FORENSIC TECHNIQUE FOR IDENTIFYING CORRUPTION CHALLENGES TO NATIONAL SECURITY THROUGH DIGITAL TECHNOLOGIES DOI Creative Commons

Oleksii Makarenkov,

Victoria Kosa

Baltic Journal of Economic Studies, Journal Year: 2024, Volume and Issue: 10(4), P. 288 - 300

Published: Dec. 17, 2024

The article's subject is the application of forensic techniques for identification corruption challenges to national security through utilisation digital technologies. research methodology employed a range methods, including general philosophical, statistical, axiomatic, comparative, systemic, formal-dogmatic, hermeneutic, axiological, and other approaches. purpose this article present technique identifying use It has been demonstrated that teleological focus investigation, namely acquisition proper evidence, explicitly delineated within in anti-corruption investigations. This encompasses documentation testimonies from whistleblowers witnesses, statements suspects accused expose their accomplices, facts bribery transactions, agreements on bribes, absence lawful sources enrichment, methods laundering illicit funds, locations where such funds corrupt resources are stored. imperative all wherever feasible, substantiates criminal intent pertaining corruption. investigative techniques, accounting, auditing, covert pre-trial measures, crowdsourcing platforms, whistleblowing, news reporting dissemination blockchain technology monitoring financial cloud-based infrastructure, technical-scientific expertise enhanced by sophisticated computer equipment, electronic networks communication tools. These with objective risks security. was emphasised complexity path lies multitude individuals involved operations these products used operations, duration corruption, large volume and/or cryptocurrency, corporate assets, foreign jurisdictions, offshore tax havens, similar means. Blockchain can be develop system compliance income expenses public officials, controlling transactions field tracking money actions, funding activities transparency procedures. mechanism comprises programs creation databases exchange information aforementioned areas risk, view safeguarding interest. relevant terminology indicators material assets potential subjects constitute input data blockchain. posited confiscation linked related activities, along resources, should conducted series simultaneous searches at premises whom individual associated, whether personal, professional, or business relationships. prompt implementation algorithms essential return funds. possibilities eradicating which exacerbated cryptocurrencies virtual cyberspace, outlined legal measures against backdrop growing investments artificial intelligence. tools combating fraud based experience highly developed countries.

Language: Английский

Secure and Efficient Outsourced Computation in Cloud Computing Environments DOI

Varun Dixit,

Davinderjit Kaur

Journal of Software Engineering and Applications, Journal Year: 2024, Volume and Issue: 17(09), P. 750 - 762

Published: Jan. 1, 2024

Language: Английский

Citations

20

LEADING SAAS INNOVATION WITHIN U.S. REGULATORY BOUNDARIES: THE ROLE OF TPMS IN NAVIGATING COMPLIANCE DOI Creative Commons

Excel G Chukwurah

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 1372 - 1385

Published: April 17, 2024

The Software-as-a-Service (SaaS) industry in the United States operates within a complex regulatory landscape, including data protection laws, intellectual property regulations, and industry-specific compliance requirements. This review explores role of Technology Policy Managers (TPMs) guiding SaaS companies to innovate while staying compliant with these regulations. are constantly innovating meet evolving needs their customers stay ahead competitive market. However, this innovation often intersects boundaries that can impact product development deployment. TPMs play crucial navigating by understanding interpreting relevant ensuring products comply legal One key challenges for is compliance, regulations such as California Consumer Privacy Act (CCPA) General Data Protection Regulation (GDPR). help implement privacy-by-design principles, embedded into from outset. proactive approach not only helps but also enhances user trust satisfaction. managing (IP) risks innovation. They understand protect IP rights, innovations infringing on existing patents or copyrights. work closely teams assess mitigate risks, allowing confidently respecting rights others. In addition issues, navigate standards. For example, healthcare industry, must Health Insurance Portability Accountability (HIPAA), which sets standards patient health information. ensure standards, enabling enter succeed regulated markets. conclusion, vital leading U.S. boundaries. By responsibly, driving growth success dynamic industry. Keywords: TPMs, Navigating Compliance, Regulatory Boundaries, Leading SaaS, Innovation.

Language: Английский

Citations

11

Demystifying the Network and Cloud Forensics’ Legal, Ethical, and Practical Considerations DOI Open Access

Naeem Allahrakha

Deleted Journal, Journal Year: 2024, Volume and Issue: 16.2, P. 119 - 132

Published: April 8, 2024

As cybercrimes grow more sophisticated, network and cloud forensics have become vital investigative tools. However, complex legal, ethical, practical challenges around extraterritorial evidence, privacy rights, volatile data, specialized skills constrain these processes. This study critically reviews academic literature industry reports to examine multifaceted considerations holistically. It aims aggregate the latest insights regulations, technical protocols, certification regimes, international cooperation frameworks shaping forensics. The follows qualitative research methodology, a doctrinal approach used for analysis of regulation, grounded theory related literature. results reveal gaps liability limitations internet service providers, ethical bounds ancillary data collection, anti-forensic obfuscation techniques. Proposed solutions include accountability in technology design through transparency oversight. Simplify procedures cross-border legal assistance requests. Develop lightweight encryption methods that still enable lawful access as well promote collaboration between academia advance cybersecurity

Language: Английский

Citations

8

Systematic review of deep learning solutions for malware detection and forensic analysis in IoT DOI Creative Commons
Sirajuddin Qureshi, Jingsha He, Saima Tunio

et al.

Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(8), P. 102164 - 102164

Published: Aug. 27, 2024

Language: Английский

Citations

6

The Implementation Strategy of Cost Control and the Construction of a Guarantee Model of Financial BPO in the Cloud Computing Environment DOI Open Access

Weigang Zhong,

Lihong Zhao,

Qiaomei Dou

et al.

International Journal of Information System Modeling and Design, Journal Year: 2025, Volume and Issue: 16(1), P. 1 - 21

Published: Jan. 10, 2025

Cloud computing platform is a main direction of computer information technology development at present. In this paper, financial SMOTE algorithm, business process outsourcing, hardware, software, data and other resources such as integrated network storage infrastructure, resources, management platform, servers various service applications are adopted. According to the functions modes provided by commercial cloud computing, system architecture based on constructed. The proposed method can control cost 60%,Improve level efficiency enterprises in an all-round way, provide important decisions for enterprises' market operation, avoid operation risks time, more opportunities development.

Language: Английский

Citations

0

Future Trends in AI Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 229 - 262

Published: Feb. 14, 2025

Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.

Language: Английский

Citations

0

A Survey of Data Mining Techniques for Digital Forensic Analysis DOI Open Access
Emad E. Abdallah, Esraa Abu Elsoud, Alaa E. Abdallah

et al.

Procedia Computer Science, Journal Year: 2025, Volume and Issue: 257, P. 731 - 736

Published: Jan. 1, 2025

Language: Английский

Citations

0

Open-Source Forensics Tools for Recovery of Deleted Data in Unconventional Ways DOI
Qais Al-Na’amneh, Ayoub Alsarhan, Qais Al-Na’amneh

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 41 - 60

Published: Jan. 17, 2025

Nowadays, technology is propagation rapidly that it virtually completely replacing the real world with a “virtual world.” Electronic forensics important as medical to investigate electronic crime” which increases time”, prevent unwanted file recovery, many computer users choose overwrite files instead of deleting them collect evidence and analysis by several methods tools present in front law. This paper studies collection an emphasis on deleted from different resources evaluates performance open-source programs for recovering data using unconventional ways. It discusses some tools, including FTK, Encase, ability extract file, showing general comparison between tools.

Language: Английский

Citations

0

Generative AI for Threat Intelligence and Information Sharing DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

et al.

Advances in digital crime, forensics, and cyber terrorism book series, Journal Year: 2024, Volume and Issue: unknown, P. 191 - 234

Published: Sept. 12, 2024

Collaboration in providing threat intelligence and disseminating information enables cyber security professionals to embrace digital most successfully, whose risks are ever-changing. This article dwells on the capacity of machine change by categorising indicators compromise (IOC) actors, then highlights limits traditional methods. Among Artificial tools such as generative adversarial networks (GANs) Variational autoencoders (VAEs), which key innovators, one can create synthetic or fake data that emulates real attack scenarios past. allows cyber-related be analysed differently from before. In addition, this feature secure stakeholder collaborations. It is also meant mainly for factual protects private but exchange helpful information. clear fact showcasing real-world examples demonstrates Al's automation through cybersecurity detection.

Language: Английский

Citations

3

Forensic Science: AI-Powered Image and Audio Analysis DOI

P. Renukadevi,

Sincy John,

N Shivani

et al.

Published: Sept. 18, 2024

Language: Английский

Citations

3