Keywords
forensics
pyramid model
digital data
pyramid model
digital data
How to Cite
Electronic data as a cornerstone of the 7-5-1 forensic pyramid model. (2019). Academic Journal of Internal Affairs, 67(2), 45-55. https://doi.org/10.38146/BSZ.2019.2.3
Abstract
The authors provide an overview of the role of digital data in the “7-5-1” forensic identification pyramid model.
Downloads
Download data is not yet available.
Similar Articles
- Gyöngyike Juhász, The forensic data collection, the future and the research opportunities of the electronic Modus Operandi Registration , Academic Journal of Internal Affairs: Vol. 70 No. 1 (2022)
- Ákos Erdélyi, Forensic Psychology: How Can Psychology Help Law Enforcement? , Academic Journal of Internal Affairs: Vol. 70 No. 5 (2022)
- Csaba Fenyvesi, Every police organization is only as good as its data , Academic Journal of Internal Affairs: Vol. 70 No. 11 (2022)
- Gábor Kovács, The debts of forensic science on the threshold of a paradigm shift , Academic Journal of Internal Affairs: Vol. 70 No. 11 (2022)
- Dávid Papp, Róbert Major, The History of the Neighbourhood Police Officer’s Traffic Policing Tasks , Academic Journal of Internal Affairs: Vol. 70 No. 12 (2022)
- Tamás Vörös, Krisztina Takács, Attila Szabó, Attila Krizsán, Applications of annealing in forensic glass examinations , Academic Journal of Internal Affairs: Vol. 71 No. 1 (2023)
- Klára Siposné Kecskeméthy, László Teknős, North Atlantic Treaty Organisation’s climate change risk management responsibilities , Academic Journal of Internal Affairs: Vol. 71 No. 1.ksz. (2023): Special Issue
- Csaba Fenyvesi, Bow in the plumtree’s shadow Criminalistical lessons of the last death sentenced man in Baranya county , Academic Journal of Internal Affairs: Vol. 71 No. 4 (2023)
- Bence Lakatos , Gyula Vass , László Teknős, Application possibilities for systems supporting the tasks of disaster management authorities , Academic Journal of Internal Affairs: Vol. 71 No. 4 (2023)
- Petronella Deres , Characteristics of Illicit Access to Data and Crimes against Information Systems in Hungary between 2013 and 2021 , Academic Journal of Internal Affairs: Vol. 71 No. 10 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Csaba Fenyvesi, The second version of the criminalist pyramid-model , Academic Journal of Internal Affairs: Vol. 62 No. 9 (2014)
- Csaba Fenyvesi, Justizmord and investigative errors , Academic Journal of Internal Affairs: Vol. 62 No. 3 (2014)
- Csaba Fenyvesi, Crime Prevention Function of Criminalistics , Academic Journal of Internal Affairs: Vol. 69 No. 10 (2021)
- Csaba Fenyvesi, Jack the Ripper and modern forensic methods , Academic Journal of Internal Affairs: Vol. 65 No. 7-8 (2017)
- Csaba Fenyvesi, Presentation for recognition and faith , Academic Journal of Internal Affairs: Vol. 66 No. 4 (2018)
- Csaba Fenyvesi, Global trends in forensic science in the 21st century , Academic Journal of Internal Affairs: Vol. 61 No. 10 (2013)
- Csaba Fenyvesi, Every police organization is only as good as its data , Academic Journal of Internal Affairs: Vol. 70 No. 11 (2022)
- Csaba Fenyvesi, Concepts and academic approaches in criminal investigation in continental and common law , Academic Journal of Internal Affairs: Vol. 63 No. 2 (2015)
- Csaba Fenyvesi, The role of line-up and digital data in a specific indidency case , Academic Journal of Internal Affairs: Vol. 64 No. 9 (2016)
- József Orbán, Introduction to the application of likelihood in forensic science , Academic Journal of Internal Affairs: Vol. 65 No. 2 (2017)