The Offense and Defense of Criminal Digital Evidence Authentication

碩士 === 東吳大學 === 法律學系 === 95 === ABSTRACT The Offense and Defense of Criminal Digital Evidence Authentication By CHIU, HSIEN-MING ADVISOR: P-LONG LIN, Ph. D. DEPARTMENT: Soo Chow University Law Department MAJOR: Technology Law of Law Department DEGREE: MASTER OF LAW After years engaging in criminal...

Full description

Bibliographic Details
Main Authors: Hsien-ming Chiu, 邱獻民
Other Authors: P-LONG LIN
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/13714486278404634338
id ndltd-TW-095SCU05194043
record_format oai_dc
spelling ndltd-TW-095SCU051940432015-10-13T16:55:43Z http://ndltd.ncl.edu.tw/handle/13714486278404634338 The Offense and Defense of Criminal Digital Evidence Authentication 刑事數位證據同一性之攻擊與防禦 Hsien-ming Chiu 邱獻民 碩士 東吳大學 法律學系 95 ABSTRACT The Offense and Defense of Criminal Digital Evidence Authentication By CHIU, HSIEN-MING ADVISOR: P-LONG LIN, Ph. D. DEPARTMENT: Soo Chow University Law Department MAJOR: Technology Law of Law Department DEGREE: MASTER OF LAW After years engaging in criminal investigation cases, I’ve found that most law enforcements and lawyers only have legal background. Whether dealing with computers, internet or financial crime cases, if they want to hit the mark core of the problem, often need to spend a lot of time establishing the basic concept, so they are able to analyze the evidences provided by parties or law enforcements. In view of this, it is inevitable to contact digital evidences in the process of investigation. I tried to bring up how to attack and challenge digital evidence in court and how to defense and consolidate the evidence of admissibility and the weight of the evidence. I hope to provide the direction of thinking about these issues for law enforcements and academics. The framework of abstract is categorized in six chapters. The main content is as follows: Chapter 1 Introduction The motivation, range, methods and framework of research conducting are explained in this chapter. Chapter 2 Digital Evidence The chapter introduces significance, characteristics and types of digital evidence. Chapter 3 The Status of Digital Evidence in the Evidence Act I take the domestic literature as the main axle and explain digital evidence classify, the evidence method, evidence ability in the evidence act. Because digital evidence is different to other traditional evidence styles, we must discuss whether digital evidences can be allowed in court and then draw out the relevance of the evidence of admissibility and the weight of the evidence to digital evidence authentication. I introduce different opinions and views about these issues. Chapter 4 The procedure of Forensic and Preservation of Digital Evidence According to the introduction of characteristics of digital evidences in Chapter 3, we can realize that all of digital evidences are floating and unstable. So how to ensure these digital evidences collected in the investigation procedure and then submitted to the court is identifiable. Therefore, i propose that how to establish trustworthy and stringent procedure about forensic and preservation of digital evidence. Chapter 5 The Offense and Defense of Criminal Digital Evidence Authentication This chapter is the core of the essay. This chapter introduces various types of digital evidence and the technology of digital evidence. And then I try to bring up how to attack and challenge the digital evidence ,and offer all kinds of methods to defense and consolidate the evidence of admissibility and the weight of the evidence. Chapter 6 Conclusion and Proposal In this chapter, the statements in each chapter have been concluded. Moreover, the possible legislative propositions are claimed by author. P-LONG LIN 林宜隆 2007 學位論文 ; thesis 171 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 東吳大學 === 法律學系 === 95 === ABSTRACT The Offense and Defense of Criminal Digital Evidence Authentication By CHIU, HSIEN-MING ADVISOR: P-LONG LIN, Ph. D. DEPARTMENT: Soo Chow University Law Department MAJOR: Technology Law of Law Department DEGREE: MASTER OF LAW After years engaging in criminal investigation cases, I’ve found that most law enforcements and lawyers only have legal background. Whether dealing with computers, internet or financial crime cases, if they want to hit the mark core of the problem, often need to spend a lot of time establishing the basic concept, so they are able to analyze the evidences provided by parties or law enforcements. In view of this, it is inevitable to contact digital evidences in the process of investigation. I tried to bring up how to attack and challenge digital evidence in court and how to defense and consolidate the evidence of admissibility and the weight of the evidence. I hope to provide the direction of thinking about these issues for law enforcements and academics. The framework of abstract is categorized in six chapters. The main content is as follows: Chapter 1 Introduction The motivation, range, methods and framework of research conducting are explained in this chapter. Chapter 2 Digital Evidence The chapter introduces significance, characteristics and types of digital evidence. Chapter 3 The Status of Digital Evidence in the Evidence Act I take the domestic literature as the main axle and explain digital evidence classify, the evidence method, evidence ability in the evidence act. Because digital evidence is different to other traditional evidence styles, we must discuss whether digital evidences can be allowed in court and then draw out the relevance of the evidence of admissibility and the weight of the evidence to digital evidence authentication. I introduce different opinions and views about these issues. Chapter 4 The procedure of Forensic and Preservation of Digital Evidence According to the introduction of characteristics of digital evidences in Chapter 3, we can realize that all of digital evidences are floating and unstable. So how to ensure these digital evidences collected in the investigation procedure and then submitted to the court is identifiable. Therefore, i propose that how to establish trustworthy and stringent procedure about forensic and preservation of digital evidence. Chapter 5 The Offense and Defense of Criminal Digital Evidence Authentication This chapter is the core of the essay. This chapter introduces various types of digital evidence and the technology of digital evidence. And then I try to bring up how to attack and challenge the digital evidence ,and offer all kinds of methods to defense and consolidate the evidence of admissibility and the weight of the evidence. Chapter 6 Conclusion and Proposal In this chapter, the statements in each chapter have been concluded. Moreover, the possible legislative propositions are claimed by author.
author2 P-LONG LIN
author_facet P-LONG LIN
Hsien-ming Chiu
邱獻民
author Hsien-ming Chiu
邱獻民
spellingShingle Hsien-ming Chiu
邱獻民
The Offense and Defense of Criminal Digital Evidence Authentication
author_sort Hsien-ming Chiu
title The Offense and Defense of Criminal Digital Evidence Authentication
title_short The Offense and Defense of Criminal Digital Evidence Authentication
title_full The Offense and Defense of Criminal Digital Evidence Authentication
title_fullStr The Offense and Defense of Criminal Digital Evidence Authentication
title_full_unstemmed The Offense and Defense of Criminal Digital Evidence Authentication
title_sort offense and defense of criminal digital evidence authentication
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/13714486278404634338
work_keys_str_mv AT hsienmingchiu theoffenseanddefenseofcriminaldigitalevidenceauthentication
AT qiūxiànmín theoffenseanddefenseofcriminaldigitalevidenceauthentication
AT hsienmingchiu xíngshìshùwèizhèngjùtóngyīxìngzhīgōngjīyǔfángyù
AT qiūxiànmín xíngshìshùwèizhèngjùtóngyīxìngzhīgōngjīyǔfángyù
AT hsienmingchiu offenseanddefenseofcriminaldigitalevidenceauthentication
AT qiūxiànmín offenseanddefenseofcriminaldigitalevidenceauthentication
_version_ 1717776885498249216