A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Narayankar, Prashant
- Innovative Techniques of Digital Crime Investigation
Authors
1 Department of Information Science and Engineering, B.V.B College of Engineering and Technology, Vidyanagar, Hubbali, IN
Source
Journal of Engineering Education Transformations, Vol 30, No Sp Iss Dec (2016), Pagination:Abstract
Computer forensics is a new and fast growing form of investigative technique in which forensic specialist use modern forensic software tools, to solve digital crime cases. Choosing appropriate forensic tool for solving real-time digital crime cases is most expected graduate attribute, for those who have opted "Computer forensic" as an elective course. In this paper we present pedagogy for developing skill of choosing most appropriate software tool for analyzing and investigating digital crime cases. Assignment activities are designed to develop competencies such as i) Ability to identify, select and apply forensic tool to solve image, audio and video doctored cases. ii) Ability to evaluate the suitability and limitations of the tool used to solve problem.
To solve image forensic cases, a tool having feature of error level analysis and meta data analysis is found to be more appropriate, while for solving audio doctored cases, tool having feature of frequency response analysis as well as difference calculator is found to be most appropriate. In case of video doctored crimes, tools having feature of noise analysis, level sweep, clone detection, and magnification is found to be most appropriate. Assessment of outcome is carried out by recording attainment of Graduate Attribute (GA), Competency (CA) and Performance Indicators (PI). Skill of identifying, choosing and applying appropriate forensic tool to solve digital crime cases is observed among student.
Keywords
Cybercrime, Digital Evidence.References
- Bill Nelson “Guide to Computer Forensics and Investigations”, 4th Edition, CENGAGE Publication. 2009
- Er Harpreet Singh Dalla ,Ms. Geeta , Cyber Crime – “A Threat to Persons, Property, Government”, ,IJARCSSE , 2013
- Cybercrime. Retrieved from https://en.wikipedia.org/wiki/(10 June 2016)
- Guiffy Image Diff Tool. Retrieved from http://www.guiffy.com/Image-Diff-Tool.html (14 May 2016)
- S. Rashidi , A. Fallah, , F. Towhidkhah, Scientia Iranica, “Feature extraction based DCT on dynamic signature verification” , Volume 19, Issue 6, Pages 1810 - 1819, December 2012
- Praat Tool. Retrieved from http://www.fon.hum.uva.nl/praat/ (20 May 2016)
- Truecaller App Retrieved from https://www.truecaller.com/ (25 May 2016)
- Mobiledit is retrieved from http://www.mobiledit.com/ (26 May 2016)
- Audio Diffmaker Working. Retrieved from http://www.libinst.com/Audio%20DiffMaker.htm (14 May 2016)
- Assessment of 'Modern Tool Usage' Attribute–Computer Forensics, A Case Study
Authors
1 Department of Information Science and Engineering, B.V.B College of Engineering and Technology, Vidyanagar, Hubbali, IN
Source
Journal of Engineering Education Transformations, Vol 30, No 3 (2017), Pagination: 39-46Abstract
Computer forensics is a new and fast growing form of investigative technique in which forensic specialists use modern forensic software tools, to solve digital crime cases. Choosing appropriate forensic tool for solving real-time digital crime cases is the most expected graduate attribute, for those who have opted "Computer forensic" as an elective course. In this paper we present pedagogy for developing the skill of choosing most appropriate software tool for analyzing and investigating digital crime cases. Assignment activities are designed to develop competencies such as i) Ability to identify, select and apply forensic tool to solve image, audio and video doctored cases. ii) Ability to evaluate the suitability and limitations of the tool used to solve problem.
To solve image forensic cases, a tool having the feature of error level analysis and meta data analysis is found to be more appropriate, while for solving audio doctored cases, tool having feature of frequency response analysis as well as difference calculator is found to be more appropriate. In case of video doctored crimes, tools having feature of noise analysis, level sweep, clone detection, and magnification is found to be the most appropriate. Assessment of outcome is carried out by recording attainment of Graduate Attribute (GA), Competency (CA) and Performance Indicators (PI). The skill of identifying, choosing and applying appropriate forensic tool to solve digital crime cases is enhanced among student.
Keywords
Cybercrime, Digital Evidence.References
- Bill Nelson "Guide to Computer Forensics and Investigations", 4th Edition, CENGAGE Publication. 2009
- Er Harpreet Singh Dalla ,Ms. Geeta , Cyber Crime - "A Threat to Persons, Property, Government", IJARCSSE, 2013
- Cybercrime. Retreved from https:/en.wikipedia.org/wiki/(10 June 2016)
- Guiffy Image Diff Tool. Retrieved from http://www.guiffy.com/Image-Diff-Tool.html (14 May 2016)
- S. Rashidi, A. Fallah, F. Towhidkhah, Scientia Iranica, "Feature extraction based DCT on dynamic signature verification", Volume 19, Issue 6, Pages 1810 - 1819,December 2012
- Praat Tool. Retrieved from http://www.fon.hum.uva.nl/praat/ (20 May 2016)
- Truecaller App Retrieved from https://www.truecaller.com/ (25 May 2016)
- Mobiledit is retrieved from http://www.mobiledit.com/ (26 May 2016)
- Audio Diffmaker Working. Retrieved from http://www.libinst.com/Audio%20DiffMaker.htm (14 May 2016)
- Course Project in Mobile Computing – An Experiential Learning
Authors
1 Department of IS & E, BVB College of Engineering & Technology, Hubli, Karnataka, IN
2 School of Computer Science, KLE Tech University, Hubli, Karnataka, IN
Source
Journal of Engineering Education Transformations, Vol 32, No 1 (2018), Pagination: 75-78Abstract
As a predominant technology among our student bodies (with smart phones and tablets), along with the growing market for Android or iPhone developers, students are yearning for understanding the computations that happen at the back-end. In this paper, a case study of a project in “Mobile computing” course is presented. Students were encouraged to develop new applications to retrieve the back end data such as SIM information, Nearest Tower Information and Protocol stack employed during Internet browsing. The main objective the course project is to strengthen the theoretical concepts in the class by experimenting with real-time mobile system. Assessment of student's “understanding level” prior to and after the course project is recorded. Analysis of the assessment data showed that the students developed a good level of understanding of the underlying wireless and mobile communication networks and their technical features, and were able to map the theoretical concepts learnt in class with practical applications. The project objectives of improving programming skills and developing mobile apps are found to complement the course outcomes.Keywords
Mobile Computing, Experiential Learning, Course Project.References
- Rajkamal, Mobile Computing, 2nd Edition, Oxford University Press, 2013
- Kevin J.Connolly (2003). Lawof Internet Security and Privacy . Aspen Publishers. pp. 131. ISBN 978-0-7355- 4273-0.
- ProtocolAnalyzers at theOpenDirectory Project
- AsokeTalukder, Roopa R Yavaga, Mobile Computing -Technology, Applications and Service Creation, 2nd Edition, TataMcGraw Hill, 2010
- https://amizone.net/AdminAmizone/WebForms/Academics/NewSyllabus/1518201512484878.pdf
- http://www1.rmit.edu.au/courses/047867
- https://onlinecourses.nptel.ac.in/noc16_cs13/preview