Archives
Benefit from rapid, rigorous peer review and open access publishing that puts your work in front of the right audience.
Submit Your Manuscript →Issue No: 3
Fingerprints are commonly used for identification 1. All records are computerized. In a catastrophe recorded images of soft tissue may become useless if the tissues burn throughout. Dental prints are rarely used for ...
Over the years, different entomological genera have been found for forensic analysis. Their biological cycles and how they interact with decomposing bodies have become known. But it is when it comes to identifying a species that problems ari...
Issue No: 2
This paper attempts to answer the question of how government agencies use The Onion Router, or Tor, in conducting investigations. The essay observes that Tor is free open-source software that can be used by anyone who desires to communicate ...
This paper evaluates the effect of the Estonian cyber incident on Estonia, Russia, the United States, the European Union, and the North Atlantic Treaty Organization, also known as NATO. The paper employs the Valeriano and Maness criteria for...
The purpose of this essay is to compare and contrast the cyber-attacks on Estonia, Georgia, and Ukraine, including tactics, techniques, procedures, and effects. The paper states that none of the ...
The purpose of this essay was to document the cybercrimes of Vasiliy Gorshkov and Alexey Ivanov, starting from their humble beginnings in Chelyabinsk, Russia to their convictions for conspirac...
Issue No: 1
Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a...
Fire is an uncontrolled combustion that causes material damage and endangers human lives. Combustion is a chemical process that causes the oxidation of the fuel constituents of a some kind fuel. It is a process between fuel and oxidants in w...
This paper attempts to answer the question of whether digital terrorism, also known as cyberterrorism, exists. The paper defines terrorism both in the conventional and digital sense. It then gives a short history of conventional terrorism, d...
The question that this paper answer is whether the Illinois Reporter’s Privilege should protect an online blogger. The definitions of the terms “reporter,” “news medium,” and “source” quoted from 735 ILCS 5/8-902, followed by several example...
📚 Indexed & Abstracted In
Our journal is indexed in leading academic databases and search engines