conference logo

ECCE2006 - e-crime and computer evidence 2006

Menu

Home
Call for papers
Dakota Hotel
Programme
Registration



Valid XHTML 1.0 Transitional





ECCE 2006 - conference Programme

12th

13th

14th

09:00

Registration

Registration

Recovery from conference dinner ?

09:30

Corporate ID Theft : an examination of means and opportunities.

[G.N. Moor, University of Teesside]

Street crime detection and monitoring methods, can these be transferred to the internet in order to give a set of guide lines for cyber crime investigation

[A.M. Zeus-Brown, University of Teesside]

Problems of Privacy, Security, Identity, Integrity, Legality and Confidentiality in Internet Crime investigation and evidence collection

[S. Prior, University of Hull]

10:10

How Criminals can exploit Internet Auction Sites

[B.C. Tompsett, University of Hull]

Non-Forensic Acquisition of Transactional Data]

[C. Fletcher, LECG]

Phishing, Pharming and ID Theft : A review

[J. Care]

10:50

Coffee

Coffee

Coffee

11:15

Voice over Internet Protocol (VoIP) Telephony: Potential for Criminal Misuse

[P. Gladyshev & P. Gillen, University College Dublin]

Data Fusion-The Emerging Solution in Computer Forensic Analysis

[S. Satpathy, Utkal University]

The Pedagogical Design of a Computer Forensics Curriculum

[A. Irons and P. Anderson, Northumbria University]

11:55

Forensic Investigation of Personal Digital Assistants (PDAs)

[A. Goode, Forensic Telecommunications Ltd.]

Method for the Structured Documentation of IT Incident Management

[S. Frings, Fraunhofer Institute]

Animated Evidence: Bringing Digital Data to Life

[D. Schofield & J. March, University of Nottingham]

12:35

Lunch

Lunch

Lunch

13:35

[Extended Paper/Seminar]

Contemporary Digital Evidence IN Indian Context - A Forensic Aproach for the Investigating Agencies

[Asim Kumar Srivastava, Central Forensic Science Lab]

[Extended Paper/Seminar]

The Role of Computer Forensics in Social Engineering - an Insight

[P.N.Ramakrishnan, Central Forensic Science Lab]

[Workshop]

Digital Forensic Laboratory


[A. Clarkson, Western Governors University & M. Svetlik, Risk Analysis Consultants]

15:05

Coffee

Coffee

15:30

Do logfiles actually count in court? A legal and techincal surevy of the latest Italian court decisions

[Andrea Monti, Universita' di Chieti & Stephen A. Firth - Firth Consulting, UK]

European arrest warrant and international cybercrime

[N. Foggetti, University of Bari]

Coffee & discussions

16:10

KeyLogging Case Study

[Chris Vaughan, CY4OR Ltd]

Call centre fraud: A Network Activity Case study

[I. Henderson, Advanced Forensics]

Closing remarks

16:50

Close of day

Model for Cyber Crime Monitoring and Control in Nigeria

[ Mike Awoleye and Willie O. Siyanbola, National Centre for Technology Management (NACETEM) Nigeria ]

Close of conference

19:00-late

Conference Dinner
(Transport provided from/to hotel)