Forensic Science Informatics P3 M3 D3

S
Steve BishopLecturer at Further education
Forensic Science Informatics Unit 37
Forensic Science Informatics ,[object Object]
Task 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer crimes
Task 2 ,[object Object],[object Object]
Task 2 ,[object Object],[object Object]
Task 2 ,[object Object],[object Object]
Task 2 ,[object Object],[object Object]
Explain ,[object Object],[object Object],[object Object]
Internet ,[object Object],[object Object]
“ Policed” ,[object Object],[object Object]
Key questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],is policing the Internet? do we police the Internet? do we police the Internet? do we police the Internet? do we police the Internet? polices the Internet?
Key questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key questions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key questions ,[object Object],[object Object],[object Object],[object Object]
Key questions ,[object Object],[object Object],[object Object],[object Object]
Task 3 ,[object Object]
Task 3 ,[object Object]
Evaluate ,[object Object],[object Object],[object Object],[object Object],[object Object]
Personal policing ,[object Object],[object Object],[object Object]
Social networking sites & messaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal policing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Main problems: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How many people have been prosecuted under the different laws? How much does it cost to police and prosecute under the different laws? What problems do the organisations face? How do the organisations link up? Some key issues to be researched:
1 of 24

Recommended

Toastmasters - Securing Your Smartphone by
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
227 views7 slides
Prevent Strikes On Industrial And Civil Items Using Access Control by
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Controlmorticelocksnational21
80 views2 slides
Currentissuenotes by
CurrentissuenotesCurrentissuenotes
Currentissuenotesherri2mj
129 views2 slides
Infographic analytics infographic_illustrations_120617 by
Infographic analytics infographic_illustrations_120617Infographic analytics infographic_illustrations_120617
Infographic analytics infographic_illustrations_120617Richard Smiraldi
22 views1 slide
Cybercrime by
CybercrimeCybercrime
CybercrimeAdikavi Nannaya University
370 views19 slides
Understanding The Work of Investigators by
Understanding The Work of InvestigatorsUnderstanding The Work of Investigators
Understanding The Work of Investigatorsaltairlahad
52 views2 slides

More Related Content

Similar to Forensic Science Informatics P3 M3 D3

An Introduction To IT Security And Privacy for Librarians and Libraries by
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
454 views56 slides
03.fnc corporate protect workshop new by
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
265 views21 slides
FNC Corporate Protect by
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protectforensicsnation
353 views21 slides
FNC Corporate Protect Workshop by
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
430 views21 slides
Project_Paper_ISSC455_Intindolo by
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
371 views13 slides
Research Paper On Cross Drive Analysis by
Research Paper On Cross Drive AnalysisResearch Paper On Cross Drive Analysis
Research Paper On Cross Drive AnalysisValerie Mejia
15 views44 slides

Similar to Forensic Science Informatics P3 M3 D3(20)

An Introduction To IT Security And Privacy for Librarians and Libraries by Blake Carver
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver454 views
03.fnc corporate protect workshop new by forensicsnation
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation265 views
Project_Paper_ISSC455_Intindolo by John Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
John Intindolo371 views
Research Paper On Cross Drive Analysis by Valerie Mejia
Research Paper On Cross Drive AnalysisResearch Paper On Cross Drive Analysis
Research Paper On Cross Drive Analysis
Valerie Mejia15 views
Protect Yourself From Internet Pests by peterhitch
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch639 views
Computer Forensic Specialist Essay by Ariana Davis
Computer Forensic Specialist EssayComputer Forensic Specialist Essay
Computer Forensic Specialist Essay
Ariana Davis3 views
It security &_ethical_hacking by satish kumar
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar1.1K views
Opsec for security researchers by vicenteDiaz_KL
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL1.7K views
E safety-course_2010 by kevinbrace
E safety-course_2010E safety-course_2010
E safety-course_2010
kevinbrace615 views

More from Steve Bishop

Cognitive load theory by
Cognitive load theoryCognitive load theory
Cognitive load theorySteve Bishop
2.8K views38 slides
Blockbusters #soccd by
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccdSteve Bishop
1.6K views1 slide
Blockbusters template by
Blockbusters templateBlockbusters template
Blockbusters templateSteve Bishop
487 views1 slide
Blockbusters #socfam by
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfamSteve Bishop
252 views1 slide
2.6 acids bases and salts by
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and saltsSteve Bishop
3.3K views45 slides
C2.5 exothermic and endothermic reactions by
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsSteve Bishop
9K views21 slides

More from Steve Bishop(20)

Cognitive load theory by Steve Bishop
Cognitive load theoryCognitive load theory
Cognitive load theory
Steve Bishop2.8K views
Blockbusters #soccd by Steve Bishop
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccd
Steve Bishop1.6K views
Blockbusters template by Steve Bishop
Blockbusters templateBlockbusters template
Blockbusters template
Steve Bishop487 views
Blockbusters #socfam by Steve Bishop
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfam
Steve Bishop252 views
2.6 acids bases and salts by Steve Bishop
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and salts
Steve Bishop3.3K views
C2.5 exothermic and endothermic reactions by Steve Bishop
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactions
Steve Bishop9K views
C2.3.3 quantitative chemistry by Steve Bishop
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistry
Steve Bishop5K views
C2.2 how structure influences by Steve Bishop
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influences
Steve Bishop2.6K views
C2.1 structure and bonding by Steve Bishop
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
Steve Bishop3.4K views
C2.1 structure and bonding by Steve Bishop
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
Steve Bishop5.2K views
B2.7 meiosis and mitosis by Steve Bishop
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosis
Steve Bishop4.4K views
B2.7 genetic disorders by Steve Bishop
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disorders
Steve Bishop2.4K views
B2.7 cell division and inheritance by Steve Bishop
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritance
Steve Bishop2.2K views
B2.5 proteins enzymes by Steve Bishop
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymes
Steve Bishop5.9K views
Aerobic & anaerobic respiration by Steve Bishop
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respiration
Steve Bishop46.7K views
B1.4 pollution detectors by Steve Bishop
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectors
Steve Bishop1.8K views
B1.4 plants adaptation by Steve Bishop
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptation
Steve Bishop4.5K views
B1.4 animals adaptations by Steve Bishop
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptations
Steve Bishop3.9K views

Recently uploaded

Structure and Functions of Cell.pdf by
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
719 views10 slides
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx by
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
386 views50 slides
Jibachha publishing Textbook.docx by
Jibachha publishing Textbook.docxJibachha publishing Textbook.docx
Jibachha publishing Textbook.docxDrJibachhaSahVetphys
51 views14 slides
Java Simplified: Understanding Programming Basics by
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming BasicsAkshaj Vadakkath Joshy
322 views155 slides
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx by
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
95 views57 slides
Education and Diversity.pptx by
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptxDrHafizKosar
193 views16 slides

Recently uploaded(20)

Structure and Functions of Cell.pdf by Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan719 views
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx by ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP386 views
Education and Diversity.pptx by DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar193 views
S1_SD_Resources Walkthrough.pptx by LAZAROAREVALO1
S1_SD_Resources Walkthrough.pptxS1_SD_Resources Walkthrough.pptx
S1_SD_Resources Walkthrough.pptx
LAZAROAREVALO164 views
Narration lesson plan by TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN61 views
Ch. 7 Political Participation and Elections.pptx by Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala111 views
REPRESENTATION - GAUNTLET.pptx by iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood138 views
Use of Probiotics in Aquaculture.pptx by AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL119 views
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx by Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Ms. Pooja Bhandare113 views
Create a Structure in VBNet.pptx by Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P78 views
Class 9 lesson plans by TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN51 views
How to empty an One2many field in Odoo by Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George87 views

Forensic Science Informatics P3 M3 D3

  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. How many people have been prosecuted under the different laws? How much does it cost to police and prosecute under the different laws? What problems do the organisations face? How do the organisations link up? Some key issues to be researched: