Old policy of submission requires submitting the report both electronically and in hard copies. Electronically it has to be submitted by Moodle within 10 am on the day of the deadline. No submissions will be entertained after the deadline. PDF format without password protection should be used. The original file needs to be retained as long as the report is not passed in case any clarification is required. Certain rules should be followed while submitting the hard copies. Two copies are required to be submitted to the Programmes Office by 3 pm on the same day of deadline. A maroon cover with The City University London printed on it in gold and brass-binding screws should be used to bind the report. If someone wants to buy it second hand, the binders will be available in the Postgraduate office at zero cost. The new binders will be available from the City University branch of Waterstones in Northampton Square. The name, project title, degree and year of studying has to be mentioned on the spine of each copy. In case the project includes software development then two CD and DVD must be provided containing the codes. Same information has to be provided on the top of the CD and DVD’s. Whereas, in the new policy, the reports need to be submitted electronically via Moodle. The procedure is almost similar to the old policy. The only difference is that no hard copies need to be submitted. All the documents should be shared electronically. In case the reports deal with software development, then USB drives along with CD’s and DVD’s can be provided. However, the electronically shared documents are not viewable by all due to some limitations. In case the reports are not visible online, hardcopies of the files can be submitted. The tasks are to be submitted to a number of staff members. Name, student number and course name should be mentioned on the top cover. A4 size brown top covers and standard university binders will be available in the Programmes Office.
Two risk scenarios for the new policy:
There are several risks of submitting assignments via Moodle. Two such scenarios can be explained as below:
Anticipatory measures:
The incidents can be managed well by following the below listed guidelines:
Long-term incident response measures:
Literature Search for admissibility of digital evidence based on Daubert criteria (US):
Daubert criteria is the rule that the United States federal law follows regarding the admissibility of digital evidence in court (WG, 2018). A party raises a Daubert motion when he finds that the evidences provided before or during trial sessions in front of the jury are unqualified or inappropriate. The Daubert standard consists of the following guidelines:
Literature Search for admissibility of digital evidence based on the ACPO guidelines:
According to the Association of Chief Police Officer (ACPO) guidelines:
Discuss briefly on ACPO guidelines:
According to the above guidelines, a variety of legislation applies in digital evidence examinations. The first one is the Computer misuse act. According to the first act, it is a punishable offence to access personal data without legal authorization. This will be referred to as hacking. The Police and the Justice Bill 2006 has amended penalty for such actions. Computers are also hacked to impair or stop the smooth operation of the systems. This malicious activity affects the programs and according to the act carries a penalty of maximum 10 years imprisonment.
Discuss briefly on Daubert criteria:
According to Daubert standard, the prosecution has to present before the jury a relevant and reliable evidence such that it becomes easy for the jury to arrive at a conclusion. The methods of collecting the evidences should abide by the rules of the Standard. The methods adopted for obtaining the witnesses should be as per the scientific methodologies. However, if the opponent party finds that the evidences are unqualified, then they might raise the Daubert motion.
Compare and contrast between ACPO guidelines and Daubert criteria for admissibility of digital evidence:
There is much debate on the admissibility of scientific evidence in court. Digital evidences are data or information that are stored and transmitted in an electronic device. They are obtained mainly from emails, text and instant messages (Forensicsciencesimplified.org, 2018). The evidences can be acquired only when these devices are seized. Digital evidences can be in any form. Fingerprints or DNA evidences are hidden (Poisel Malzer and Tjoa, 2013). They can be destroyed and altered at any point of time and is also time sensitive (Garrie, 2014). The two legal frameworks differs from each other in the following points:
Discussion on whether the two scopes are comparable or not:
The two scopes are highly comparable because they both focus on the admissibility of digital evidence. They might differ in concept in their own ways however, both of the above guidelines can be used to solve the same problem. The comparison is given in the above points. ACPO guidelines say that the unauthorized access to computers for collecting evidences is a criminal offence and is punishable by law (Shaw and Browne, 2013). Whereas, Daubert criteria says that the methods of collecting evidences should be scientific which indirectly conveys the message that the method should be authorized.
Discussion on the fact if the two scopes are solving the similar problems:
The two scopes are applicable for solving the same problem. Both can solve the problem related to the acquisition of data that are produced in the court.
Example that show they are required to solve the same problem:
For example, if we consider the scenario that the students were unable to submit their assignments via Moodle due to some malicious actions performed by some students on the universities network. This case has been reported to the top management who has hired investigators to investigate the case. Now, the investigators will collect evidences that will be helpful to detect the culprit. They can abide by either of the two guidelines. They can choose the evidence collecting guidelines mentioned by Daubert standard or the ACPO guidelines. Both will help them reach to a correct conclusion detect the actual criminal.
References:
Barton, T. and Azhar, M.H.B., 2016, October. Forensic analysis of the recovery of Wickr’s ephemeral data on Android platforms. In The First International Conference on Cyber-Technologies and Cyber-Systems (pp. 35-40).
Baytiyeh, H., 2017. Perceptions of Professors and Students towards Moodle: A Case Study. In Exploring the New Era of Technology-Infused Education (pp. 206-229). IGI Global.
Cahyani, N.D.W., Martini, B., Choo, K.K.R. and Al?Azhar, A.M.N., 2017. Forensic data acquisition from cloud?of?things devices: windows Smartphones as a case study. Concurrency and Computation: Practice and Experience, 29(14), p.e3855.
Carneiro, M.M., 2013. Evaluating assessment procedures in a super-sized English as a foreign language online class. Glasgow, 10-13 July 2013 Papers, p.234.
Chen, Z., Han, F., Cao, J., Jiang, X. and Chen, S., 2013. Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), pp.40-50.
City.ac.uk.(2018).[online]Availableat:https://www.city.ac.uk/__data/assets/pdf_file/0020/303653/6b-Major-Incidents-and-Online-Assessment-Report-Format.pdf [Accessed 29 Jul. 2018].
Daryabar, F., Dehghantanha, A. and Udzir, N.I., 2013. A review on impacts of cloud computing on digital forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(2), pp.77-94.
Digital-detective.net. (2018). [online] Available at: https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf [Accessed 29 Jul. 2018].
Forensicsciencesimplified.org. (2018). [online] Available at: https://www.forensicsciencesimplified.org/digital/DigitalEvidence.pdf [Accessed 29 Jul. 2018].
Garrie, D.B., 2014. Digital forensic evidence in the courtroom: Understanding content and quality. Nw. J. Tech. & Intell. Prop., 12, p.i.
?nner, B., 2014. PROBLEMS AND RECOMMENDATIONS ON USING A RESTRICTED COMPUTER ENVIRONMENT FOR EXAMS ON MOODLE. Engineering Sciences & Technologies/Nauki Inzynierskie i Technologie, 4(1).
Kiennert, C., Rocher, P.O., Ivanova, M., Rozeva, A., Durcheva, M. and Garcia-Alfaro, J., 2017, July. Security challenges in e-assessment and technical solutions. In Information Visualisation (IV), 2017 21st International Conference (pp. 366-371). IEEE.
Martini, B. and Choo, K.K.R., 2013. Cloud storage forensics: ownCloud as a case study. Digital Investigation, 10(4), pp.287-299.
Nelson, B., Phillips, A. and Steuart, C., 2014. Guide to computer forensics and investigations. Cengage Learning.
Pakkanen, T., Bosco, D. and Santtila, P., 2014. Crime linkage as expert evidence–making a case for the Daubert standard. Crime linkage: Theory, Research, and Practice, CRC Press, Boca Raton, FL, pp.225-50.
Pdfs.semanticscholar.org. (2018). [online] Available at: https://pdfs.semanticscholar.org/b386/f5131178d3e5f916698f62e83837c2587043.pdf [Accessed 29 Jul. 2018].
Poisel, R., Malzer, E. and Tjoa, S., 2013. Evidence and Cloud Computing: The Virtual Machine Introspection Approach. JoWUA, 4(1), pp.135-152.
Rege, A., 2016, June. Incorporating the human element in anticipatory and dynamic cyber defense. In Cybercrime and Computer Forensic (ICCCF), IEEE International Conference on (pp. 1-7). IEEE.
Scanlon, M., Du, X. and Lillis, D., 2017. EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution. Digital Investigation, 20, pp.S29-S36.
Scanlon, M., Farina, J., Khac, N.A.L. and Kechadi, T., 2014. Leveraging decentralization to extend the digital evidence acquisition window: case study on BitTorrent Sync. arXiv preprint arXiv:1409.8486.
Shaw, A. and Browne, A., 2013. A practical and robust approach to coping with large volumes of data submitted for digital forensic examination. Digital Investigation, 10(2), pp.116-128.
Tøndel, I.A., Line, M.B. and Jaatun, M.G., 2014. Information security incident management: Current practice as reported in the literature. Computers & Security, 45, pp.42-57.
WG, V. (2018). Post-Daubert admissibility of scientific evidence on malingering of cognitive deficits. – PubMed – NCBI. [online] Ncbi.nlm.nih.gov. Available at: https://www.ncbi.nlm.nih.gov/pubmed/11471788 [Accessed 29 Jul. 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download