top of page
IMG-20220606-WA0038.jpg

Creative Research Publishers

      www,isteams.net/itlawbookchapters  info@isteams.net     +18576007570

Book Chapter Project 

Book Chapter Project 

DOI-Crossref.png
download (1).jpg

   Collaborating Entities, Institutions, Partners  & Affiliations 

 

  • Graduate Students - IT & Law Course - Ghana Institute of Management & Public Administration 

  • Society for Multidisciplinary & Advanced Research Techniques (SMART) Africa 

  • Faculty of Computational Sciences - Academic City University College, Accra, Ghana

  • IEEE Nigeria Section Computer Society

  • The ICT University Foundations

  • CRACC - American University West Africa, The Gambia 

​

​

       Published by Creative Research Publishers and Indexed in CrossREF with DOIs assigned

        Further Indexed in Google Scholar, Semantic Scholar, Academia.edu

 

GIMPA.png
ICT-U Foundations.JPG
image 1.png

Words from the Editorial Team  Lead 

olumide_edited.jpg

It is my honor to have created the traction and motivation that led to the compilation of these chapters from the Class of brilliant and highly effective students from the IT & Law and Cyber Security and Forensics Programme at the Ghana Institute for Management & Public Administration.  Africa's contribution to discourses in a divergent and increasingly multidisciplinary domain of  Cyber Security, Law, IT and Forensics must be captured and succinctly presented to showcase the prowess of the african technocrats in contributing to global discourses.   I  welcome readers to peruse the chapters and take advantage of the dynamic subject contents addressed  by this book. Comments, contributions and rejoinders are appreciated 

Prof Longe Olumide  Babatope  (FASI)

Adjunct Professor -  School of Technology

Ghana Institute of Management & Public Administration

Dean - Faculty of Computational Sciences & Informatics

Academic City University College, Accra, Ghana

Distinguished Fulbright, UI-McArthur & HLF Germany Fellow

Senior Member IEEE - Chair IEEE Nigeria Computer Society

      ABOUT THE BOOK                                                                                â€‹

​​

This book titled Research Nexus in IT, Law, Cyber Security and Forensics focuses on issue, concepts, principles and practices  at the watershed of the multidisciplinarity  of the subjects of discourse at addressing the malaise of Cyber crime, jurisdiction, technologies, advancement in forensic Sciences as well as the evolution of digital evidence and legal Informatics. Metamorphosing from a general class candidate research on a course of study  of Legal Aspects of IT taken at the postgraduate level at the Ghana Institute of Management and Public Administration, the contributors addresses themes covering advances in technological artifacts and design in the domain,    misuse of personal Information,  technological challenges  mitigating evidence gathering, aspects of legal responsibilities, evidence gathering,  intermediary liabilities, advances in cryptography and steganographic schemes,  responsible adoption of disruptive technologies, aspects of computational Law and techno-legal reasoning as a well as broad coverage of Cyber Security and Forensics from .the theoretical, practical, frameworks nd design. In addition, these perspectives were presented with recommendations for policies, practices and policies for Africa. The book therefore serves as a reference material for practitioners, experts, technocrats, students, policy makers as well as other interested readers and enthusiasts approaching the subject coverage for a variety of usage and purpose.

​

BOOK Editors

​

  • Prof. Olumide B. Longe  – Co-ordinating and Acquisition Editor

          Professor & Dean, Academic City University College, Accra, Ghana

​

  • Prof. Edward Santiago Blaise, DBA, ITIL, MPM

         State University of New York – Sullivan College, Liberty New York

​​

  • Prof. Princely Ifinedo 

         Professor of Information Systems, Brock University, St. Catherines, Canada  

​

  • Dr. Asani Tobiloba. Emmanuel

          Landmark University, Omu-Aran, Nigeria

​​

  • Dr. Waheed Olanipekun

          Director CRACC - American International University West Africa, The Gambia

​​

Associate Editors

  • Joseph Budu PhD   

          Ghana Institute of Management and Public Administration (GIMPA)

​

​Enquiries

Direct all enquiries to onge.olumide@ieee.org, longeolumide@fulbrightmail.org

profolumidegimpa@gmail.com

​

  Chapters  Published and  Included in Book Project                            â€‹

​

Bitcoins Usage By Cybercriminals –  Evolution And Current Mitigating Approaches

Daniel Tibina Apuri 

dx.doi.org/10.22624/AIMS/CRP-BK3-P40

​

Analysis of Attack Intention Recognition

Tsatsu K. Sabblah

dx.doi.org/10.22624/AIMS/CRP-BK3-P41

​

A Survey Of Packet Analysis For Network Forensics

Michael Kodjo Agorsah

dx.doi.org/10.22624/AIMS/CRP-BK3-P42

​

Mobile Device’s Digital Forensic Process Model 

Bismark Boateng

dx.doi.org/10.22624/AIMS/CRP-BK3-P43

​

Net-Force for Email Tracing

Nana Kwame Kwakye

dx.doi.org/10.22624/AIMS/CRP-BK3-P44

​

Biometric Spoofing and Deepfake Detection

Yaw Amoah-Yeboah

dx.doi.org/10.22624/AIMS/CRP-BK3-P45

​

Tools for Cyber Forensics 

Peter Oppong Baafi 

dx.doi.org/10.22624/AIMS/CRP-BK3-P46

​

Internet of Things (IoT) & Underwater Network Forensics

Timothy Kwaku

dx.doi.org/10.22624/AIMS/CRP-BK3-P47

​

Attack Intention Recognition Technique

Terry Kwaku Boateng

dx.doi.org/10.22624/AIMS/CRP-BK3-P48

​

Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness

Jonas Takyi Asamoah

dx.doi.org/10.22624/AIMS/CRP-BK3-P49

​

Mobile/Telephone Contacts and Calls In Forensics Analysis

Samuel Opoku Daniels

dx.doi.org/10.22624/AIMS/CRP-BK3-P50

​

Deep Learning (DL) Oriented Forensic Analysis

Herbert Cyril Dodoo

dx.doi.org/10.22624/AIMS/CRP-BK3-P51

​

Effective ways of Carrying Out Network Autopsy

Louis Opoku Gyamfi

dx.doi.org/10.22624/AIMS/CRP-BK3-P52

​

Libforensics For Developing Digital Forensics Applications

James Hebidzi Senanu

dx.doi.org/10.22624/AIMS/CRP-BK3-P53

​

Cloud Computing Forensic Challenges for Law Enforcement

Samuel Opuni Boateng

dx.doi.org/10.22624/AIMS/CRP-BK3-P54

​

Security Measures Against Malware, Botnets & Ransomware

Joseph Antwi Attoh

dx.doi.org/10.22624/AIMS/CRP-BK3-P55

​

X-Ways Forensics Platform For Digital Forensics Examiners

Seth Adjei Gyimah

dx.doi.org/10.22624/AIMS/CRP-BK3-P56

​

Digital Forensic and Distributed Evidence

Emmanuel Kpakpo Brown

dx.doi.org/10.22624/AIMS/CRP-BK3-P57

​

Deleted Data Recovery Mechanisms

Ephraim Mawutor Adehenu

dx.doi.org/10.22624/AIMS/CRP-BK3-P58

​

Device Information for Forensic Analysis

Paul Antwi

dx.doi.org/10.22624/AIMS/CRP-BK3-P59

  Chapters  Published and  Included in Book Project                            â€‹

 

Forensic Detection through the Identification and Collection of Data for Analysis

Joshua Wemegah

dx.doi.org/10.22624/AIMS/CRP-BK3-P1

​

Storing Forensic Data Against Interference

Amenuveve Gracious Adzogbley

dx.doi.org/10.22624/AIMS/CRP-BK3-P2

​

Understanding Advanced Persistent Threats

Akuffo-Badoo Erastus B.

dx.doi.org/10.22624/AIMS/CRP-BK3-P3

​

Improving Image Interpretation in Digital Forensics

Jonathan Gasokpo Adjorlolo

dx.doi.org/10.22624/AIMS/CRP-BK3-P4

​

Inaccessibility of Services as a Threat to Forensic Analysis

Maxwell Amparbeng

dx.doi.org/10.22624/AIMS/CRP-BK3-P5

​

Weak Credential Information as a Threat to Online Security

Cyprian Danso Darko

dx.doi.org/10.22624/AIMS/CRP-BK3-P6

​

Cyberterrorism Using Smart Phones

Tseh Richard Divine

dx.doi.org/10.22624/AIMS/CRP-BK3-P7

​

Analysing and Reconstructing Data for Forensic Inference and Conclusion

Rufus Larbi Okyere

dx.doi.org/10.22624/AIMS/CRP-BK3-P8

​

SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.

Francis Wodugah

dx.doi.org/10.22624/AIMS/CRP-BK3-P9

​

Random Data Loss and Theft in Cyberspace

Eric Ofosu Asare

​

A Review of Credential Stuffing

Ebenezer Tetteh Nanor

​

Mitigating Electromagnetic Side-Channel Attacks

Amankwah Attah

dx.doi.org/10.22624/AIMS/CRP-BK3-P12

​

Multi-Factor Authentication for Online Security of Android Devices

Benjamin Baafi

dx.doi.org/10.22624/AIMS/CRP-BK3-P13

​

Digital Multimedia Tampering Detection for Forensics Analysis

Bernard Mainoo

dx.doi.org/10.22624/AIMS/CRP-BK3-P14

 

Packet Analysis for Network Forensics

Asiedu Francis

dx.doi.org/10.22624/AIMS/CRP-BK3-P15

​

Host-Based Forensic – Analyzing Criminal Action Using Computer-Based Data

Richard Sefah Kwame

dx.doi.org/10.22624/AIMS/CRP-BK3-P16

​

Information Security Incident Handling in the Cloud

Abraham Sackey

dx.doi.org/10.22624/AIMS/CRP-BK3-P17

​

Privacy Preserving Internet of Things (IoT) Forensics

Frederick Asumang Odame

dx.doi.org/10.22624/AIMS/CRP-BK3-P18

​

Internet Service Providers and Intermediary Liabilities
Anna Asunka

​

Digital Forensic Challenges in Internet of Things (IoT)

​Albert Quist 

dx.doi.org/10.22624/AIMS/CRP-BK3-P20

​

Integration of Cloud in Mobile Forensics

Michael  Acquah  Stuff

dx.doi.org/10.22624/AIMS/CRP-BK3-P21

​

Image-assisted Biometric Identification

Rasheed Abubakar Ayanaba

dx.doi.org/10.22624/AIMS/CRP-BK3-P22

​

Collecting Digital Data with the Assurance of Integrity

Gilbert Sam

dx.doi.org/10.22624/AIMS/CRP-BK3-P23

​

Forensic Analysis of Electronic Mail Messages

Eugene Marfo Akoto

dx.doi.org/10.22624/AIMS/CRP-BK3-P24

​

Communication Protocol for Forensic Analysis

Worthy Elijah

​

Evidence Confidentiality and Digital Forensic Experts

John Kwaku Oppong

dx.doi.org/10.22624/AIMS/CRP-BK3-P26

​

Application Information for Forensic Analysis Considerations for Registered Host / Users /Device Name & Bearer Tokens

Rosemond O. Addo-Sampong 

dx.doi.org/10.22624/AIMS/CRP-BK3-P27

​

Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations

Aliloulaye Tchaou

dx.doi.org/10.22624/AIMS/CRP-BK3-P28

​

5G Cellular Network Forensics

Edwin Angmor Kofi Ohipeni

dx.doi.org/10.22624/AIMS/CRP-BK3-P29

​

Evidence Based Reconstruction for Digital Forensics

Ellen Akongwin Abanga

dx.doi.org/10.22624/AIMS/CRP-BK3-P30

​

Liabilities of Shared System in Forensic Analysis

Eric Sowah Badger

dx.doi.org/10.22624/AIMS/CRP-BK3-P31

​

A Review of Attacker Attribution

Ferdinand Kpieleh

dx.doi.org/10.22624/AIMS/CRP-BK3-P32

​

Analysing Network Information and Protocol Using Wireshark

Theophilus Botchway

dx.doi.org/10.22624/AIMS/CRP-BK3-P33

​

The Dark Web – A Review

Stanley Okyere-Agyei

dx.doi.org/10.22624/AIMS/CRP-BK3-P34

​

Current and Future Trends In Mobile Device Forensics

​Godwin Anyomi

dx.doi.org/10.22624/AIMS/CRP-BK3-P35

​

Forensic Analysis on Streaming Multimedia

Emmanuel Tettey Okan

dx.doi.org/10.22624/AIMS/CRP-BK3-P36

​

Smartphone RSS Traces For Forensic Analysis

Roselyn Abena Terbie Hammond

dx.doi.org/10.22624/AIMS/CRP-BK3-P37

​

A Review of Cloud Forensics

Alex Appiah Eshun

​

Digital Forensics In Multimedia

Frey John Wisdom

dx.doi.org/10.22624/AIMS/CRP-BK3-P39

​

download (1).jpg
law.jpg
6.jpg
images (1).jpg
images.jpg
download (2).jpg
download (2).jpg

Creative Research Publishing Group

Society for Multidisciplinary & Advanced Research Techniques in Africa 

E-Mail: info@isteams.net 

​

Creative logo.JPG

Reseach Nexus Africa 

bottom of page