Filters








551 Hits in 4.1 sec

The admissibility of electronic evidence in Tanzania: new rules and case law

Alex B. Makulilo
2016 Digital Evidence and Electronic Signature Law Review  
Applying the above guidelines, the court rejected the computer print-outs, as the plaintiff failed to provide the proof or certificates required in terms of the provisions of sections 78 and 79 of the  ...  Although section 18(2) of the ETA refers to the admissibility and evidential weight of a data message, it actually deals with the criteria for determining the evidential weight of a data message.  ...  Instead of confining matters to proof by oral testimony or affidavit, the court decided on the need for three certificates.  ... 
doi:10.14296/deeslr.v13i0.2302 fatcat:sq23znm6ingqldbcnhli7rsmai

Towards Privacy-Preserving Web Metering Via User-Centric Hardware

Fahad Alarfi, Maribel Fernández
2015 EAI Endorsed Transactions on Security and Safety  
Privacy is a major issue today as more and more users are connecting and participating in the Internet.  ...  This paper discusses privacy issues associated with web metering schemes and explores the dilemma of convincing interested parties of the merits of web metering results with sufficient detail, and still  ...  For step 7, the user produces evidential signatures using the new signature key and uses the Audit Agency certificate to confirm its validity. Security And Privacy.  ... 
doi:10.4108/eai.5-10-2015.150478 fatcat:6x5zjsn7abbrdcuf37zoh4dw2y

Electronic Record Authenticity in Evidence

2020 Journal of Law, Policy and Globalization  
that the legislator applied to the electronic record and to what extent the electronic record as a means of. proof is able to dispense with the traditional means of evidence.Until we come to a conclusion  ...  Therefore, a research will be conducted regarding the authenticity of each record separately, indicating the extent of the evidential power it has, in addition to the research for the adequacy of the provisions  ...  existence of this electronic record by all means of proof.1 4 .  ... 
doi:10.7176/jlpg/104-05 fatcat:76ijiwchybgujgounnav6gpipq

Safeguarding the evidential value of forensic cryptocurrency investigations

Michael Fröwis, Thilo Gottschalk, Bernhard Haslhofer, Christian Rückert, Paulina Pesch
2020 Forensic Science International: Digital Investigation  
We identify internationally accepted standards and rules for substantiating suspicions and providing evidence in court and project them onto current cryptocurrency forensics practices.  ...  Integrating the proposed framework in modern cryptocurrency analytics tools could allow more efficient and effective investigations, while safeguarding the evidential value of the analysis and the fundamental  ...  (e.g. signed transactions) and integrity proofs (proof of work, hash linked list).  ... 
doi:10.1016/j.fsidi.2019.200902 fatcat:7gxqivk5u5hjfeywucxwerwwnu

Safeguarding the Evidential Value of Forensic Cryptocurrency Investigations [article]

Michael Fröwis, Thilo Gottschalk, Bernhard Haslhofer, Christian Rückert, Paulina Pesch
2021 arXiv   pre-print
We identify internationally accepted standards and rules for substantiating suspicions and providing evidence in court and project them onto current cryptocurrency forensics practices.  ...  Integrating the proposed framework in modern cryptocurrency analytics tools could allow more efficient and effective investigations, while safeguarding the evidential value of the analysis and the fundamental  ...  (e.g. signed transactions) and integrity proofs (proof of work, hash linked list).  ... 
arXiv:1906.12221v3 fatcat:dsec3z6jerdrbev5u4xu5j7zya

Burdens and Standards of Proof in Possession of Unexplained Property Prosecutions

WY Wodage
2015 Mizan Law Review  
Cases such as Workineh Kenbato & Amelework Dalie demonstrate the confusion regarding who bears what burden, for which facts the burden would apply and the required standard of proof thereof.  ...  standards of proof.  ...  and ultimate burdens of proof, and it also deals with the tactical and evidential burdens of proof borne by accused.  ... 
doi:10.4314/mlr.v8i1.1 fatcat:rzar2y6amzdnvmip47wekn6bwu

Evidence-based trust

Yonghong Wang, Munindar P. Singh
2010 ACM Transactions on Autonomous and Adaptive Systems  
and (2) for a fixed level of conflict, certainty increases as the amount of evidence increases.  ...  An evidence-based account of trust is essential for an appropriate treatment of application-level interactions among autonomous and adaptive parties.  ...  We thank Dennis Bahler, Greg Byrd, Ting Yu, Chris Hazard, and Chung-Wei Hang for useful discussions and the anonymous reviewers for helpful comments.  ... 
doi:10.1145/1867713.1867715 fatcat:7opgosgi3ffivbwdl3725dyihy

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study

Yee-Yang Teing, Dehghantanha Ali, Kim Choo, Mohd T. Abdullah, Zaiton Muda
2017 IEEE Transactions on Sustainable Computing  
In this paper, we seek to determine the data remnants of forensic value from Syncany private cloud storage service, a popular storage engine for big data platforms.  ...  We demonstrate the types and the locations of the artefacts that can be forensically recovered.  ...  , and a proof of concept for a three-stage forensic data storage and visualization life cycle).  ... 
doi:10.1109/tsusc.2017.2687103 dblp:journals/tsusc/TeingDCMA19 fatcat:mlavg4aijjeytfsyu4ua32vnvy

Page 363 of The New Jersey Law Journal Vol. 67, Issue 43 [page]

1944 The New Jersey Law Journal  
cousins brother plainant was ra ant’s parents made a will lea INSANITY — COMPETENCY — The presumption of law is in favor of competency and the burden of proof is on him who denies it. under evidential  ...  On August 1941, complainant executed trust deed here in question, May 19, ate to def Bankruptcies Supreme and U. §. Distriet JUDGMENT SEARCHING AND ABSTRACTING ALL TRENTON SERVICES W.  ... 

In Search of Home Sweet Home: Between theory and reality

Nuraisyah Chua Abdullah, Ramzyzan Ramly, Muhammad Izwan Ikhsan
2017 Environment-Behaviour Proceedings Journal (E-BPJ)  
This paper suggests that a pre-purchase checklist should be provided in a sale and purchase transaction.  ...  vendor disclosure laws in the United States and Australia.  ...  Regarding the official search, the applicant can do more than in the private search. Here, the applicant will be issued a certificate of search.  ... 
doi:10.21834/e-bpj.v2i6.964 fatcat:wdce6tbu7fcqlorehipawj5exu

Regulation for E-payment Systems: Analytical Approaches Beyond Private Ordering

Adekemi Omotubora, Subhajit Basu
2018 Journal of African Law  
It uses Nigeria to exemplify a developing country that is increasingly pushing for the adoption of a regulatory framework for e-payment systems based on private ordering.  ...  The article proposes that law be used as a mechanism to set and compel compliance with technical and industry standards, thus building trust, catering to public interest concerns and legitimizing the regulatory  ...  However, regarding the nature of e-signatures or the evidential weight or standard and burden of proof, the provisions of the law are quite vague.  ... 
doi:10.1017/s0021855318000104 fatcat:gkhstfx6s5ektddgudpf576wei

A fully distributed reputation system for m-commerce via ad hoc wireless networking

Husna Osman, Munaisyah Abdullah, Nur Zaimah Ahamad
2017 International Journal of Advanced and Applied Sciences  
Trust development among traders in an ad hoc m-commerce trading system is vital to mitigate uncertainty and risks involved in transactions.  ...  However, the potential for ill-intentioned traders to subvert the reputation system makes the task challenging.  ...  as a proof that the transaction is real and has occurred between them.  ... 
doi:10.21833/ijaas.2017.03.006 fatcat:om4r7rn4rngj5ms2vofpg63hvi

Responding to transnational corporate bribery using international frameworks for enforcement: Anti-bribery and corruption in the UK and Germany

Nicholas J Lord
2013 Criminology & Criminal Justice  
However, enforcement remains at the local, national level where investigators and prosecutors are pressured to respond using frameworks for enforcement created by intergovernmental organisations.  ...  His research interests include bribery and corruption, corporate and white--collar crime, financial crime, comparative criminology and regulation theory.  ...  Acknowledgements This research was funded by the Economic and Social Research Council (ESRC)  ... 
doi:10.1177/1748895812474662 fatcat:uzl2rrroebdl5ggitn3nyvhgem

Recommendations for the probity of computer evidence

Paul Marshall, James Christie, Peter Bernard Ladkin, Bev Littlewood, Stephen Mason, Martin Newby, Jonathan Rogers, Harold Thimbleby, Martyn Thomas CBE
2020 Digital Evidence and Electronic Signature Law Review  
The central problem is the evidential presumption that computers are reliable. This presumption is not warranted.  ...  There exists widespread misunderstanding about the nature of computers and how and why they are liable to fail.  ...  Once the presumption is displaced, then the evidential burden (onus of proof) moves to the person seeking to rely upon evidence derived from a computer.  ... 
doi:10.14296/deeslr.v18i0.5240 fatcat:3yxqep7alvezpj3e6o7u4mgahi

Digital Signatures Workflows in Alfresco [chapter]

Patrícia R. Sousa, Pedro Faria, Manuel E. Correia, João S. Resende, Luís Antunes
2016 Lecture Notes in Computer Science  
Digital signatures can have the same legal evidential validity as handwritten signatures, provided they are based on certificates issued by accredited certification authorities and the associated private  ...  keys are stored on tamper proof token security devices like smart cards.  ...  According to Portuguese law [19], electronic signatures have the same evidential validity as handwritten signatures, provided they are based on certificates issued by accredited certification entities.  ... 
doi:10.1007/978-3-319-44159-7_22 fatcat:gwiqvkmamrcszgffphehc5hmge
« Previous Showing results 1 — 15 out of 551 results