top of page
IMG-20220606-WA0038.jpg

Creative Research Publishers

      www,isteams.net/itlawbookchapters  info@isteams.net     +18576007570

Book Chapter Project 

Book Chapter Project 

DOI-Crossref.png
download (1).jpg

   Collaborating Entities, Institutions, Partners  & Affiliations 

 

  • Graduate Students - IT & Law Course - Ghana Institute of Management & Public Administration 

  • Society for Multidisciplinary & Advanced Research Techniques (SMART) Africa 

  • Faculty of Computational Sciences - Academic City University College, Accra, Ghana

  • IEEE Nigeria Section Computer Society

  • The ICT University Foundations

  • CRACC - American University West Africa, The Gambia 

       Published by Creative Research Publishers and Indexed in CrossREF with DOIs assigned

        Further Indexed in Google Scholar, Semantic Scholar, Academia.edu

 

GIMPA.png
ICT-U Foundations.JPG
image 1.png

Words from the Editorial Team  Lead 

olumide_edited.jpg

It is my honor to have created the traction and motivation that led to the compilation of these chapters from the Class of brilliant and highly effective students from the IT & Law and Cyber Security and Forensics Programme at the Ghana Institute for Management & Public Administration.  Africa's contribution to discourses in a divergent and increasingly multidisciplinary domain of  Cyber Security, Law, IT and Forensics must be captured and succinctly presented to showcase the prowess of the african technocrats in contributing to global discourses.   I  welcome readers to peruse the chapters and take advantage of the dynamic subject contents addressed  by this book. Comments, contributions and rejoinders are appreciated 

Prof Longe Olumide  Babatope  (FASI)

Adjunct Professor -  School of Technology

Ghana Institute of Management & Public Administration

Dean - Faculty of Computational Sciences & Informatics

Academic City University College, Accra, Ghana

Distinguished Fulbright, UI-McArthur & HLF Germany Fellow

Senior Member IEEE - Chair IEEE Nigeria Computer Society

      ABOUT THE BOOK                                                                                

This book titled Research Nexus in IT, Law, Cyber Security and Forensics focuses on issue, concepts, principles and practices  at the watershed of the multidisciplinarity  of the subjects of discourse at addressing the malaise of Cyber crime, jurisdiction, technologies, advancement in forensic Sciences as well as the evolution of digital evidence and legal Informatics. Metamorphosing from a general class candidate research on a course of study  of Legal Aspects of IT taken at the postgraduate level at the Ghana Institute of Management and Public Administration, the contributors addresses themes covering advances in technological artifacts and design in the domain,    misuse of personal Information,  technological challenges  mitigating evidence gathering, aspects of legal responsibilities, evidence gathering,  intermediary liabilities, advances in cryptography and steganographic schemes,  responsible adoption of disruptive technologies, aspects of computational Law and techno-legal reasoning as a well as broad coverage of Cyber Security and Forensics from .the theoretical, practical, frameworks nd design. In addition, these perspectives were presented with recommendations for policies, practices and policies for Africa. The book therefore serves as a reference material for practitioners, experts, technocrats, students, policy makers as well as other interested readers and enthusiasts approaching the subject coverage for a variety of usage and purpose.

BOOK Editors

  • Prof. Olumide B. Longe  – Co-ordinating and Acquisition Editor

          Professor & Dean, Academic City University College, Accra, Ghana

  • Prof. Edward Santiago Blaise, DBA, ITIL, MPM

         State University of New York – Sullivan College, Liberty New York

  • Prof. Princely Ifinedo 

         Professor of Information Systems, Brock University, St. Catherines, Canada  

  • Dr. Asani Tobiloba. Emmanuel

          Landmark University, Omu-Aran, Nigeria

  • Dr. Waheed Olanipekun

          Director CRACC - American International University West Africa, The Gambia

Associate Editors

  • Joseph Budu PhD   

          Ghana Institute of Management and Public Administration (GIMPA)

Enquiries

Direct all enquiries to onge.olumide@ieee.org, longeolumide@fulbrightmail.org

profolumidegimpa@gmail.com

  Chapters  Published and  Included in Book Project                            

Bitcoins Usage By Cybercriminals –  Evolution And Current Mitigating Approaches

Daniel Tibina Apuri 

dx.doi.org/10.22624/AIMS/CRP-BK3-P40

Analysis of Attack Intention Recognition

Tsatsu K. Sabblah

dx.doi.org/10.22624/AIMS/CRP-BK3-P41

A Survey Of Packet Analysis For Network Forensics

Michael Kodjo Agorsah

dx.doi.org/10.22624/AIMS/CRP-BK3-P42

Mobile Device’s Digital Forensic Process Model 

Bismark Boateng

dx.doi.org/10.22624/AIMS/CRP-BK3-P43

Net-Force for Email Tracing

Nana Kwame Kwakye

dx.doi.org/10.22624/AIMS/CRP-BK3-P44

Biometric Spoofing and Deepfake Detection

Yaw Amoah-Yeboah

dx.doi.org/10.22624/AIMS/CRP-BK3-P45

Tools for Cyber Forensics 

Peter Oppong Baafi 

dx.doi.org/10.22624/AIMS/CRP-BK3-P46

Internet of Things (IoT) & Underwater Network Forensics

Timothy Kwaku

dx.doi.org/10.22624/AIMS/CRP-BK3-P47

Attack Intention Recognition Technique

Terry Kwaku Boateng

dx.doi.org/10.22624/AIMS/CRP-BK3-P48

Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness

Jonas Takyi Asamoah

dx.doi.org/10.22624/AIMS/CRP-BK3-P49

Mobile/Telephone Contacts and Calls In Forensics Analysis

Samuel Opoku Daniels

dx.doi.org/10.22624/AIMS/CRP-BK3-P50

Deep Learning (DL) Oriented Forensic Analysis

Herbert Cyril Dodoo

dx.doi.org/10.22624/AIMS/CRP-BK3-P51

Effective ways of Carrying Out Network Autopsy

Louis Opoku Gyamfi

dx.doi.org/10.22624/AIMS/CRP-BK3-P52

Libforensics For Developing Digital Forensics Applications

James Hebidzi Senanu

dx.doi.org/10.22624/AIMS/CRP-BK3-P53

Cloud Computing Forensic Challenges for Law Enforcement

Samuel Opuni Boateng

dx.doi.org/10.22624/AIMS/CRP-BK3-P54

Security Measures Against Malware, Botnets & Ransomware

Joseph Antwi Attoh

dx.doi.org/10.22624/AIMS/CRP-BK3-P55

X-Ways Forensics Platform For Digital Forensics Examiners

Seth Adjei Gyimah

dx.doi.org/10.22624/AIMS/CRP-BK3-P56

Digital Forensic and Distributed Evidence

Emmanuel Kpakpo Brown

dx.doi.org/10.22624/AIMS/CRP-BK3-P57

Deleted Data Recovery Mechanisms

Ephraim Mawutor Adehenu

dx.doi.org/10.22624/AIMS/CRP-BK3-P58

Device Information for Forensic Analysis

Paul Antwi

dx.doi.org/10.22624/AIMS/CRP-BK3-P59

  Chapters  Published and  Included in Book Project                            

 

Forensic Detection through the Identification and Collection of Data for Analysis

Joshua Wemegah

dx.doi.org/10.22624/AIMS/CRP-BK3-P1

Storing Forensic Data Against Interference

Amenuveve Gracious Adzogbley

dx.doi.org/10.22624/AIMS/CRP-BK3-P2

Understanding Advanced Persistent Threats

Akuffo-Badoo Erastus B.

dx.doi.org/10.22624/AIMS/CRP-BK3-P3

Improving Image Interpretation in Digital Forensics

Jonathan Gasokpo Adjorlolo

dx.doi.org/10.22624/AIMS/CRP-BK3-P4

Inaccessibility of Services as a Threat to Forensic Analysis

Maxwell Amparbeng

dx.doi.org/10.22624/AIMS/CRP-BK3-P5

Weak Credential Information as a Threat to Online Security

Cyprian Danso Darko

dx.doi.org/10.22624/AIMS/CRP-BK3-P6

Cyberterrorism Using Smart Phones

Tseh Richard Divine

dx.doi.org/10.22624/AIMS/CRP-BK3-P7

Analysing and Reconstructing Data for Forensic Inference and Conclusion

Rufus Larbi Okyere

dx.doi.org/10.22624/AIMS/CRP-BK3-P8

SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.

Francis Wodugah

dx.doi.org/10.22624/AIMS/CRP-BK3-P9

Random Data Loss and Theft in Cyberspace

Eric Ofosu Asare

A Review of Credential Stuffing

Ebenezer Tetteh Nanor

Mitigating Electromagnetic Side-Channel Attacks

Amankwah Attah

dx.doi.org/10.22624/AIMS/CRP-BK3-P12

Multi-Factor Authentication for Online Security of Android Devices

Benjamin Baafi

dx.doi.org/10.22624/AIMS/CRP-BK3-P13

Digital Multimedia Tampering Detection for Forensics Analysis

Bernard Mainoo

dx.doi.org/10.22624/AIMS/CRP-BK3-P14

 

Packet Analysis for Network Forensics

Asiedu Francis

dx.doi.org/10.22624/AIMS/CRP-BK3-P15

Host-Based Forensic – Analyzing Criminal Action Using Computer-Based Data

Richard Sefah Kwame

dx.doi.org/10.22624/AIMS/CRP-BK3-P16

Information Security Incident Handling in the Cloud

Abraham Sackey

dx.doi.org/10.22624/AIMS/CRP-BK3-P17

Privacy Preserving Internet of Things (IoT) Forensics

Frederick Asumang Odame

dx.doi.org/10.22624/AIMS/CRP-BK3-P18

Internet Service Providers and Intermediary Liabilities
Anna Asunka

Digital Forensic Challenges in Internet of Things (IoT)

Albert Quist 

dx.doi.org/10.22624/AIMS/CRP-BK3-P20

Integration of Cloud in Mobile Forensics

Michael  Acquah  Stuff

dx.doi.org/10.22624/AIMS/CRP-BK3-P21

Image-assisted Biometric Identification

Rasheed Abubakar Ayanaba

dx.doi.org/10.22624/AIMS/CRP-BK3-P22

Collecting Digital Data with the Assurance of Integrity

Gilbert Sam

dx.doi.org/10.22624/AIMS/CRP-BK3-P23

Forensic Analysis of Electronic Mail Messages

Eugene Marfo Akoto

dx.doi.org/10.22624/AIMS/CRP-BK3-P24

Communication Protocol for Forensic Analysis

Worthy Elijah

Evidence Confidentiality and Digital Forensic Experts

John Kwaku Oppong

dx.doi.org/10.22624/AIMS/CRP-BK3-P26

Application Information for Forensic Analysis Considerations for Registered Host / Users /Device Name & Bearer Tokens

Rosemond O. Addo-Sampong 

dx.doi.org/10.22624/AIMS/CRP-BK3-P27

Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations

Aliloulaye Tchaou

dx.doi.org/10.22624/AIMS/CRP-BK3-P28

5G Cellular Network Forensics

Edwin Angmor Kofi Ohipeni

dx.doi.org/10.22624/AIMS/CRP-BK3-P29

Evidence Based Reconstruction for Digital Forensics

Ellen Akongwin Abanga

dx.doi.org/10.22624/AIMS/CRP-BK3-P30

Liabilities of Shared System in Forensic Analysis

Eric Sowah Badger

dx.doi.org/10.22624/AIMS/CRP-BK3-P31

A Review of Attacker Attribution

Ferdinand Kpieleh

dx.doi.org/10.22624/AIMS/CRP-BK3-P32

Analysing Network Information and Protocol Using Wireshark

Theophilus Botchway

dx.doi.org/10.22624/AIMS/CRP-BK3-P33

The Dark Web – A Review

Stanley Okyere-Agyei

dx.doi.org/10.22624/AIMS/CRP-BK3-P34

Current and Future Trends In Mobile Device Forensics

​Godwin Anyomi

dx.doi.org/10.22624/AIMS/CRP-BK3-P35

Forensic Analysis on Streaming Multimedia

Emmanuel Tettey Okan

dx.doi.org/10.22624/AIMS/CRP-BK3-P36

Smartphone RSS Traces For Forensic Analysis

Roselyn Abena Terbie Hammond

dx.doi.org/10.22624/AIMS/CRP-BK3-P37

A Review of Cloud Forensics

Alex Appiah Eshun

Digital Forensics In Multimedia

Frey John Wisdom

dx.doi.org/10.22624/AIMS/CRP-BK3-P39

download (1).jpg
law.jpg
6.jpg
images (1).jpg
images.jpg
download (2).jpg
download (2).jpg

Creative Research Publishing Group

Society for Multidisciplinary & Advanced Research Techniques in Africa 

E-Mail: info@isteams.net 

Creative logo.JPG

Reseach Nexus Africa 

bottom of page