Editor-in-Chief
Prof. Stella C. Chiemeke
Professor of Computer Scince
University of Benin
Benin City, Nigeria
​Senior Affiliate Research Fellow (ICITD)
Southern University, Baton Rouge, LA, USA
E-mail all inquiries and forward articles for consideration to:
University Auditorium
The University of Benin
Benin City, Nigeria
Theme

Creative Research Publishers
www,isteams.net/itlawbookchapters info@isteams.net +18576007570
Book Chapter Project
Book Chapter Project

.jpg)
Collaborating Entities, Institutions, Partners & Affiliations
-
Graduate Students - IT & Law Course - Ghana Institute of Management & Public Administration
-
Society for Multidisciplinary & Advanced Research Techniques (SMART) Africa
-
Faculty of Computational Sciences - Academic City University College, Accra, Ghana
-
IEEE Nigeria Section Computer Society
-
The ICT University Foundations
-
CRACC - American University West Africa, The Gambia
​
​
Published by Creative Research Publishers and Indexed in CrossREF with DOIs assigned
Further Indexed in Google Scholar, Semantic Scholar, Academia.edu



Words from the Editorial Team Lead

It is my honor to have created the traction and motivation that led to the compilation of these chapters from the Class of brilliant and highly effective students from the IT & Law and Cyber Security and Forensics Programme at the Ghana Institute for Management & Public Administration. Africa's contribution to discourses in a divergent and increasingly multidisciplinary domain of Cyber Security, Law, IT and Forensics must be captured and succinctly presented to showcase the prowess of the african technocrats in contributing to global discourses. I welcome readers to peruse the chapters and take advantage of the dynamic subject contents addressed by this book. Comments, contributions and rejoinders are appreciated
Prof Longe Olumide Babatope (FASI)
Adjunct Professor - School of Technology
Ghana Institute of Management & Public Administration
Dean - Faculty of Computational Sciences & Informatics
Academic City University College, Accra, Ghana
Distinguished Fulbright, UI-McArthur & HLF Germany Fellow
Senior Member IEEE - Chair IEEE Nigeria Computer Society
ABOUT THE BOOK ​
​​
This book titled Research Nexus in IT, Law, Cyber Security and Forensics focuses on issue, concepts, principles and practices at the watershed of the multidisciplinarity of the subjects of discourse at addressing the malaise of Cyber crime, jurisdiction, technologies, advancement in forensic Sciences as well as the evolution of digital evidence and legal Informatics. Metamorphosing from a general class candidate research on a course of study of Legal Aspects of IT taken at the postgraduate level at the Ghana Institute of Management and Public Administration, the contributors addresses themes covering advances in technological artifacts and design in the domain, misuse of personal Information, technological challenges mitigating evidence gathering, aspects of legal responsibilities, evidence gathering, intermediary liabilities, advances in cryptography and steganographic schemes, responsible adoption of disruptive technologies, aspects of computational Law and techno-legal reasoning as a well as broad coverage of Cyber Security and Forensics from .the theoretical, practical, frameworks nd design. In addition, these perspectives were presented with recommendations for policies, practices and policies for Africa. The book therefore serves as a reference material for practitioners, experts, technocrats, students, policy makers as well as other interested readers and enthusiasts approaching the subject coverage for a variety of usage and purpose.
​
BOOK Editors
​
-
Prof. Olumide B. Longe – Co-ordinating and Acquisition Editor
Professor & Dean, Academic City University College, Accra, Ghana
​
-
Prof. Edward Santiago Blaise, DBA, ITIL, MPM
State University of New York – Sullivan College, Liberty New York
​​
-
Prof. Princely Ifinedo
Professor of Information Systems, Brock University, St. Catherines, Canada
​
-
Dr. Asani Tobiloba. Emmanuel
Landmark University, Omu-Aran, Nigeria
​​
-
Dr. Waheed Olanipekun
Director CRACC - American International University West Africa, The Gambia
​​
Associate Editors
-
Joseph Budu PhD
Ghana Institute of Management and Public Administration (GIMPA)
​
​Enquiries
Direct all enquiries to onge.olumide@ieee.org, longeolumide@fulbrightmail.org
​
Chapters Published and Included in Book Project ​
​
Bitcoins Usage By Cybercriminals – Evolution And Current Mitigating Approaches
Daniel Tibina Apuri
dx.doi.org/10.22624/AIMS/CRP-BK3-P40
​
Analysis of Attack Intention Recognition
Tsatsu K. Sabblah
dx.doi.org/10.22624/AIMS/CRP-BK3-P41
​
A Survey Of Packet Analysis For Network Forensics
Michael Kodjo Agorsah
dx.doi.org/10.22624/AIMS/CRP-BK3-P42
​
Mobile Device’s Digital Forensic Process Model
Bismark Boateng
dx.doi.org/10.22624/AIMS/CRP-BK3-P43
​
Nana Kwame Kwakye
dx.doi.org/10.22624/AIMS/CRP-BK3-P44
​
Biometric Spoofing and Deepfake Detection
Yaw Amoah-Yeboah
dx.doi.org/10.22624/AIMS/CRP-BK3-P45
​
Peter Oppong Baafi
dx.doi.org/10.22624/AIMS/CRP-BK3-P46
​
Internet of Things (IoT) & Underwater Network Forensics
Timothy Kwaku
dx.doi.org/10.22624/AIMS/CRP-BK3-P47
​
Attack Intention Recognition Technique
Terry Kwaku Boateng
dx.doi.org/10.22624/AIMS/CRP-BK3-P48
​
Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness
Jonas Takyi Asamoah
dx.doi.org/10.22624/AIMS/CRP-BK3-P49
​
Mobile/Telephone Contacts and Calls In Forensics Analysis
Samuel Opoku Daniels
dx.doi.org/10.22624/AIMS/CRP-BK3-P50
​
Deep Learning (DL) Oriented Forensic Analysis
Herbert Cyril Dodoo
dx.doi.org/10.22624/AIMS/CRP-BK3-P51
​
Effective ways of Carrying Out Network Autopsy
Louis Opoku Gyamfi
dx.doi.org/10.22624/AIMS/CRP-BK3-P52
​
Libforensics For Developing Digital Forensics Applications
James Hebidzi Senanu
dx.doi.org/10.22624/AIMS/CRP-BK3-P53
​
Cloud Computing Forensic Challenges for Law Enforcement
Samuel Opuni Boateng
dx.doi.org/10.22624/AIMS/CRP-BK3-P54
​
Security Measures Against Malware, Botnets & Ransomware
Joseph Antwi Attoh
dx.doi.org/10.22624/AIMS/CRP-BK3-P55
​
X-Ways Forensics Platform For Digital Forensics Examiners
Seth Adjei Gyimah
dx.doi.org/10.22624/AIMS/CRP-BK3-P56
​
Digital Forensic and Distributed Evidence
Emmanuel Kpakpo Brown
dx.doi.org/10.22624/AIMS/CRP-BK3-P57
​
Deleted Data Recovery Mechanisms
Ephraim Mawutor Adehenu
dx.doi.org/10.22624/AIMS/CRP-BK3-P58
​
Device Information for Forensic Analysis
Paul Antwi
dx.doi.org/10.22624/AIMS/CRP-BK3-P59
Chapters Published and Included in Book Project ​
Forensic Detection through the Identification and Collection of Data for Analysis
Joshua Wemegah
dx.doi.org/10.22624/AIMS/CRP-BK3-P1
​
Storing Forensic Data Against Interference
Amenuveve Gracious Adzogbley
dx.doi.org/10.22624/AIMS/CRP-BK3-P2
​
Understanding Advanced Persistent Threats
Akuffo-Badoo Erastus B.
dx.doi.org/10.22624/AIMS/CRP-BK3-P3
​
Improving Image Interpretation in Digital Forensics
Jonathan Gasokpo Adjorlolo
dx.doi.org/10.22624/AIMS/CRP-BK3-P4
​
Inaccessibility of Services as a Threat to Forensic Analysis
Maxwell Amparbeng
dx.doi.org/10.22624/AIMS/CRP-BK3-P5
​
Weak Credential Information as a Threat to Online Security
Cyprian Danso Darko
dx.doi.org/10.22624/AIMS/CRP-BK3-P6
​
Cyberterrorism Using Smart Phones
Tseh Richard Divine
dx.doi.org/10.22624/AIMS/CRP-BK3-P7
​
Analysing and Reconstructing Data for Forensic Inference and Conclusion
Rufus Larbi Okyere
dx.doi.org/10.22624/AIMS/CRP-BK3-P8
​
SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.
Francis Wodugah
dx.doi.org/10.22624/AIMS/CRP-BK3-P9
​
Random Data Loss and Theft in Cyberspace
Eric Ofosu Asare
​
A Review of Credential Stuffing
Ebenezer Tetteh Nanor
​
Mitigating Electromagnetic Side-Channel Attacks
Amankwah Attah
dx.doi.org/10.22624/AIMS/CRP-BK3-P12
​
Multi-Factor Authentication for Online Security of Android Devices
Benjamin Baafi
dx.doi.org/10.22624/AIMS/CRP-BK3-P13
​
Digital Multimedia Tampering Detection for Forensics Analysis
Bernard Mainoo
dx.doi.org/10.22624/AIMS/CRP-BK3-P14
Packet Analysis for Network Forensics
Asiedu Francis
dx.doi.org/10.22624/AIMS/CRP-BK3-P15
​
Host-Based Forensic – Analyzing Criminal Action Using Computer-Based Data
Richard Sefah Kwame
dx.doi.org/10.22624/AIMS/CRP-BK3-P16
​
Information Security Incident Handling in the Cloud
Abraham Sackey
dx.doi.org/10.22624/AIMS/CRP-BK3-P17
​
Privacy Preserving Internet of Things (IoT) Forensics
Frederick Asumang Odame
dx.doi.org/10.22624/AIMS/CRP-BK3-P18
​
Internet Service Providers and Intermediary Liabilities
Anna Asunka
​
Digital Forensic Challenges in Internet of Things (IoT)
​Albert Quist
dx.doi.org/10.22624/AIMS/CRP-BK3-P20
​
Integration of Cloud in Mobile Forensics
Michael Acquah Stuff
dx.doi.org/10.22624/AIMS/CRP-BK3-P21
​
Image-assisted Biometric Identification
Rasheed Abubakar Ayanaba
dx.doi.org/10.22624/AIMS/CRP-BK3-P22
​
Collecting Digital Data with the Assurance of Integrity
Gilbert Sam
dx.doi.org/10.22624/AIMS/CRP-BK3-P23
​
Forensic Analysis of Electronic Mail Messages
Eugene Marfo Akoto
dx.doi.org/10.22624/AIMS/CRP-BK3-P24
​
Communication Protocol for Forensic Analysis
Worthy Elijah
​
Evidence Confidentiality and Digital Forensic Experts
John Kwaku Oppong
dx.doi.org/10.22624/AIMS/CRP-BK3-P26
​
Rosemond O. Addo-Sampong
dx.doi.org/10.22624/AIMS/CRP-BK3-P27
​
Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations
Aliloulaye Tchaou
dx.doi.org/10.22624/AIMS/CRP-BK3-P28
​
Edwin Angmor Kofi Ohipeni
dx.doi.org/10.22624/AIMS/CRP-BK3-P29
​
Evidence Based Reconstruction for Digital Forensics
Ellen Akongwin Abanga
dx.doi.org/10.22624/AIMS/CRP-BK3-P30
​
Liabilities of Shared System in Forensic Analysis
Eric Sowah Badger
dx.doi.org/10.22624/AIMS/CRP-BK3-P31
​
A Review of Attacker Attribution
Ferdinand Kpieleh
dx.doi.org/10.22624/AIMS/CRP-BK3-P32
​
Analysing Network Information and Protocol Using Wireshark
Theophilus Botchway
dx.doi.org/10.22624/AIMS/CRP-BK3-P33
​
Stanley Okyere-Agyei
dx.doi.org/10.22624/AIMS/CRP-BK3-P34
​
Current and Future Trends In Mobile Device Forensics
​Godwin Anyomi
dx.doi.org/10.22624/AIMS/CRP-BK3-P35
​
Forensic Analysis on Streaming Multimedia
Emmanuel Tettey Okan
dx.doi.org/10.22624/AIMS/CRP-BK3-P36
​
Smartphone RSS Traces For Forensic Analysis
Roselyn Abena Terbie Hammond
dx.doi.org/10.22624/AIMS/CRP-BK3-P37
​
A Review of Cloud Forensics
Alex Appiah Eshun
​
Digital Forensics In Multimedia
Frey John Wisdom
dx.doi.org/10.22624/AIMS/CRP-BK3-P39
​
.jpg)


.jpg)

.jpg)
.jpg)
Creative Research Publishing Group
