Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Glossary

    • Home
    • Modules
    • American Court System
    • The First Responder and Chain-of-Custody
    • Glossary

    Chain of Custody

    the chronological documentation of the seizure, possession, exchange, analysis, and dissolution of evidence in the criminal justice system.

    Computer Forensics

    “the preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.

    Digital Forensics

    the application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation (Zatyko, 2007).

    Forensics

    the application of science to solve a legal problem.

    McDonaldization Theory

    the evidence of rational operations in modern organizational bureaucracies, based on the precepts of (i)efficiency, (ii) calculability and (iii) predictability.

    Hash value

    a unique algorithm that mirrors the path for an electronic file.

    Panopticon

    a circular watch tower in a prison complex

    Stored Communications Act – – (SCA, codified at 18 U.S.C. Chapter 121 §§ 2701–2712)

    a law that addresses voluntary and compelled disclosure of “stored wire and electronic communications and transactional records” held by third-party internet service providers (ISPs).

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved