectives set out in the article. The method of direct observation, the method of comparison and analysis of the content of the documents, the method of systemic and pragmatic approach were used. The key results of the study were the analysis of the experience of implementing digital standards in forensic activities in the United States, Canada, Great Britain, Denmark, England, Austria, Estonia, and Ukraine. It is concluded that the problems that exist in the implementation of these standards, were identified from the criteria of evaluation of the efficiency and capacity of digital data processing by the agencies involved in the criminal investigation. In addition, the problems and difficulties faced by the authorities in implementing existing international digitization standards, indicate the need for comprehensive measures to organize criminal investigations. To overcome them, appropriate measures must be taken in the field of legislative changes.
APA, Harvard, Vancouver, ISO, and other styles
10

Funta, Rastislav, and Peter Ondria. "Data Protection in Law Enforcement and Judicial Cooperation in Criminal Matters." TalTech Journal of European Studies 11, no. 2 (September 1, 2021): 148–66. http://dx.doi.org/10.2478/bjes-2021-0019.

Full text
Abstract:
Abstract The redesign of data protection in the police and judicial area is intended to create uniformity at the European level for the citizens of EU Member States. This scientific article analyses the subject of data protection in law enforcement and judicial cooperation in criminal matters. The focus is primarily on the existing provisions and the latest developments of the EU with regard to Directive (EU) 2016/680 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA. The international level with regard to data protection in the police and judicial area and possible changes due to the developments in data protection under European law are also examined in more detail.
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Donghyo, Sun-Young Ihm, and Yunsik Son. "Two-Level Blockchain System for Digital Crime Evidence Management." Sensors 21, no. 9 (April 27, 2021): 3051. http://dx.doi.org/10.3390/s21093051.

Full text
Abstract:
Digital evidence, such as evidence from CCTV and event data recorders, is highly valuable in criminal investigations, and is used as definitive evidence in trials. However, there are risks when digital evidence obtained during the investigation of a case is managed through a physical hard disk drive until it is submitted to the court. Previous studies have focused on the integrated management of digital evidence in a centralized system, but if a centralized system server is attacked, major operations and investigation information may be leaked. Therefore, there is a need to reliably manage digital evidence and investigation information using blockchain technology in a distributed system environment. However, when large amounts of data—such as evidence videos—are stored in a blockchain, the data that must be processed only within one block before being created increase, causing performance degradation. Therefore, we propose a two-level blockchain system that separates digital evidence into hot and cold blockchains. In the criminal investigation process, information that frequently changes is stored in the hot blockchain, and unchanging data such as videos are stored in the cold blockchain. To evaluate the system, we measured the storage and inquiry processing performance of digital crime evidence videos according to the different capacities in the two-level blockchain system.
APA, Harvard, Vancouver, ISO, and other styles
12

Siboro, Emilan. "PENGARUH LINGKUNGAN KERJA DAN BEBAN KERJA, TERHADAP KEPUASAN KERJA MELALUI STRES KERJA PADA APARAT KEPOLISIAN DAERAH SUMATERA UTARA (STUDI PADA DIREKTORAT RESERSE KRIMINAL KHUSUS)." Jesya (Jurnal Ekonomi & Ekonomi Syariah) 5, no. 1 (January 1, 2022): 279–92. http://dx.doi.org/10.36778/jesya.v5i1.616.

Full text
Abstract:
The purpose of this study is to examine and analyze the effect of work environment and workload on job satisfaction through job stress at the North Sumatra Regional Police (Study at the Special Criminal Investigation Directorate) directly or indirectly. The approach used in this research is a causal approach. The population in this study were all North Sumatra Regional Police Officers at the Directorate of Special Criminal Investigation. The sample in this study used a saturated sample of 69 North Sumatra Police at the Special Criminal Investigation Directorate. Data collection techniques in this study used documentation, observation, and questionnaires. The data analysis technique in this study uses a quantitative approach using statistical analysis using the Auter Model Analysis test, Inner Model Analysis, and Hypothesis Testing. Data processing in this study uses the PLS (Partial Least Square) software program. The results of this study prove that work environment, workload and work stress have a significant effect on job satisfaction and indirectly work environment and workload have a significant effect on job satisfaction. Through job stress on the North Sumatra Regional Police
APA, Harvard, Vancouver, ISO, and other styles
13

Belova, Gabriela, and Gergana Georgieva. "A New Data Protection Development in The EU Judicial and Criminal Area." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 2 (June 25, 2017): 144–49. http://dx.doi.org/10.1515/kbo-2017-0103.

Full text
Abstract:
Abstract The following article is dedicated to a new data protection regime in the European Union, in particular the Directive (EU) 2016/680 of the European Parliament and the Council on the protection of natural persons regarding processing of personal data by authorities aiming at prevention, investigation, detection and prosecution of crime offences, including execution of criminal penalties. For this purpose, the authors look first at the data protection within the Prüm framework as well as at the relevant provisions of Lisbon Treaty. Тhe important cases of the European Court of Human Rights are analyzed. Whereas in 2014 EU Member states focused on the question whether or not to retain data, the 2016 conclusion was that in some aspects data retention is the most efficient measure to ensure national security, public safety and fighting across serious crimes. The terrorist attacks in Paris and Brussels call to better equip security authorities. The EU legislature made significant progress on the Data Protection regime. The Directive (EU) 2016/680, the so called the ‘Police and Criminal Justice Directive’, repeals the Council Framework Decision 2008/977/JHA and will enter into force on 6 May 2018.
APA, Harvard, Vancouver, ISO, and other styles
14

Wilson-Kovacs, Dana. "Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales." Policing: An International Journal 44, no. 4 (May 7, 2021): 669–82. http://dx.doi.org/10.1108/pijpsm-02-2021-0019.

Full text
Abstract:
PurposeIn-depth knowledge about specific national approaches to using digital evidence in investigations is scarce. A clearer insight into the organisational barriers and professional challenges experienced, alongside a more detailed picture of how digital evidence can help police investigations are required to empirically substantiate claims about how digital technologies are changing the face of criminal investigations. The paper aims to focus on the introduction of digital media investigators to support investigating officers with the collection and interpretation of digital evidence.Design/methodology/approachDrawing on ethnographic and interview data collected as part of an Economic and Social Research Council-funded project on the application of digital forensics expertise in policing in England and Wales, this paper examines the changing face of investigations in relation to escalating digital demand.FindingsThe analysis presents the national and regional organisational parameters of deploying digital expertise in criminal investigation and examines some of the challenges of being a digital media investigator (DMI). Through testimonies from DMIs, digital forensic practitioners, investigating and senior officers and forensic managers, the analysis explores the organisational tensions in the collection, processing, interpretation and use of information from digital devices for evidential purposes.Research limitations/implicationsThe paper offers an empirical basis for the comparative study of how the DMI role has been implemented by law enforcement agencies and its fit within broader institutional considerations and processes.Practical implicationsThe development of the DMI role has raised questions about the supply of digital expertise, especially to volume crime investigations, and tensions around occupational divisions between scientific and operational units.Social implicationsThe findings show that while the introduction of the DMI role was much needed, the development of this valuable provision within each force and the resources available require sustained and coordinated support to protect these professionals and retain their skills.Originality/valueThis study contributes to the growing sociological and criminological literature with an ethnographically based perspective into the organisational and occupational tensions in the identification and processing of digital evidence in England and Wales.
APA, Harvard, Vancouver, ISO, and other styles
15

Maliqi, Reshat. "The operational role and the importance of the application of criminal procedures during the investigation of the organized crime in Kosovo." Technium Social Sciences Journal 27 (January 8, 2022): 325–37. http://dx.doi.org/10.47577/tssj.v27i1.5429.

Full text
Abstract:
The application of criminal procedures in the investigation of organized crime in Kosovo quests a deeper empirical study and wider research of a scientific literature than ever done before. The failure of many organized crime cases throughout the courts of Kosovo and the light and acquittal sentences are real indications that the application of criminal proceedings is not being properly conveyed in practice. The data provided through the empirical research of this paper indicate that non-compliance with criminal procedures leads to a decrease in efficiency and a significant increase in organized crime cases. Through this research we aim to identify the possible factors that affect the growth of the phenomenon of crime as well as the reflection of institutions dealing with the prevention and fight against crime. According to the observation the author suspects that the starting point of criminal proceedings regardless of the degree of probability is extremely important for the fight against crime, especially the fight against modern forms characterized by a high degree of organization, professionalism, specialization and secrecy. This paper reflects the detailed theoretical research of the scientific literature by various local and foreign authors and experts who have written about criminal procedures, research and analysis of theoretical and practical data on the meaning and importance of the implementation of criminal procedures in detecting organized crime in Kosovo are of particular importance to investigators of organized crime in the future. The effectiveness of criminal procedures in detection of organized crime in Kosovo should be closely related to criminology, criminalistics and criminal policy, the implementation of criminal procedures should in principle aim to return the basis of suspicion to the highest level of suspicion. This activity starts with the appearance of the basis of suspicion or the highest form of suspicion in the form of orientation and elimination indicators. The same activity consists of criminal control and processing. The content and strategy of these activities determine their further course, as well as condition the range of rules of criminal science in a specific case based on the provisions of the Code of Criminal Procedure, as well as other provisions of laws and bylaws. The strategy and tactics of these activities are dictated by the type of criminal offense.
APA, Harvard, Vancouver, ISO, and other styles
16

BAKIR, Çiğdem. "Compressing English Speech Data with Hybrid Methods without Data Loss." International Journal of Applied Mathematics Electronics and Computers 10, no. 3 (September 30, 2022): 68–75. http://dx.doi.org/10.18100/ijamec.1166951.

Full text
Abstract:
Understanding the mechanism of speech formation is of great importance in the successful coding of the speech signal. It is also used for various applications, from authenticating audio files to connecting speech recording to data acquisition device (e.g. microphone). Speech coding is of vital importance in the acquisition, analysis and evaluation of sound, and in the investigation of criminal events in forensics. For the collection, processing, analysis, extraction and evaluation of speech or sounds recorded as audio files, which play an important role in crime detection, it is necessary to compress the audio without data loss. Since there are many voice changing software available today, the number of recorded speech files and their correct interpretation play an important role in detecting originality. Using various techniques such as signal processing, noise extraction, filtering on an incomprehensible speech recording, improving the speech, making them comprehensible, determining whether there is any manipulation on the speech recording, understanding whether it is original, whether various methods of addition and subtraction are used, coding of sounds, the code must be decoded and the decoded sounds must be transcribed. In this study, first of all, what sound coding is, its purposes, areas of use, classification of sound coding according to some features and techniques are given. Moreover, in our study speech coding was done on the English audio data. This dataset is the real dataset and consists of approximately 100000 voice recordings. Speech coding was done using waveform, vocoders and hybrid methods and the success of all the methods used on the system we created was measured. Hybrid models gave more successful results than others. The results obtained will set an example for our future work.
APA, Harvard, Vancouver, ISO, and other styles
17

Sutmuller, August Daniel, Marielle den Hengst, Ana Isabel Barros, and Pieter van Gelder. "Getting the Perpetrator Incorporated and Prioritized in Homicide Investigations: The Development and Evaluation of a Case-Specific Element Library (C-SEL)." International Journal of Environmental Research and Public Health 17, no. 17 (September 3, 2020): 6430. http://dx.doi.org/10.3390/ijerph17176430.

Full text
Abstract:
Homicide investigators in the digital era have access to an increasing amount of data and the processing of all persons of interest and pieces of evidence has become nearly impossible. This paper describes the development and evaluation of a case-specific element library (C-SEL) that can be used to incorporate and prioritize persons of interest in homicide investigations. In a survey, 107 experts in the field of criminal investigation assigned an initial score to the elements. Each element was extended with underlying factors that can be used to adjust the initial score based on the relevance and credibility of the source. A case study was conducted using three Dutch real-world cases to evaluate the methodology. The results look promising and are better than four methodologies currently used in practice.
APA, Harvard, Vancouver, ISO, and other styles
18

Baig, Zubair, Majid Ali Khan, Nazeeruddin Mohammad, and Ghassen Ben Brahim. "Drone Forensics and Machine Learning: Sustaining the Investigation Process." Sustainability 14, no. 8 (April 18, 2022): 4861. http://dx.doi.org/10.3390/su14084861.

Full text
Abstract:
Drones have been increasingly adopted to address several critical challenges faced by humanity to provide support and convenience . The technological advances in the broader domains of artificial intelligence and the Internet of Things (IoT) as well as the affordability of off-the-shelf devices, have facilitated modern-day drone use. Drones are readily available for deployment in hard to access locations for delivery of critical medical supplies, for surveillance, for weather data collection and for home delivery of purchased goods. Whilst drones are increasingly beneficial to civilians, they have also been used to carry out crimes. We present a survey of artificial intelligence techniques that exist in the literature in the context of processing drone data to reveal criminal activity. Our contribution also comprises the proposal of a novel model to adopt the concepts of machine learning for classification of drone data as part of a digital forensic investigation. Our main conclusions include that properly trained machine-learning models hold promise to enable an accurate assessment of drone data obtained from drones confiscated from a crime scene. Our research work opens the door for academics and industry practitioners to adopt machine learning to enable the use of drone data in forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
19

Mićović, Dragoslava, Lidija Beko, and Naile Mala Mami. "Learning Semi Technical Vocabulary in English for Police Purposes: A Case Study." Romanian Journal of English Studies 18, no. 1 (December 1, 2021): 33–42. http://dx.doi.org/10.1515/rjes-2021-0004.

Full text
Abstract:
Abstract This paper will present the results of a case study carried out with the students of Forensic Engineering at the University of Criminal Investigation and Police Studies in Belgrade for two consecutive academic years. The goal of the study was to determine if and to what extent the receptive vocabulary size acquired during previous education will influence the acquision of semi-technical vocabulary covered by two one-semester English courses. The data have been gathered using both a questionnare and relevant tests. The statistical processing of data has enabled better intepretation of the results obtained.
APA, Harvard, Vancouver, ISO, and other styles
20

Anand, Sarabjot Singh, Arshad Jhumka, and Kimberley Wade. "Towards the Ordering of Events from Multiple Textual Evidence Sources." International Journal of Digital Crime and Forensics 3, no. 2 (April 2011): 16–34. http://dx.doi.org/10.4018/jdcf.2011040102.

Full text
Abstract:
In any criminal investigation, two important problems have to be addressed: (1) integration of multiple data sources to build a concise picture of the events leading up to and/or during the execution of a crime, and (2) determining the order in which these events occurred. This paper focuses on the integration of multiple textual data sources, each providing a recollection of events observed by eyewitnesses. From these textual documents, using text mining and natural language processing techniques the authors identify events (across the document corpus) associated with the crime and infer temporal relationships between these events to create a (partial) ordering of the events. The authors evaluate their method on data collected through a mock eyewitness task.
APA, Harvard, Vancouver, ISO, and other styles
21

Sinaga, Berlin, Triono Eddy, and Tengku Erwinsyahbana. "Penanggulangan Premanisme Di Kota Medan (Studi di Satuan Reskrim Polresta Medan)." Journal of Education, Humaniora and Social Sciences (JEHSS) 3, no. 2 (December 2, 2020): 333–41. http://dx.doi.org/10.34007/jehss.v3i2.297.

Full text
Abstract:
Thuggery is the activity of a group of people who earn their income mainly from extortion of other groups of people and cause public unrest. In Medan City until now thuggery continues to grow and is very detrimental to the community. The purpose of this study was to examine the factors associated with thuggery in Medan, the efforts to overcome them, and the obstacles experienced by the Medan Police Criminal Investigation Unit in overcoming thuggery acts. The research conducted was an empirical juridical research which was sourced from primary data by conducting interviews with AKP Heri Sofian who served as Padal OPS of the Medan Police Criminal Investigation Unit's Preman Hunting Team and secondary data by processing data from primary legal materials, secondary legal materials and tertiary legal materials. The results of the study show that there are many factors that influence the occurrence of thuggery in Medan, both in terms of criminology, it is found that someone becomes a thug due to lack of education, laziness to work and the emergence of a wrong mindset that being a thug is something great and should be proud of, apart from that the factors the economy also affects because of the poverty experienced by the perpetrator, the last is environmental factors that are not good so that they form a person to become a thug.
APA, Harvard, Vancouver, ISO, and other styles
22

Ginanjar, Aseh, Nur Widiyasono, and Rohmat Gunawan. "WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD." Jurnal Terapan Teknologi Informasi 2, no. 2 (February 27, 2019): 59–69. http://dx.doi.org/10.21460/jutei.2018.22.111.

Full text
Abstract:
The internet provides around the world facilities to reach customers without market restrictions, including e-commerce. As a result, the number of customers who depend on the Internet for purchases has increased dramatically. Potential cybercrime attacks such as phishing are criminal activities that attempt to obtain illegally sensitive information. The sensitive information can be in the form of a username, password, and credit card details. Then it is necessary to analyze the non-volatile data obtained in real and sourced from a Facebook forum. Data acquisition techniques use forensic live network data processing using Network Protocol Analyzer tools, namely Wireshark. The results of the investigation and analysis are summarized in the form of the table. The success of the investigation can be found in the source of the attack in the form of IP Address, URL phishing, DNS protocol, IMAP, username, password, FTP, SMTP, and HTTP. The analysis provides recommendations on how to avoid web phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
23

Yukama, Erzyanto, Meita Pragiwani, and Iman Sofian Suriawinata. "Effect of The Employee Recruitment Process, Quality of Human Resources and Work Motivation on Employees Performance at Indonesian Police Criminal Investigation Agency, Forensic Laboratory Centere." Indonesian Journal of Business, Accounting and Management 3, no. 2 (December 17, 2020): 104–9. http://dx.doi.org/10.36406/ijbam.v3i2.604.

Full text
Abstract:
This study aims to analyze the performance of examiners of subfield document and counterfeit forensic money in Puslabfor BareskrimPolri by looking at the factor of employee recruitment, quality of human resources and motivation partially or simultaneously and the variables that have a major influence on this research. This research method is a quantitative method by processing primary data through a questionnaire given to the forensic examiner documents and counterfeit currency inspectore at the police criminal investigation center. The number of samples in this study were 73 employees. Data processing in this study using SPSS version 22 and analyzed using multiple regression analysis. The analysis used in this study includes the validity test, realibility test, nominality test, coefficient test, determinant coefficient R2, multiple regression test and t test. The results of the study show that, (1) employee recruitment influence on employee performance (2) quality of human resources has significant influence on employee performance, and (3) motivation influences employee performance.
APA, Harvard, Vancouver, ISO, and other styles
24

Nirmalasary, Try Nensy, Fakhry Zamzam, and Luis Marnisah. "PENGARUH MOTIVASI DAN KEPUASAN KERJA TERHADAP KINERJA PERSONIL DIREKTORAT KRIMINAL KHUSUS KEPOLISIAN DAERAH SUMATERA SELATAN." Journal PPS UNISTI 3, no. 1 (October 16, 2020): 33–42. http://dx.doi.org/10.48093/jiask.v3i1.30.

Full text
Abstract:
Job satisfaction and work motivation are directly related to personnel performance. Job satisfaction and work motivation felt by personnel can reduce performance or increase personnel performance. personnel who are satisfied with the work obtained will be motivated to improve performance so that it will have an impact on increasing overall organizational performance. This research was conducted at the Directorate of Special Criminal Investigation at the South Sumatra Regional Police, which aims to analyze how motivation and job satisfaction influence the performance of the Police Personnel at the Special Criminal Research Directorate for the South Sumatra Regional Police. The applied research model is a survey method, using 82 samples from a population of 92 Polri personnel at the Special Criminal Investigation Directorate for the South Sumatra Regional Police, using multiple regression analysis. The data analysis technique uses descriptive statistics and inferential statistics. In this study, the types of data used are primary data and secondary data. The data collection techniques used questionnaires, interviews, observation and documentation. Hypothesis testing through t test and F test using SPSS analysis tools. The results of data processing using SPSS 25, using the t test that t count is 4.021> with t table 1.993 and a significance level of 0.025 <0.05 that there is a positive and significant influence on motivation on performance; that t count is 3.025> with t table 1.993 and a significance level of 0.041 <0.05 that there is a positive and significant effect of job satisfaction on performance; and using the F test that F counts at 7,194> with F table 2.683 and a significance level of 0.00 <0.05 that there is a positive and significant effect on the pattern of motivation and job satisfaction together on performance, with a coefficient of determination of 49.3% the rest is influenced by other variables. The results showed that motivation and job satisfaction have a positive and significant effect on performance either partially or simultaneously. The career development strategy of the Police Personnel of the Directorate of Special Criminal Investigation at the South Sumatra Regional Police is very much determined by providing remuneration received by personnel on time according to applicable regulations, then increasing the work motivation of personnel with leadership techniques always giving appreciation for personnel work performance.
APA, Harvard, Vancouver, ISO, and other styles
25

Horan, Cecelia, and Hossein Saiedian. "Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions." Journal of Cybersecurity and Privacy 1, no. 4 (September 30, 2021): 580–96. http://dx.doi.org/10.3390/jcp1040029.

Full text
Abstract:
As technology has become pivotal a part of life, it has also become a part of criminal life. Criminals use new technology developments to commit crimes, and investigators must adapt to these changes. Many people have, and will become, victims of cybercrime, making it even more important for investigators to understand current methods used in cyber investigations. The two general categories of cyber investigations are digital forensics and open-source intelligence. Cyber investigations are affecting more than just the investigators. They must determine what tools they need to use based on the information that the tools provide and how effectively the tools and methods work. Tools are any application or device used by investigators, while methods are the process or technique of using a tool. This survey compares the most common methods available to investigators to determine what kind of evidence the methods provide, and which of them are the most effective. To accomplish this, the survey establishes criteria for comparison and conducts an analysis of the tools in both mobile digital forensic and open-source intelligence investigations. We found that there is no single tool or method that can gather all the evidence that investigators require. Many of the tools must be combined to be most effective. However, there are some tools that are more useful than others. Out of all the methods used in mobile digital forensics, logical extraction and hex dumps are the most effective and least likely to cause damage to the data. Among those tools used in open-source intelligence, natural language processing has more applications and uses than any of the other options.
APA, Harvard, Vancouver, ISO, and other styles
26

Bilous, V. V., and O. P. Bilous. "INNOVATIVE APPROACHES TO PERPETUATION OF MONEY AS MATERIAL EVIDENCE IN CRIMINAL PROCEEDINGS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 55–69. http://dx.doi.org/10.32353/khrife.2017.07.

Full text
Abstract:
The paper is devoted to the actual problems of innovative technologies introduction into the activity on crimes investigation. Based on the analysis of the state ofperpetuation by the bodies ofpre-trial investigation of money, acquired by criminally wrongful way or obtained by a legal entity as a result of a criminal offense commission, the authors distinguished typical violations of procedural orders and criminalistical recommendations in dealing with monetary notes as material evidence during the conduct of investigative (search) actions. With the purpose of equipping the bodies of pre-trial investigation with modern scientific and technical means of field criminalistics, there was proposed the concept of a unique technical and criminalistic tool in the form of a manyfunctional multicurrency software and hardware complex, that in the processing of monetary notes - material evidence when carrying out investigative (search) actions, would ensure high-speed automated performance of such functions as: 1) detection of the validity of a large number of banknotes in national andforeign currencies ofdifferent denominations and years of issue, with recognition ofvarious types of falsifications, as well as souvenir products and special imitation means; 2) sorting; 3) recalculation with the determination of the total quantity and quantity by each note and total amount; 4) scanning and perpetuation by compiling and printing a detailed written description (appendix to the inspection protocol), andfull- colour digital photography and high-resolution video recording of not only the general form and machine-readable mandatory requisites of banknotes, but also various acquired criminalistic important signs (inscriptions, fingerprints, microparticles, spots of various substances of natural and synthetic origin, etc.); 5) data exchange in real time with databases of the National Bank of Ukraine and various criminalistics registrations, first of all, with a database of criminalistic accounting of monetary notes; 6) packing and sealing of seized monetary notes.
APA, Harvard, Vancouver, ISO, and other styles
27

Sprycha, Andrzej. "Processing Personal Data by the Police in the Light of Changes in EU Law." Internal Security 9, no. 2 (July 9, 2018): 229–37. http://dx.doi.org/10.5604/01.3001.0012.1715.

Full text
Abstract:
In implementing their statutory tasks the Police can acquire a whole range of personal information, including sensitive data. This usually has a direct relation with combating crime. Therefore, such powers might be implemented without the knowledge and consent of persons to whom the information (data) concerns. Because police activities cause serious and profound intrusion into the sphere of a person’s private life, whose protection is guaranteed by the Constitution, they must be carried out within the limits strictly permitted by law. When discussing national regulations in force which control the issue of personal data protection, one must also take into consideration EU regulations. First of all the European Parliament and Council Regulation (EU) 2016/679 of 27th April 2016 on the protection of natural persons with regard to the processing of personal data and the European Parliament and Council Directive (EU) 2016/680 of 27th April 2016 on the protection of natural persons with regard to the processing of personal data. This directive, commonly known as the police directive, constitutes regulations on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection and prosecution of criminal offences and execution of penalties. The national legislator faces a difficult task of implementation of the above-mentioned European legal acts, all the more so because the choice of particular solutions, to be adopted in their transposition to the legislative and implementing provisions, still remains an open issue. The adopted solutions ought to, on the one hand, ensure coherence with national regulations that implement them, on the other hand, they ought to cause the appropriate adjustment of the Polish law regulations to their requirements. The article presents the normative contents and remarks regarding appropriate, consistent with EU law processing of personal data by the Police.
APA, Harvard, Vancouver, ISO, and other styles
28

Saldana-Perez, M., C. Palma, Y. Z. Contreras, N. Carrillo, and M. Moreno-Ibarra. "GEOVISUALIZATION ANALYSIS OF GENDER-BASED VIOLENCE IN MEXICO CITY USING 3D MAPPING APPROACH." ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences X-4/W2-2022 (October 14, 2022): 241–47. http://dx.doi.org/10.5194/isprs-annals-x-4-w2-2022-241-2022.

Full text
Abstract:
Abstract. The study of criminal acts is a topic of great interest to society and with the increase of violence against women in the world makes working with this type of data an important subject, where it can be used to detect areas with high crime rates to help in decision making. This work uses open data sets available from government entities of Mexico City, where three sectors of interest were studied: economic, education, and transportation around the criminal investigation reports made by the government. For the processing and analysis of spatial data, QGIS was used with the help of open-source libraries, the 2D and 3D modelling was carried out to create heatmaps and detect hotspots. It was found that the Historic center of Mexico City is the most insecure and that the Cuauhtémoc district stands out as the most dangerous zone, for transport stations, the ones that had the most intersections with other stations are the ones that presented greater problems of gender violence, in the economic sector there was a high incidence in the limits of each district, contrary to the results obtained on the educational services.
APA, Harvard, Vancouver, ISO, and other styles
29

Sailellah, Aswin Nugraha. "Application of Military Law Against TNI Members Who Commit Desertion Crimes." Jurnal Hukum Volkgeist 5, no. 2 (June 23, 2021): 115–29. http://dx.doi.org/10.35326/volkgeist.v5i2.846.

Full text
Abstract:
This study aims to: 1) To analyze the application of military criminal law against members of the TNI perpetrators of desertion crimes; 2) To analyze the constraints in the enforcement of miiliter criminal law against members of the TNI perpetrators of desertion crimes. This study uses normative-empirical legal research, while the data analysis used is qualitative approach to primary data and secondary data. where in analyzing / processing data first held organizing of primary data obtained through related legislation and literature. Then the collected data is then discussed, compiled, elaborated, and interpreted, and reviewed the problem so that a conclusion is obtained as a problem solving effort. The results showed that the application of military criminal law against members of the TNI who were proven to commit desertion crimes is the authority of the military judiciary to prosecute him, then the stages in the form of investigations conducted by the Military Police on the orders of the Superior Who Has the Right to Punish (Ankum). furthermore, the investigation file is given to the Military Oditur to be studied, then the military oditur makes an indictment to be delegated to the Military Judiciary, after the judiciary feels sufficient with the files of the Military Oditur, then the military judiciary will prosecute members of the military who are accused of desertion. Furthermore, constraints in law enforcement related to desertion crimes are reviewed from 4 interrelated aspects, namely with regard to legal subtansi, the legal structure itself, facilities or infrastructure, and the community. The settlement of cases in the military judiciary at this time has been well arranged, but it is expected that all who play a role in the process of resolving military cases do all these stages based on Justice and Positive Law. The application of existing regulations must be done consistently and always conducted a review of desertion cases so that from these obstacles can be found solutions and solutions to reduce the quantity of desertion crimes.
APA, Harvard, Vancouver, ISO, and other styles
30

Lantukh, Eduard Vladimirovich, Sergey Viktorovich Petrakov, Albina Vladimirovna Bachieva, Victoria Eduardovna Shunk, and Oksana Leonidovna Romanova. "Quintessence of the forensic methodology for investigating illegal acts committed by foreign nationals." SHS Web of Conferences 108 (2021): 04012. http://dx.doi.org/10.1051/shsconf/202110804012.

Full text
Abstract:
Currently, there is a natural and labor migration, which is also the reason for the growth of crimes committed by foreigners. The purpose of the study is to make a complete algorithmized design of the organizational and procedural measures integrated into the methodology of investigation of any crime, the subject of which is a foreigner. Research methods: analysis of statistical data, survey, analysis and synthesis of comparative research of criminal cases, legal rules, fundamental scientific research, deduction. The novelty of the results: in the work, an algorithm in a synthesized form is created, which can be applied without additional processing by an employee of any law enforcement agency that investigates a crime committed by a foreigner.
APA, Harvard, Vancouver, ISO, and other styles
31

Sembiring, Imanuel, Ediwarman Ediwarman, and Marlina Marlina. "Penegakan Hukum terhadap Tindak Pidana Tanpa Hak Menguasai Senjata Tajam dalam Aksi Unjuk Rasa Penolakan RUU KUHP." Journal of Education, Humaniora and Social Sciences (JEHSS) 4, no. 2 (October 24, 2021): 1075–80. http://dx.doi.org/10.34007/jehss.v4i2.802.

Full text
Abstract:
This paper aims to examine and analyze the rule of law, law enforcement and criminal policy against criminal acts without the right to control sharp weapons. To approach this problem, the theory of the legal system is used. The data were collected through interview guidelines and analyzed qualitatively. This study concludes that the rule of law regarding law enforcement against criminal acts without the right to control sharp weapons in demonstrations is regulated in Emergency Law Number 12 of 1951 in Article 2 paragraph (1), Law no. 9 of 1998 concerning Freedom to Express Opinions in Public in Article 16, Perkapolri No. 7 of 2012 concerning Procedures for the Implementation of Services, Security, and Handling of Public Opinion Cases in Article 8 letter j. Law enforcement against criminal acts without the right to control sharp weapons in demonstrations against the Criminal Code Bill at the Medan District Court is carried out through investigations, prosecutions and judges' decisions. The criminal law policy against people who carry sharp weapons in Medan City consists of a penal policy carried out by legally processing the perpetrators, followed by examining the defendants at trial. Non-penal policies as a preventive measure for criminal acts without the right to control sharp weapons are counseling, raids and community participation.
APA, Harvard, Vancouver, ISO, and other styles
32

Bessonov, A. A. "The use of artificial intelligence algorithms in the criminalistic study of criminal activity (on the example of serial crimes)." Courier of Kutafin Moscow State Law University (MSAL)), no. 2 (May 17, 2021): 45–53. http://dx.doi.org/10.17803/2311-5998.2021.78.2.045-053.

Full text
Abstract:
Since artificial intelligence technologies are firmly embedded in many areas of modern life, it is time to explore in detail their capabilities in criminology in the study of criminal activity. The article describes the experience of developing digital models of serial crimes committed for sexual reasons using artificial intelligence algorithms. The empirical basis of the study was data on 1068 serial crimes, including murder. Methods of mathematical statistics and a number of artificial intelligence algorithms were used for data processing: gradient boosting, neural networks, logistic regression, etc. As a result, typical signs of crimes and natural connections between them, used for training models, presented by artificial intelligence algorithms, are revealed. The obtained decision support systems allow predicting the distance from the crime scene to the place of residence of the offender (accuracy 88.3—93.5 %), the age of the offender (accuracy 80.3 %, confidence interval ±6 years), the presence of a mental illness (accuracy 81.5 %) and criminal record (accuracy 82 %), as well as some other characteristics. According to the results of the study, it is concluded that the methods of mathematical statistics and artificial intelligence can be used in the investigation of crimes, as well as in criminalistics.
APA, Harvard, Vancouver, ISO, and other styles
33

Sukhodolov, Alexander, and Anna Bychkova. "Artificial Intelligence in Crime Counteraction, Prediction, Prevention and Evolution." Всероссийский криминологический журнал 12, no. 6 (December 24, 2018): 753–66. http://dx.doi.org/10.17150/2500-4255.2018.12(6).753-766.

Full text
Abstract:
Crime prediction, prevention and counteraction with the use of modern technologies should, according to the authors, become a priority task for the state, along with the development of economy, education, medicine and the enhancement of defense capacity. The article describes the concepts of «artificial intelligence», «machine learning», «big data», «deep learning», «neural networks» from the standpoint of how they are used both by criminals and by law enforcement bodies and courts. The authors examine the application of technologies which use artificial intelligence, hi tech crime (fishing, drones, fake information, bots, and so on). They outline modern software solutions based on artificial intelligence and aimed at counteracting crime: software that analyzes big volumes of data, processing of stream videos, facial recognition, contextual searching platforms, etc. The authors also describe the existing resources for predictive analytics (in particular, inter-agency experimental software «Artificial Intelligence in Police Work and Investigation of Criminal Offences»; software for recognizing people based on fragments of their tattoos; facial recognition of people after plastic surgeries in pictures and stream videos, with the generation of variants of their original appearance; platform of contextual intelligence Nigel; system Mayhem and others) and how they can be used to predict both crimes in general and individual criminal behavior. The authors also outline ethical dilemmas connected with legal decisions made by artificial intelligence regarding specific people. They present examples of using artificial intelligence for crime prevention (software COMPAS, criminal community’s psychometric prediction system, Harm Assessment Risk Tool, analytical software complex CEG, crime prediction system PredPol, ePOOLICE system, Palantir software, Russian system «Artificial intelligence»). They also outline the indicators of the early crime prevention system: indicators of matching, lagging, cyclical and counter-cyclical indicators. The authors state that Russia is lagging behind other countries in its use of artificial intelligence in law enforcement and suggest adopting the Modern Strategy of Crime Counteraction, Prediction and Prevention. Possible directions of this strategy are described.
APA, Harvard, Vancouver, ISO, and other styles
34

Potemkina, Olga. "EUROPOL’S NEW MANDATE: BETWEEN SECURITY AND CIVIL FREEDOMS." Scientific and Analytical Herald of IE RAS 24, no. 6 (December 31, 2021): 7–14. http://dx.doi.org/10.15211/vestnikieran62021714.

Full text
Abstract:
The article presents the EU Commission’s legislative initiative to amend the current Regulation of 2016, which defines powers and functions of the EU Agency for Law Enforcement Cooperation (Europol). The author cites the arguments used by the EU Commission in its decision to expand the functions and powers of the agency: the successful acquisition of new technologies by criminal gangs, the challenges of digital threats for law enforcement and judicial agencies of Member States, which find it difficult at the national level to properly process big data for the investigation of cross-border crimes. The article analyses the main thematic blocks of the new Regulation: enabling Europol to cooperate in the fight against criminal offenses with private parties; empowering the agency to carry out preliminary processing of big and complex databases; strengthening the role of Europol in the field of research and innovation; enabling Europol to enter alerts into the Schengen Information System, etc. The author believes that the expansion of Europol's operational powers brings it one step closer to the «European FB», i.e., an organization of a supranational nature. At the same time, the author cites the arguments of the reform’s opponents, including the political groups of the European Parliament and human rights organisations, which can be divided into two groups: a) under the pretext of ensuring security, the Commission legalises the current practice of Europol, which has gone beyond its current mandate, b) the new functions of the agency for processing a big data pose a threat to the citizens’ rights.
APA, Harvard, Vancouver, ISO, and other styles
35

Sumathi, J. k. "Dynamic Image Forensics and Forgery Analytics using Open Computer Vision Framework." Wasit Journal of Computer and Mathematics Science 1, no. 1 (March 17, 2021): 1–8. http://dx.doi.org/10.31185/wjcm.vol1.iss1.3.

Full text
Abstract:
The key advances in Computer Vision and Optical Image Processing are the emerging technologies nowadays in diverse fields including Facial Recognition, Biometric Verifications, Internet of Things (IoT), Criminal Investigation, Signature Identification in banking and several others. Thus, these applications use image and live video processing for facilitating different applications for analyzing and forecasting." Computer vision is used in tons of activities such as monitoring, face recognition, motion recognition, object detection, among many others. The development of social networking platforms such as Facebook and Instagram led to an increase in the volume of image data that was being generated. Use of image and video processing software is a major concern for Facebook because the photos and videos that people post to the social network are doctored images. These kind of images are frequently cited as fake and used in malevolent ways such as motivating violence and death. You need to authenticate the questionable images before take action. It is very hard to ensure photo authenticity due to the power of photo manipulations. Image formation can be determined by image forensic techniques. The technique of image duplication is used to conceal missing areas.
APA, Harvard, Vancouver, ISO, and other styles
36

Baskoro, Yusuf Suryo, Hafsah Hafsah, and Herlina Jayadianti. "REPRESENTASI PENGETAHUAN DALAM SEMANTIK ONTOLOGI PADA DOMAIN KRIMINALITAS KEPOLISIAN SEKTOR DEPOK TIMUR DAERAH ISTIMEWA YOGYAKARTA." Telematika 15, no. 1 (April 30, 2018): 13. http://dx.doi.org/10.31315/telematika.v15i1.3062.

Full text
Abstract:
Abstract:The performance of an agency is very dependent on the data and quality of information obtained, not least in the police agency. The Criminal Investigation Unit (SatResKrim) is one of the most important units in the police force. One form of handling SatResKrim is to manage crime data. Crime data is managed because it contains information to support the investigation process. The information used in the investigation process is included in the crime data, so it is necessary to search for documents of criminal data relevant to the investigation process. Currently, data on SatResKrim unit at East Sector Police Dept. of Yogyakarta Special Region still use Microsoft Excel application, so the process of searching data is still based on text not based on knowledge, consequently if the search keyword is not in accordance with the text contained in the data, then the data is not will appear, if the data does not appear it will slightly hamper the investigation process. From these problems raised the idea to represent police crime data into the form of knowledge as an effort in providing references to the police agencies against the form of development of data processing crime-based semantic ontology. Knowledge of crime data is limited to criminal data by category of theft. Knowledge related to theft criminal data is then stored or represented in an ontology-based semantic model. In representing knowledge using language Ontology Web Language (OWL) and SPARQL as its query. Software used to build systems in this study include protégé 3.5, NetBeans and Jena API as its library. The programming language used is Java Server Page (JSP). Based on the results of research that has been done, by representing crime data into the form of semantic ontology-based knowledge and tested into the form of search-based applications, can generate semantic-based search or search that is able to understand the meaning. It is also supported by test results using recall and precision methods, each of which results in a value of more than 90%. Abstrak:Kinerja suatu instansi sangat bergantung pada data dan mutu informasi yang diperoleh, tak terkecuali pada instansi kepolisian. Satuan Reserse Kriminal (SatResKrim) merupakan salah satu unit terpenting dalam kepolisian. Salah satu bentuk penanganan SatResKrim adalah dengan mengelola data kriminalitas. Data kriminalitas dikelola karena mengandung informasi guna menunjang proses investigasi. Informasi yang digunakan dalam proses investigasi diantaranya terdapat pada data kriminalitas, sehingga diperlukan adanya pencarian terhadap dokumen data kriminalitas yang relevan dengan proses investigasi. Saat ini data yang berada pada unit SatResKrim pada Kepolisian Sektor Depok Timur Daerah Istimewa Yogyakarta masih menggunakan aplikasi Microsoft Excel, sehingga proses pencarian data masih berdasarkan teks bukan berdasarkan pengetahuan, akibatnya apabila kata kunci pencarian tidak sesuai dengan teks yang terdapat pada data, maka data tidak akan muncul, jika data tidak muncul maka akan sedikit menghambat proses investigasi. Dari permasalahan tersebut memunculkan gagasan untuk merepresentasikan data kriminalitas kepolisian kedalam bentuk pengetahuan sebagai upaya dalam memberikan referensi kepada instansi kepolisian terhadap bentuk pengembangan pengolahan data kriminalitas berbasis semantik ontologi. Pengetahuan-pengetahuan mengenai data kriminalitas dibatasi pada data kriminalitas dengan kategori pencurian. Pengetahuan-pengetahuan terkait data kriminalitas pencurian kemudian disimpan atau di representasikan dalam model semantik berbasis ontologi. Dalam merepresentasikan pengetahuan menggunakan bahasa Ontology Web Language (OWL) serta SPARQL sebagai query-nya. Software yang digunakan untuk membangun sistem dalam penelitian ini meliputi protégé 3.5 ,NetBeans serta Jena API sebagai library-nya. Bahasa pemrograman yang digunakan adalah Java Server Page (JSP). Berdasarkan hasil penelitian yang telah dilakukan, dengan merepresentasikan data kriminalitas kedalam bentuk pengetahuan berbasis semantik ontologi dan di ujikan ke dalam bentuk aplikasi berbasis pencarian, dapat menghasilkan pencarian berbasis semantik atau pencarian yang mampu memahami makna. Hal tersebut juga didukung oleh hasil uji dengan menggunakan metode recall dan precision yang masing-masing hasilnya menunjukkan nilai lebih dari 90%.
APA, Harvard, Vancouver, ISO, and other styles
37

Tarozienė, V. "SKIRTINGUS NUSIKALTIMUS PADARIUSIŲ PILNAMEČIŲ NEUTRALIZACIJOS: ĮVAIROVĖ, PAPLITIMAS, SĄSAJOS SU KRIMINALINE PATIRTIMI." Psichologija 42 (January 1, 2010): 102–21. http://dx.doi.org/10.15388/psichol.2010.0.2568.

Full text
Abstract:
Remiantis socialinės informacijos apdorojimo modeliu (Crick and Dodge, 1994), papildytu neutralizaCcijos procesu (Sykes and Matza, 1957), straipsnyje analizuojamos turtinius, mišrius, smurtinius ir neteisėto disponavimo nusikaltimus padariusių pilnamečių vyrų neutralizacijos: jų įvairovė ir paplitimas skirtingus nusikaltimus padariusių asmenų grupėse bei priklausomybė nuo nuteistųjų kriminalinės patirties. Neutralizacijos įvertintos smurto neutralizacijos skale (Agnew, 1994) (n = 161) ir analizuojant pusiau struktūruotus interviu apie tiriamųjų padarytą nusikaltimą (n = 67). Tyrimo rezultatai parodė, kad pilnamečių nuteistųjų neutralizacijų naudojimas susijęs su šių asmenų padaryto nusikaltimo pobūdžiu. Nusikaltimus, turinčius smurto komponentą (mišrius, smurtinius) padarę tiriamieji dažniausiai naudojo atsakomybės neigimo ir aukos neigimo neutralizacijas. Nusikaltimus be smurto komponento (turtinius, neteisėto disponavimo) padarę tiriamieji dažniausiai naudojo žalos neigimo neutralizacijas. Turtinius nusikaltimus padarę nuteistieji žalos neigimo neutralizacijas, o smurtinius nusikaltimus padarę asmenys – aukos neigimo neutralizacijas naudojo dažniau, negu kitus nusikaltimus padarę tiriamieji(p < 0,01). Nustatyta, kad pilnamečiai nuteistieji vienu metu gali naudoti keletą skirtingų neutralizacijų, ir tai, tikėtina, sustiprina neutralizacijos efektą. Tyrimo rezultatai atskleidė, kad neutralizacijų naudojimas nepriklauso nuo nuteistųjų kriminalinės patirties, taip pat nuo kriminalinės patirties ir padaryto nusikaltimo pobūdžio sąveikos.Pagrindiniai žodžiai: neutralizacija, nusikalstamas elgesys, kriminalinė patirtis.Neutralizations of adults committing different crimes:Variety, prevalence and connection with criminal experienceTarozienė V. SummaryThere is a lack of information about neutralizations used by adult criminals who have committed different crimes. Moreover, very little is known about the mechanism of neutralization establishment and changes of prevalence in groups of people with different criminal experience, and the available data are controversial. According to G.M.Sykes, D.Matza (1957), neutralizations are learned together with the conduct of crime and do not change in prevalence with increasing criminal experience. Other researchers conclude that with accumulation of antisocial experience, the need of neutralization reduces. The aim of this investigation was to identify neutralizations of adult convicts who have committed different crimes and to test the effect of criminal experience on neutralization. There were three goals of the recent study: 1) to identify the prevalence of neutralization in groups of adult convicts who committed property, violence, mixed (robberies) and illegal disposal crimes; 2) to compare the frequency of different neutralizations used by adult convicts who have committed different crimes; 3) to test the effect of criminal experience, as well as of interaction of criminal experience and the type of crime on neutralization. The social information processing model (Crick and Dodge, 1994) complemented with the neutralization process (Sykes and Matza, 1957) was chosen as a theoretical background of the study. We state that neutralizations are the interpretation process in the second step of the social information processing model. Neutralization of adult men who had committed property (theft), violence (murder, aasault), mixed (robbery) and illegal disposal (drugs, alcohol) crimes was investigated. Participants of the research were divided into two groups by the amount of previous convictions. A supra-secondary analysis of data collected during the program “One to one” (Priestley, 2008) was performed. Two investigators coded different types of neutralizations in semi-structured interview protocols about crimes committed by participants (n = 67). Coded information about the frequency of different types of neutralization as well as scores of the violence neutralization scale (Agnew, 1994) (n = 161) were processed in the further statistical analysis.The results of the research showed that the types of neutralization were significantly related to the type of crime committed by adult convicts (p < 0.001). The prevalence of neutralizations varied in groups of men who had committed different crimes. Men who had committed crimes with elements of violence (violent crimes and robberies) mostly used denial of responsibility and denial of victim (above 80% of group participants). Men who had committed crimes without elements of violence (property and illegal disposal crimes) mostly used denial of harm (about 85% of group participants). Groups of convicts who had committed different crimes significantly differed in the rates of two neutralizations: denial of harm (p < 0.01) and denial of victim (p < 0.01). Men who had convicted property crimes used denial of harm and men who had convicted of violent crimes used denial of victim more often than convicts in other groups. Results of this investigation show that convicts can use several different neutralizations at a time. There was an insignificant main effect of the amount of criminal experience on the frequency of neutralization (p > 0.05). Neither there was a significant interaction between the criminal experience and the type of crime on the frequency of neutralization (p > 0.05).Keywords: neutralization, criminal behavior, criminal experience.
APA, Harvard, Vancouver, ISO, and other styles
38

Grigoryev, Viсtor, Alexander Sukhodolov, Sergey Ovanesyan, Marina Spasennikova, and Vladislav Tyunkov. "Digital Information Platforms as an Object of Normative Legal Regulation in the Sphere of Criminal Proceedings." Russian Journal of Criminology 13, no. 6 (December 26, 2019): 873–83. http://dx.doi.org/10.17150/2500-4255.2019.13(6).873-883.

Full text
Abstract:
While noting the general trend for the regulation of digital relations in the sphere of criminal court proceedings, the authors draw attention to the absence of a common approach to this work, or of a universal understanding of criminal procedure norms regarding digital relations, as well as to the drawbacks in preparing new norms that regulate digital relations. Problems connected with the regulation of electronic processes are not specific for Russia only. Laws of some countries do not recognize evidence obtained electronically, and view it as secondary. The results of implementing the road map of digital economy and the approaches to the definition and typification of digital platforms are the basis for laying the foundations of the criminal proceedings’ digitization in Russia. Large-scale growth of innovations for the platforms and an increasing complexity of their architecture enable the solution of a new research task — the spread of digital platforms to various sectors, in this case, to the sphere of criminal proceedings. The authors use the definition of a digital platform approved by the Russian Governmental Commission on Digital Development to formulate their own definition of a digital information platform as an object of normative legal regulation in the sphere of criminal proceedings and prove that it should belong to sectoral digital platforms. The value of the transition to the normative legal regulation of digital information systems in the sphere of court proceedings lies in the reduction of costs and the elimination of the subjective factor by using a package of digital technologies of data processing and changing the system of the division of labor while reaching the purpose of criminal justice. The authors also stress the inappropriateness of simplification and primitivism, when a criminal procedure system is mechanically viewed as a system of distributed registers (blockchain), or when digitization is used as an excuse for suggesting the abolishment of investigative departments as parasites in the digital reality where crime investigation and solution become a job for ordinary internet users.
APA, Harvard, Vancouver, ISO, and other styles
39

., Widodo, Achmad Irwan Hamzani, and Fajar Ari Sudewo. "Eradication of Corruption in Local Governments Based on Cooperation Agreements." Journal of Production, Operations Management and Economics, no. 12 (November 22, 2021): 1–12. http://dx.doi.org/10.55529/jpome12.1.12.

Full text
Abstract:
Eradication of corruption requires cooperation between state institutions. The weakness of criminal law settlement does not return state losses. There is a Cooperation Agreement between the Ministry of Home Affairs, the Indonesian National Police (Polri), and the Prosecutor's Office regarding the handling of public reports on allegations of corruption in local governments. The purpose of this study is to analyze the handling of corruption cases based on positive Indonesian law and the obstacles faced by law enforcement officers in implementing the cooperation agreement between the Ministry of Home Affairs, the Prosecutor's Office, and the National Police against Article 4 of the Corruption Eradication Act. The approach used in this research is the legal approach. This research data collection technique was carried out through conventional literature searches and online. The data analysis technique used in this study is qualitative because the data is presented in a narrative-descriptive manner. The results of the study indicate that law enforcement for criminal acts of corruption is carried out by the Corruption Eradication Commission based on the Law of the Republic of Indonesia Number 30 of 2002. The Indonesian National Police based on the Law of the Republic of Indonesia Number 2 of 2002 and the Criminal Procedure Code has the authority to conduct investigations and investigations in special criminal cases. corruption. The Law of the Republic of Indonesia Number 16 of 2004 has explicitly stated that the Prosecutor's Office has the authority to investigate criminal acts of corruption. The authority to adjudicate cases of criminal acts of corruption is regulated in the Law of the Republic of Indonesia Number 46 of 2009. The Cooperation Agreement between the Ministry of Home Affairs, the Police, and the Prosecutor's Office hampers the law enforcement process carried out by the Police and the Prosecutor's Office in processing suspected perpetrators of corruption. Every report of corruption from the public is not immediately followed up by the Police and the Prosecutor's Office as law enforcement officers. The case was first examined by the government's internal supervisory apparatus. With the cooperation agreement, law enforcement officers cannot follow up on reports and evidence.
APA, Harvard, Vancouver, ISO, and other styles
40

Wilkowski, Artur, Maciej Stefańczyk, and Włodzimierz Kasprzak. "Training Data Extraction and Object Detection in Surveillance Scenario." Sensors 20, no. 9 (May 8, 2020): 2689. http://dx.doi.org/10.3390/s20092689.

Full text
Abstract:
Police and various security services use video analysis for securing public space, mass events, and when investigating criminal activity. Due to a huge amount of data supplied to surveillance systems, some automatic data processing is a necessity. In one typical scenario, an operator marks an object in an image frame and searches for all occurrences of the object in other frames or even image sequences. This problem is hard in general. Algorithms supporting this scenario must reconcile several seemingly contradicting factors: training and detection speed, detection reliability, and learning from small data sets. In the system proposed here, we use a two-stage detector. The first region proposal stage is based on a Cascade Classifier while the second classification stage is based either on a Support Vector Machines (SVMs) or Convolutional Neural Networks (CNNs). The proposed configuration ensures both speed and detection reliability. In addition to this, an object tracking and background-foreground separation algorithm is used, supported by the GrabCut algorithm and a sample synthesis procedure, in order to collect rich training data for the detector. Experiments show that the system is effective, useful, and applicable to practical surveillance tasks.
APA, Harvard, Vancouver, ISO, and other styles
41

Ķinis, Uldis, and Ņikita Sinkevičs. "Automatizētās datu apstrādes sistēmā esošo datu kontrole (Kriminālprocesa likuma 219. pants): nacionālie un starptautiskie piemērošanas aspekti." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 1, no. 19 (2021): 90–109. http://dx.doi.org/10.25143/socr.19.2020.1.090-109.

Full text
Abstract:
Raksta tapšanas ideja ir saistīta ar Valsts policijas iesniegto priekšlikumu Tieslietu ministrijas Kriminālprocesa ekspertu pastāvīgajai darba grupai par grozījumiem Kriminālprocesa likuma 219. panta otrajā daļā. Kriminālprocesa likuma 219. pants “Automatizētās datu apstrādes sistēmā esošo datu kontrole” būtībā ir analogs Kibernoziegumu konvencijas 19. pantam, kas uzliek dalībvalstīm pienākumu pieņemt tādus tiesību aktus, kas atvieglotu to teritorijā esošo sistēmu pārmeklēšanu. Priekšlikuma būtība: atteikties pantā no nacionālās teritoriālās piemērošanas klauzulas, jo tā ierobežojot policijas iespējas iegūt pierādījumus, ja no pārmeklējamās sistēmas ir iespējams likumīgi piekļūt datiem, kas glabājas sistēmās, kas atrodas ārpus Latvijas Republikas teritorijas. Citiem vārdiem sakot, idejas būtība ir mainīt panta piemērošanas jurisdikciju no nacionāli teritoriālās uz pārrobežu. Diskusija par to, vai vienai dalībvalstij ir tiesības veikt datu sistēmu pārmeklēšanu citā dalībvalstī, notiek jau kopš Kibernoziegumu konvencijas pieņemšanas. Turklāt tā turpināsies vismaz līdz Konvencijas otrā Papildprotokola pieņemšanai, kur būtu jāatrisina jautājumi ar pārrobežu sistēmu pārmeklēšanu un datu izņemšanu. Rakstā tiks analizēts, vai un kā situācija, īpaši saistībā ar jurisdikciju kriminālprocesā, pēc Kibernoziegumu konvencijas un Kriminālprocesa likuma pieņemšanas ir mainījusies, un tiks sniegti priekšlikumi, kā efektīvāk būtu risināma problēma, kuru aktualizējusi Valsts policija. The article “Control of Data Located in Automated Data Processing Systems: National and International Application Aspects” is the result of the idea initiated by the proposal submitted by the Latvian State Police, to the Permanent Working Group of Criminal Procedure Experts of the Ministry of Justice regarding the amendment of Section 219, Paragraph 2 of the Criminal Procedure Law. Article 219 of the Criminal Procedure Law “Control of Data in an Automated Data Processing System” is essentially analogous to Article 19 of the Cybercrime Convention, which obliges Member States to adopt such legislation as to facilitate the search of data in systems located within their territory. The essence of the proposal is to renounce the national territorial application clause in the Article, as it restricts the police operability to obtain evidence in criminal proceedings in situations where data stored in another computer systems are located outside of the territory of Latvia but are legally accessible from searchable system via Internet. In other words, to change the scope of jurisdiction of search and seizure to transborder search and seizure. The debate on whether one Member State is entitled to search and capture data in a system located in the territory of another Member State, is not new. It has been running since the adoption of the Convention and it is believed it will continue at least until the adoption of the Second Additional Protocol to the Convention, which should address issues related to cybercrime investigations. In the article, the authors will analyse what and how the situation has fundamentally changed since the adoption of the Cybercrime Convention and the Criminal Procedure Law, especially regarding the understanding of jurisdiction in the application of criminal procedural instruments. The authors also aim to provide their solutions for solving problems in relation with the proposal submitted by the State Police.
APA, Harvard, Vancouver, ISO, and other styles
42

Murauskas, Donatas. "Predictive analytics in crime prevention and the European Convention on Human Rights: tackling risks in privacy and fair trial frameworks." Acta Universitatis Lodziensis. Folia Iuridica 97 (December 30, 2021): 225–50. http://dx.doi.org/10.18778/0208-6069.97.13.

Full text
Abstract:
In this paper, I discuss whether the European Convention on Human Rights provides safeguards to individuals affected by predictive analytics in crime prevention. I start with depicting a conceptual issue that worries legal scholars – the trend of law-enforcement authorities to increase their attention to crime prevention rather than traditional criminal investigations. Then, I dive into the right to privacy case-law of the European Court of Human Rights looking for the Court’s references to the threats of data processing. Lastly, I select concrete cases of the European Court of Human Rights on the right to a fair trial to show that the human rights safeguards are not yet developed to frame predictive analytics in crime prevention.
APA, Harvard, Vancouver, ISO, and other styles
43

Шинаков, Кирилл, Kirill Shinakov, Михаил Рытов, Mikhail Rytov, Оксана Голембиовская, Oksana Golembiovskaya, Ксения Чиркова, and Kseniya Chirkova. "SAFETY RISK ASSESSMENT OF INFORMATION SYSTEMS PROCESSING CONFIDENTIAL INFORMATION." Bulletin of Bryansk state technical university 2016, no. 2 (June 30, 2016): 193–200. http://dx.doi.org/10.12737/20289.

Full text
Abstract:
Confidential information processing in information systems under conditions of the universal informatization in both stateowned and private companies is an urgent problem. Many operators processing a trade secret or per-sonal data underestimate possible damage caused by the disclosure, deletion or change of confidential in-formation and afterwards become victims either of deliberate criminals or suits of workers whose rights were violated. In such a way, the safety risk assessment of confidential information processed in information systems is a priority trend both for an operator and for a subject of confidential information. As a result of the investigation carried out there was developed a procedure for risk assessment of information systems processing confidential information in which it is possible to define and process a critical group of threats, and also a system for the definition of sufficient and the best set of countermeasures among possible ones. At the intermediate and final stage there is defined a significance of an information safety risk witnessing of measures carried out for the assurance of confidential information safety.
APA, Harvard, Vancouver, ISO, and other styles
44

Lokanan, Mark. "An update on self-regulation in the Canadian securities industry (2009-2016)." Journal of Financial Regulation and Compliance 27, no. 3 (July 8, 2019): 324–44. http://dx.doi.org/10.1108/jfrc-05-2018-0075.

Full text
Abstract:
Purpose This paper aims to analyze the processing of complaints against investment advisors and Member firms through the Investment Industry Regulatory Organization of Canada (IIROC) enforcement system between 2009 and 2016. The paper used the misconduct funnel to show the number of complaints that are “funneled in,” and how these complaints are subsequently “funneled out” and “funneled away” at the investigation and prosecution stages of IIROC enforcement system. Design/methodology/approach The paper uses data from IIROC enforcement annual reports from 2009 to 2016. A combination of descriptive statistics and correlation matrices was used to analyze the data. Findings The findings indicate that while IIROC “funneled in” more complaints, a significant proportion of complaints were “funneled out” of its enforcement system and funneled “away” from the criminal justice system. Fines imposed were often not collected from individual offenders. IIROC, it seems, is ineffective in handling the more serious and systematic industry problems. Practical implications It is hard not to see the findings from this study being used by the provincial securities commissions and the federal government to support the call for a national securities regulator in Canada. Originality/value This is the first study of its kind to systematically analyze the enforcement performance of IIROC.
APA, Harvard, Vancouver, ISO, and other styles
45

Vukovic, Igor, Petar Cisar, Kristijan Kuk, Milos Bandjur, and Brankica Popovic. "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification." Elektronika ir Elektrotechnika 27, no. 5 (October 27, 2021): 49–58. http://dx.doi.org/10.5755/j02.eie.29081.

Full text
Abstract:
In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.
APA, Harvard, Vancouver, ISO, and other styles
46

Armanda S, Ismu. "Implementation Of Diversion As A Restorative Justice Approach To Child Performers In Narcotics." Ratio Legis Journal 1, no. 1 (June 15, 2022): 59. http://dx.doi.org/10.30659/rlj.1.1.59-72.

Full text
Abstract:
The research problem is how to solve children who commit narcotics crimes in the conception of legal certainty and how to implement diversion against children who commit narcotics crimes in the Tangerang City area in the construction of the legal system. The research method uses sociological juridical. The type of research used is a research that combines Normative Legal Research and Empirical Legal Research. The data sources for this research are primary data and secondary data. This research is classified as research with qualitative data types, namely by processing the results of a literature study. The results of this study indicate that children who abuse narcotics are children who are victims of their own actions so that children who abuse narcotics are considered victims, not perpetrators of crime. And there are many provisions regarding restorative justice, whether issued by the Supreme Court, the Attorney General's Office, the police, or from other institutions. So as a restorative justice approach as an effort to resolve cases, namely seeking the application of diversion against narcotics abuse for children, it is carried out with deliberation procedures in accordance with the Law on the Juvenile Criminal Justice System and the appropriate action for child offenders is rehabilitation. With this restorative justice approach as a settlement effort at the investigation level without going through a judicial process involving all parties. This research is also expected to be a reference material for law enforcement officers in realizing legal certainty efforts.
APA, Harvard, Vancouver, ISO, and other styles
47

Keim, Yansi, Shinelle Hutchinson, Apoorva Shrivastava, and Umit Karabiyik. "Forensic Analysis of TikTok Alternatives on Android and iOS Devices: Byte, Dubsmash, and Triller." Electronics 11, no. 18 (September 19, 2022): 2972. http://dx.doi.org/10.3390/electronics11182972.

Full text
Abstract:
TikTok has consistently been one of the most used mobile apps worldwide on any mobile operating system. However, despite people’s enjoyment of using the application, there have been growing concerns about the application’s origins and alleged privacy violations. These allegations have become such a big problem that the former President of the United States, Donald Trump, expressed a desire to ban the TikTok application from being offered on US application stores like Google’s Play Store and Apple’s App Store. This remark sent TikTok users into a frenzy to find alternatives before the ban took effect. To this end, several alternative applications for TikTok have surfaced and are already garnering millions of users. In this paper, we identified three popular alternatives to the TikTok application (Byte, Dubmash, and Triller) and forensically analyzed each on smartphones of Android version 8 and iOS version 13. We focused on identifying forensically relevant artifacts that may be helpful to investigators in the event of a criminal investigation, should these or similar apps fall under scrutiny. We used Magnet AXIOM Process and Cellebrite UFED 4PC for acquisition, and Magnet AXIOM Examine and DB Browser for SQLite for analysis and reading. The investigation resulted in successful extraction of expected yet unique data points, plain text sensitive data, directories and format. These results lead to a discussion about identifying and comparing these app’s privacy concerns to that of TikTok, as formulated from the literature.
APA, Harvard, Vancouver, ISO, and other styles
48

Oderiy, Oleksiy, and Oleksiy Kozhevnikov. "GETTING CRIMINALLY SIGNIFICANT BY ANALYSIS OF OPEN INTERNET SOURCES." Law Journal of Donbass 73, no. 4 (2020): 144–55. http://dx.doi.org/10.32366/2523-4269-2020-73-4-144-155.

Full text
Abstract:
The article considers OSINT (Open source intelligence) technology, which is intelligence based on open sources. Development of digital means of photo and video recording, led to the emergence of a large number of media files that reproduce the objective situation at different intervals of time and space. Based on the analysis, it is proved that Open source intelligence can be successfully used by law enforcement agencies to solve specific forensic problems. Its advantages are identified, which are as follows: 1) its use does not require additional financial costs for: a) purchase of special equipment and software, because it is enough to have access to the World Wide Web and PC workstation (smartphone, tablet); b) training of certain specialists, as OSINT technology is quite simple both in mastering and in processing the source and obtaining forensic information; 2) it is freely available, and therefore can be used not only by law enforcement agencies (government officials), but also by private detectives, volunteers, etc.; 3) its use (under certain conditions) does not violate the rights of citizens. Practical examples of application of online services on search of the persons fixed on a photo or video images on anthropometric data are resulted. There are four main stages of the process of searching for people by appearance on the mentioned technology. It was stated that using OSINT technology, forensic experts of the Kharkiv Research Forensic Center of the Ministry of Internal Affairs of Ukraine in the period from October 2019 to February 2020 identified 22 people (from more than 95 researched materials), evidence in criminal proceedings. Of course, the information obtained during the monitoring of social networks can be used in the investigation of criminal proceedings, in which to solve the problem of identifying a person by appearance, appropriate examinations will be appointed. It is proposed to create interdepartmental analytical and search groups m the system of bodies of the Ministry of Internal Affairs of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
49

Simanjuntak, Dedy SV, Hamzah Hatrik, and Lidia Br Karo. "The Efforts Of Bengkulu Regional Police Investigators In Determining Corruption Suspects For Soybean Seed Procurement At Department Of Agriculture Of Bengkulu Province For Fiscal Year 2016." Bengkoelen Justice : Jurnal Ilmu Hukum 12, no. 1 (May 10, 2022): 34–43. http://dx.doi.org/10.33369/j_bengkoelenjust.v12i1.21325.

Full text
Abstract:
Bengkulu Regional Police Investigators carried out their efforts by conducting investigations to determine suspects from state financial losses arising from the disbursement of advances for the work of procuring soybean seeds at the Department of Agriculture of Bengkulu Province for Fiscal Year 2016. The investigation was done because the work on procurement of goods and services had not been completed, but state finances had already been loss, although the control and supervision activities were under the authority of PPK (the Commitment Making Officer), in this case, KPA (the Budget User Authority) still involved itself. This research was empirical juridical research with descriptive research type. Sources of data applied were primary and secondary data. Data processing was carried out using the editing method, then data analysis was using qualitative analysis methods, by means of inductive-deductive thinking or vice versa. The purpose of this study was to find out the efforts of Bengkulu Regional Police investigators in determining suspects and the juridical basis of investigators in determining the suspects of corruption in the procurement of soybean seeds at the Department of Agriculture of Bengkulu Province for Fiscal Year 2016. The results of this study indicated that: (1) The Efforts of Bengkulu Regional Police Investigators in determining the suspect of corruption in the procurement of soybean seeds by examining witnesses, which was a team of directors from the Department of Agriculture of Bengkulu Province and the implementing parties, as well as witnesses involved in carrying out the work, conducting inspections and confiscation of documents, and finally asking for information from experts. (2) The investigators' juridical basis in determining 3 (three) suspects; the Budget User Authority (KPA) who also served as the Head of the Department of Agriculture of Bengkulu Province, the Commitment Making Officer (PPK), and the Deputy Executive Director of corruption activities in the procurement of soybean seeds at the Department of Agriculture of Bengkulu Province for the 2016 Fiscal Year, was applying Article 3 of the Law of the Republic of Indonesia Number 31 of 1999 as amended by the Law of the Republic of Indonesia Number 20 of 2001 concerning the Eradication of Criminal Acts of Corruption.
APA, Harvard, Vancouver, ISO, and other styles
50

Chavleski, Aleksandar, and Goce Galev. "GATHERING E-EVIDENCE IN CROSS-BORDER CASES: RECENT DEVELOPMENTS IN EU LAW." Knowledge International Journal 32, no. 1 (July 26, 2019): 155–62. http://dx.doi.org/10.35120/kij3201155c.

Full text
Abstract:
With the fast development of the digital technology, the need for efficient gathering of digital evidence in criminal cases has risen exponentially. Often, the digital data is stored on servers located abroad, so national authorities cannot obtain them without seeking legal aid from their counterparts in foreign country/territory. This cooperation often doesn’t work seamlessly not only from legal, but from factual reasons as well. Here series of questions regarding national sovereignty, jurisdiction and international law are intertwined. In order to achieve sufficient speed in processing such requests, national authorities tried to bypass their counterparts in foreign countries and communicated directly with the service provider. These investigations are time-sensitive in order both to secure the evidence and its integrity. In order to adequately address these concerns, in June 2016 the Council of EU called the Commission to prepare an e-evidence package, which was eventually presented in April 2018. The aim of this article will be to give a critical overview of the proposed package mainly via its key component – the draft Regulation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography