This book covers the developing field of open source research and discusses how to use social media, satellite imagery, big data analytics, and user-generated content to strengthen human rights research and investigations. The topics are presented in an accessible format through extensive use of images and data visualization.
The COVID-19 pandemic accelerated the digital revolution faster than anyone expected. In a few weeks, faith communities around the world were thrust into developing fully digital ministries--some doing it well, and others struggling along the way. However, this moment of crisis opened the opportunity for all faith communities to reach unprecedented numbers of people and truly become ministries without walls. Yet many churches have failed to fully incorporate a digital vision into their long-term plan for ministry and have largely reverted to "in-person" programs and services because of a lack of direction on how to build high quality and sustainable digital ministries. Building Your Digital Sanctuary is an introductory guide for pastors and communications teams on how to lay the foundation of an impactful and sustainable digital sanctuary alongside your "in-person" ministries. Drawing on the wisdom of some of digital ministry experts, this practical guide will provide the inspiration and insight churches need to minister in the emerging digital age.
The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidential data which may be recoverable from a range of devices, considering issues relating to reliability and usefulness of those data. Includes worked case examples, test questions and review quizzes to enhance student understanding Solutions provided in an accompanying website Includes numerous case studies throughout to highlight how digital evidence is handled at the crime scene and what can happen when procedures are carried out incorrectly Considers digital evidence in a broader context alongside other scientific evidence Discusses the role of digital devices in criminal activities and provides methods for the evaluation and prioritizing of evidence sources Includes discussion of the issues surrounding modern digital evidence examinations, for example; volume of material and its complexity Clear overview of all types of digital evidence Digital Forensics: Digital Evidence in Criminal Investigations is an invaluable text for undergraduate students taking either general forensic science courses where digital forensics may be a module or a dedicated computer/digital forensics degree course. The book is also a useful overview of the subject for postgraduate students and forensic practitioners.
This book explores the diverse range of practical and theoretical challenges and possibilities that digital technologies and platforms pose for Holocaust memory, education and research. From social media to virtual reality, 360-degree imaging to machine learning, there can be no doubt that digital media penetrate practice in these fields. As the Holocaust moves beyond living memory towards solely mediated memory, it is imperative that we pay critical attention to the way digital technologies are shaping public memory and education and research. Bringing together the voices of heritage and educational professionals, and academics from the arts and humanities and the social sciences, this interdisciplinary collection explores the practicalities of creating digital Holocaust projects, the educational value of such initiatives, and considers the extent to which digital technologies change the way we remember, learn about and research the Holocaust, thinking through issues such as ethics, embodiment, agency, community, and immersion. At its core, this volume interrogates the extent to which digital interventions in these fields mark an epochal shift in Holocaust memory, education and research, or whether they continue to be shaped by long-standing debates and guidelines developed in the broadcast era.
The international dispute settlement system is currently facing many challenges regarding the authority, effectiveness, and legitimacy of its methods and mechanisms and their coordination. These challenges cut across different fields of international law and relations such as investment, trade, human rights, water resources, the law of the sea, the environment, international peace and security, disaster law, space, and cyberspace. New technologies also impact on the scope of existing disputes and their settlement, which lead to the emergence of new disputes and ways of settling them. This book offers insightful reflections by academics and practitioners on such challenges and how they can be addressed as well as on how the international dispute settlement system should adapt to attain its aim of maintaining peace and international legality. It deals with many contemporary issues and is wide-ranging in scope. It is suitable for students, scholars, and practitioners of international dispute settlement, international law, and international relations.
This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives.
With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity. This new volume investigates the advances in artificial intelligence and soft computing techniques in cybersecurity. It specifically looks at cybersecurity during the COVID-19 pandemic, the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, and cybersecurity for cyber-physical systems. A diverse array of technologies and techniques are explored for cybersecurity applications, such as the Internet of Things, edge computing, cloud computing, artificial intelligence, soft computing, machine learning, cross-site scripting in web-based services, neural gas (GNG) clustering technique, and more.
Building on a rich journalistic tradition of critical source analysis, this book considers the impact of the move from analogue to digital sources on information quality and presents methods and tools to verify information found online and help counter the spread of misinformation. Evaluating Digital Sources in Journalism critically maps the prevalence of online manipulation, particularly images and videos from social media platforms, and considers the tools needed both to carry out and to counter this. Strategies are proposed to help readers evaluate content, context and sources, and ultimately build a foundation for carrying out their own online open-source investigations. The author brings together theories and best practices from a broad range of literature, including modern Scandinavian research on the concept of “source criticism”, journalism and technology studies, advanced forensic verification research, and literature designed for practitioners, including blogs and industry publications. Evaluating Digital Sources in Journalism is recommended reading for advanced journalism students and journalism practitioners.
Strategy, Leadership and AI in the Cyber Ecosystem investigates the restructuring of the way cybersecurity and business leaders engage with the emerging digital revolution towards the development of strategic management, with the aid of AI, and in the context of growing cyber-physical interactions (human/machine co-working relationships). The book explores all aspects of strategic leadership within a digital context. It investigates the interactions from both the firm/organization strategy perspective, including cross-functional actors/stakeholders who are operating within the organization and the various characteristics of operating in a cyber-secure ecosystem. As consumption and reliance by business on the use of vast amounts of data in operations increase, demand for more data governance to minimize the issues of bias, trust, privacy and security may be necessary. The role of management is changing dramatically, with the challenges of Industry 4.0 and the digital revolution. With this intelligence explosion, the influence of artificial intelligence technology and the key themes of machine learning, big data, and digital twin are evolving and creating the need for cyber-physical management professionals. - Discusses the foundations of digital societies in information governance and decision-making - Explores the role of digital business strategies to deal with big data management, governance and digital footprints - Considers advances and challenges in ethical management with data privacy and transparency - Investigates the cyber-physical project management professional [Digital Twin] and the role of Holographic technology in corporate decision-making
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum–Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.