Keywords
digital evidence
forensics
specialist
forensics
specialist
How to Cite
Investigating attacks on IT-systems: the role of digital evidence. (2018). Academic Journal of Internal Affairs, 66(7-8), 36-54. https://doi.org/10.38146/BSZ.2018.7-8.3
Abstract
The author provides a comparative overview of the role of computer forensic specialists in criminal proceedings.
Downloads
Download data is not yet available.
Similar Articles
- Gergely Gárdonyi, Zoltán Hautzinger, The possible areas for improvement in researches in criminalistics , Academic Journal of Internal Affairs: Vol. 69 No. 10 (2021)
- Gyöngyike Juhász, The forensic data collection, the future and the research opportunities of the electronic Modus Operandi Registration , Academic Journal of Internal Affairs: Vol. 70 No. 1 (2022)
- Ákos Erdélyi, Forensic Psychology: How Can Psychology Help Law Enforcement? , Academic Journal of Internal Affairs: Vol. 70 No. 5 (2022)
- Gábor Kovács, The debts of forensic science on the threshold of a paradigm shift , Academic Journal of Internal Affairs: Vol. 70 No. 11 (2022)
- Tamás Vörös, Krisztina Takács, Attila Szabó, Attila Krizsán, Applications of annealing in forensic glass examinations , Academic Journal of Internal Affairs: Vol. 71 No. 1 (2023)
- Csaba Fenyvesi, Bow in the plumtree’s shadow Criminalistical lessons of the last death sentenced man in Baranya county , Academic Journal of Internal Affairs: Vol. 71 No. 4 (2023)
- Kristóf Péter Bakai, Zsolt Dézsi, Andrea Szabó, Joint training of customs officials in the European Union , Academic Journal of Internal Affairs: Vol. 72 No. 1 (2024)
- Mike Redmayne , Paul Roberts , Colin Aitken , Graham Jackson, Forensic Science Evidence , Academic Journal of Internal Affairs: Vol. 62 No. 9 (2014)
- Csaba Fenyvesi, Justizmord and investigative errors , Academic Journal of Internal Affairs: Vol. 62 No. 3 (2014)
- Miklós Angyal, Systematic crime scene investigation-triggered lessons for problem oriented policing: the case study of shootings in a Hungarian university , Academic Journal of Internal Affairs: Vol. 61 No. 10 (2013)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Dániel Eszteri, István Zsolt Máté, Identity theft in the virtual world , Academic Journal of Internal Affairs: Vol. 65 No. 3 (2017)