Eksistensi Digital Evidence dalam Hukum Acara Perdata
نویسندگان
چکیده
منابع مشابه
Authors: Ray Chambers* and Hukum Chandra*
An accurate estimate of the uncertainty associated with a parameter estimate is important if we want to avoid misleading inference. The bootstrap technique (Efron, 1979; Efron and Tisbshirani, 1993) is a very general way of measuring the accuracy of estimators, and was originally developed for parameter estimation given independent identically distributed (i.i.d.) data. However, random effects ...
متن کاملUnification of Digital Evidence from Disparate Sources (Digital Evidence Bags)
This paper outlines a new approach to the acquisition and processing of digital evidence obtained from disparate digital devices and sources. To date the capture of digital based evidence has always been in its entirety from the source device and different methods and containers (file types) are used for different types of digital device (e.g. computer, PDA, mobile phone). This paper defines a ...
متن کاملDiscovering Covert Digital Evidence
DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive ...
متن کاملSecuring Digital Evidence
Non-repudiation of digital evidence is required by various use cases in today’s business cases for example in the area of medical products but also in public use cases like congestion charges. These use cases have in common that at a certain time an evidence record is generated to attest for the occurrence of a certain event. To allow for non-repudiation of such an evidence record it is require...
متن کاملThe Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
Masalah Salah satu masalah yang dihadapi berbagai organisasi dewasa ini adalah banyaknya tindakan penyalahgunaan komputer, meliputi di antaranya penyebaran virus, pemalsuan identitas, duplikasi perangkat lunak secara ilegal, hingga sabotase terhadap perusahaan dengan menggunakan komputer. Sebagian perusahaan telah mulai menetapkan sejumlah kode etik, yiatu segala pernyataan perusahaan mengenai ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Cakrawala Hukum
سال: 2019
ISSN: 2598-6538,2356-4962
DOI: 10.26905/idjch.v10i1.2616