Editor-in-Chief
Prof. Stella C. Chiemeke
Professor of Computer Scince
University of Benin
Benin City, Nigeria
Senior Affiliate Research Fellow (ICITD)
Southern University, Baton Rouge, LA, USA
E-mail all inquiries and forward articles for consideration to:
University Auditorium
The University of Benin
Benin City, Nigeria
Theme
Creative Research Publishers
www,isteams.net/itlawbookchapters info@isteams.net +18576007570
Book Chapter Project
Book Chapter Project
Collaborating Entities, Institutions, Partners & Affiliations
-
Graduate Students - IT & Law Course - Ghana Institute of Management & Public Administration
-
Society for Multidisciplinary & Advanced Research Techniques (SMART) Africa
-
Faculty of Computational Sciences - Academic City University College, Accra, Ghana
-
IEEE Nigeria Section Computer Society
-
The ICT University Foundations
-
CRACC - American University West Africa, The Gambia
Published by Creative Research Publishers and Indexed in CrossREF with DOIs assigned
Further Indexed in Google Scholar, Semantic Scholar, Academia.edu
Words from the Editorial Team Lead
It is my honor to have created the traction and motivation that led to the compilation of these chapters from the Class of brilliant and highly effective students from the IT & Law and Cyber Security and Forensics Programme at the Ghana Institute for Management & Public Administration. Africa's contribution to discourses in a divergent and increasingly multidisciplinary domain of Cyber Security, Law, IT and Forensics must be captured and succinctly presented to showcase the prowess of the african technocrats in contributing to global discourses. I welcome readers to peruse the chapters and take advantage of the dynamic subject contents addressed by this book. Comments, contributions and rejoinders are appreciated
Prof Longe Olumide Babatope (FASI)
Adjunct Professor - School of Technology
Ghana Institute of Management & Public Administration
Dean - Faculty of Computational Sciences & Informatics
Academic City University College, Accra, Ghana
Distinguished Fulbright, UI-McArthur & HLF Germany Fellow
Senior Member IEEE - Chair IEEE Nigeria Computer Society
ABOUT THE BOOK
This book titled Research Nexus in IT, Law, Cyber Security and Forensics focuses on issue, concepts, principles and practices at the watershed of the multidisciplinarity of the subjects of discourse at addressing the malaise of Cyber crime, jurisdiction, technologies, advancement in forensic Sciences as well as the evolution of digital evidence and legal Informatics. Metamorphosing from a general class candidate research on a course of study of Legal Aspects of IT taken at the postgraduate level at the Ghana Institute of Management and Public Administration, the contributors addresses themes covering advances in technological artifacts and design in the domain, misuse of personal Information, technological challenges mitigating evidence gathering, aspects of legal responsibilities, evidence gathering, intermediary liabilities, advances in cryptography and steganographic schemes, responsible adoption of disruptive technologies, aspects of computational Law and techno-legal reasoning as a well as broad coverage of Cyber Security and Forensics from .the theoretical, practical, frameworks nd design. In addition, these perspectives were presented with recommendations for policies, practices and policies for Africa. The book therefore serves as a reference material for practitioners, experts, technocrats, students, policy makers as well as other interested readers and enthusiasts approaching the subject coverage for a variety of usage and purpose.
BOOK Editors
-
Prof. Olumide B. Longe – Co-ordinating and Acquisition Editor
Professor & Dean, Academic City University College, Accra, Ghana
-
Prof. Edward Santiago Blaise, DBA, ITIL, MPM
State University of New York – Sullivan College, Liberty New York
-
Prof. Princely Ifinedo
Professor of Information Systems, Brock University, St. Catherines, Canada
-
Dr. Asani Tobiloba. Emmanuel
Landmark University, Omu-Aran, Nigeria
-
Dr. Waheed Olanipekun
Director CRACC - American International University West Africa, The Gambia
Associate Editors
-
Joseph Budu PhD
Ghana Institute of Management and Public Administration (GIMPA)
Enquiries
Direct all enquiries to onge.olumide@ieee.org, longeolumide@fulbrightmail.org
Chapters Published and Included in Book Project
Bitcoins Usage By Cybercriminals – Evolution And Current Mitigating Approaches
Daniel Tibina Apuri
dx.doi.org/10.22624/AIMS/CRP-BK3-P40
Analysis of Attack Intention Recognition
Tsatsu K. Sabblah
dx.doi.org/10.22624/AIMS/CRP-BK3-P41
A Survey Of Packet Analysis For Network Forensics
Michael Kodjo Agorsah
dx.doi.org/10.22624/AIMS/CRP-BK3-P42
Mobile Device’s Digital Forensic Process Model
Bismark Boateng
dx.doi.org/10.22624/AIMS/CRP-BK3-P43
Nana Kwame Kwakye
dx.doi.org/10.22624/AIMS/CRP-BK3-P44
Biometric Spoofing and Deepfake Detection
Yaw Amoah-Yeboah
dx.doi.org/10.22624/AIMS/CRP-BK3-P45
Peter Oppong Baafi
dx.doi.org/10.22624/AIMS/CRP-BK3-P46
Internet of Things (IoT) & Underwater Network Forensics
Timothy Kwaku
dx.doi.org/10.22624/AIMS/CRP-BK3-P47
Attack Intention Recognition Technique
Terry Kwaku Boateng
dx.doi.org/10.22624/AIMS/CRP-BK3-P48
Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness
Jonas Takyi Asamoah
dx.doi.org/10.22624/AIMS/CRP-BK3-P49
Mobile/Telephone Contacts and Calls In Forensics Analysis
Samuel Opoku Daniels
dx.doi.org/10.22624/AIMS/CRP-BK3-P50
Deep Learning (DL) Oriented Forensic Analysis
Herbert Cyril Dodoo
dx.doi.org/10.22624/AIMS/CRP-BK3-P51
Effective ways of Carrying Out Network Autopsy
Louis Opoku Gyamfi
dx.doi.org/10.22624/AIMS/CRP-BK3-P52
Libforensics For Developing Digital Forensics Applications
James Hebidzi Senanu
dx.doi.org/10.22624/AIMS/CRP-BK3-P53
Cloud Computing Forensic Challenges for Law Enforcement
Samuel Opuni Boateng
dx.doi.org/10.22624/AIMS/CRP-BK3-P54
Security Measures Against Malware, Botnets & Ransomware
Joseph Antwi Attoh
dx.doi.org/10.22624/AIMS/CRP-BK3-P55
X-Ways Forensics Platform For Digital Forensics Examiners
Seth Adjei Gyimah
dx.doi.org/10.22624/AIMS/CRP-BK3-P56
Digital Forensic and Distributed Evidence
Emmanuel Kpakpo Brown
dx.doi.org/10.22624/AIMS/CRP-BK3-P57
Deleted Data Recovery Mechanisms
Ephraim Mawutor Adehenu
dx.doi.org/10.22624/AIMS/CRP-BK3-P58
Device Information for Forensic Analysis
Paul Antwi
dx.doi.org/10.22624/AIMS/CRP-BK3-P59
Chapters Published and Included in Book Project
Forensic Detection through the Identification and Collection of Data for Analysis
Joshua Wemegah
dx.doi.org/10.22624/AIMS/CRP-BK3-P1
Storing Forensic Data Against Interference
Amenuveve Gracious Adzogbley
dx.doi.org/10.22624/AIMS/CRP-BK3-P2
Understanding Advanced Persistent Threats
Akuffo-Badoo Erastus B.
dx.doi.org/10.22624/AIMS/CRP-BK3-P3
Improving Image Interpretation in Digital Forensics
Jonathan Gasokpo Adjorlolo
dx.doi.org/10.22624/AIMS/CRP-BK3-P4
Inaccessibility of Services as a Threat to Forensic Analysis
Maxwell Amparbeng
dx.doi.org/10.22624/AIMS/CRP-BK3-P5
Weak Credential Information as a Threat to Online Security
Cyprian Danso Darko
dx.doi.org/10.22624/AIMS/CRP-BK3-P6
Cyberterrorism Using Smart Phones
Tseh Richard Divine
dx.doi.org/10.22624/AIMS/CRP-BK3-P7
Analysing and Reconstructing Data for Forensic Inference and Conclusion
Rufus Larbi Okyere
dx.doi.org/10.22624/AIMS/CRP-BK3-P8
SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.
Francis Wodugah
dx.doi.org/10.22624/AIMS/CRP-BK3-P9
Random Data Loss and Theft in Cyberspace
Eric Ofosu Asare
A Review of Credential Stuffing
Ebenezer Tetteh Nanor
Mitigating Electromagnetic Side-Channel Attacks
Amankwah Attah
dx.doi.org/10.22624/AIMS/CRP-BK3-P12
Multi-Factor Authentication for Online Security of Android Devices
Benjamin Baafi
dx.doi.org/10.22624/AIMS/CRP-BK3-P13
Digital Multimedia Tampering Detection for Forensics Analysis
Bernard Mainoo
dx.doi.org/10.22624/AIMS/CRP-BK3-P14
Packet Analysis for Network Forensics
Asiedu Francis
dx.doi.org/10.22624/AIMS/CRP-BK3-P15
Host-Based Forensic – Analyzing Criminal Action Using Computer-Based Data
Richard Sefah Kwame
dx.doi.org/10.22624/AIMS/CRP-BK3-P16
Information Security Incident Handling in the Cloud
Abraham Sackey
dx.doi.org/10.22624/AIMS/CRP-BK3-P17
Privacy Preserving Internet of Things (IoT) Forensics
Frederick Asumang Odame
dx.doi.org/10.22624/AIMS/CRP-BK3-P18
Internet Service Providers and Intermediary Liabilities
Anna Asunka
Digital Forensic Challenges in Internet of Things (IoT)
Albert Quist
dx.doi.org/10.22624/AIMS/CRP-BK3-P20
Integration of Cloud in Mobile Forensics
Michael Acquah Stuff
dx.doi.org/10.22624/AIMS/CRP-BK3-P21
Image-assisted Biometric Identification
Rasheed Abubakar Ayanaba
dx.doi.org/10.22624/AIMS/CRP-BK3-P22
Collecting Digital Data with the Assurance of Integrity
Gilbert Sam
dx.doi.org/10.22624/AIMS/CRP-BK3-P23
Forensic Analysis of Electronic Mail Messages
Eugene Marfo Akoto
dx.doi.org/10.22624/AIMS/CRP-BK3-P24
Communication Protocol for Forensic Analysis
Worthy Elijah
Evidence Confidentiality and Digital Forensic Experts
John Kwaku Oppong
dx.doi.org/10.22624/AIMS/CRP-BK3-P26
Rosemond O. Addo-Sampong
dx.doi.org/10.22624/AIMS/CRP-BK3-P27
Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations
Aliloulaye Tchaou
dx.doi.org/10.22624/AIMS/CRP-BK3-P28
Edwin Angmor Kofi Ohipeni
dx.doi.org/10.22624/AIMS/CRP-BK3-P29
Evidence Based Reconstruction for Digital Forensics
Ellen Akongwin Abanga
dx.doi.org/10.22624/AIMS/CRP-BK3-P30
Liabilities of Shared System in Forensic Analysis
Eric Sowah Badger
dx.doi.org/10.22624/AIMS/CRP-BK3-P31
A Review of Attacker Attribution
Ferdinand Kpieleh
dx.doi.org/10.22624/AIMS/CRP-BK3-P32
Analysing Network Information and Protocol Using Wireshark
Theophilus Botchway
dx.doi.org/10.22624/AIMS/CRP-BK3-P33
Stanley Okyere-Agyei
dx.doi.org/10.22624/AIMS/CRP-BK3-P34
Current and Future Trends In Mobile Device Forensics
Godwin Anyomi
dx.doi.org/10.22624/AIMS/CRP-BK3-P35
Forensic Analysis on Streaming Multimedia
Emmanuel Tettey Okan
dx.doi.org/10.22624/AIMS/CRP-BK3-P36
Smartphone RSS Traces For Forensic Analysis
Roselyn Abena Terbie Hammond
dx.doi.org/10.22624/AIMS/CRP-BK3-P37
A Review of Cloud Forensics
Alex Appiah Eshun
Digital Forensics In Multimedia
Frey John Wisdom
dx.doi.org/10.22624/AIMS/CRP-BK3-P39
Creative Research Publishing Group