Vis enkel innførsel

dc.contributor.authorLiao, Yi-Ching
dc.contributor.authorLangweg, Hanno
dc.date.accessioned2020-06-09T11:40:05Z
dc.date.available2020-06-09T11:40:05Z
dc.date.created2016-09-30T09:47:18Z
dc.date.issued2016
dc.identifier.citationThe Journal of Digital Forensics, Security and Law. 2016, 11 (1), 37-52.en_US
dc.identifier.issn1558-7215
dc.identifier.urihttps://hdl.handle.net/11250/2657357
dc.description.abstractTo learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for studying the scale of sentence severity for cross-jurisdictional comparisons. Examining the intent element can facilitate future risk assessment. Analysing the fact element can enhance an organization's capability of analysing criminal activities for future offender profiling. Examining the evidence used against a defendant from previous judgements can facilitate the preparation of evidence for upcoming legal disclosure. Follow the concepts of argumentation diagrams, we develop an automatic judgement summarizing system to enhance the accessibility of judgements and avoid repeating past mistakes. Inspired by the feasibility of extracting legal knowledge for argument construction and employing grounds of inadmissibility for probability assessment, we conduct evidential reasoning of kernel traces for forensic readiness. We integrate the narrative methods from attack graphs/languages for preventing confirmation bias, the argumentative methods from argumentation diagrams for constructing legal arguments, and the probabilistic methods from Bayesian networks for comparing hypotheses.en_US
dc.language.isoengen_US
dc.publisherAssociation of Digital Forensics, Security and Lawen_US
dc.relation.urihttp://ojs.jdfsl.org/index.php/jdfsl/article/view/372/265
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleEvidential Reasoning for Forensic Readinessen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber37-52en_US
dc.source.volume11en_US
dc.source.journalThe Journal of Digital Forensics, Security and Lawen_US
dc.source.issue1en_US
dc.identifier.doi10.15394/jdfsl.2016.1372
dc.identifier.cristin1387962
dc.description.localcodeThis Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of Scholarly Commons. For more information, please contact commons@erau.edu. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International Licenseen_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal