Skip to main navigation Skip to search Skip to main content

Cyberstalking Issues

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Cyberstalking is closely related to Digital forensics. Digital forensics is an investigation and analysis technique to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. We can extract evidences from digital devices. The cutting edge technology is to track down the Cyber-stalking evidence with the aid of AI technology, report to law enforcement, and pin down the identity of the stalker. A key focus at this moment is how to proactively detect and prevent this kind of crime.

Conference

Conference2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
CityOrlando
Period6/10/1710/10/17
Other2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) (06/10/2017-10/10/2017, Orlando)

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

Keywords

  • profiling general data protection regulation (GDPR)
  • machine learning
  • AI (Artificial Intelligence)
  • Digital forensics; Cyber-stalking frameworks
  • commonsense knowledge
  • data mining

Fingerprint

Dive into the research topics of 'Cyberstalking Issues'. Together they form a unique fingerprint.

Cite this