Benefits and risks of implementing cloud-based technology for child sexual abuse investigations in Australia
Transitioning to cloud-based infrastructure (CBI) for processing child sexual abuse material (CSAM) collected during police investigations could address resource challenges agencies currently face. While CBI provides quantifiable scalability and budgetary and inter-agency collaborative advantages, p...
Autor principal: | |
---|---|
Otros Autores: | ; ; ; ; ; ; |
Tipo de documento: | Electrónico Artículo |
Lenguaje: | Inglés |
Publicado: |
2024
|
En: |
Trends & issues in crime and criminal justice
Año: 2024, Páginas: 1-18 |
Acceso en línea: |
Volltext (kostenfrei) |
Journals Online & Print: | |
Verificar disponibilidad: | HBZ Gateway |
Palabras clave: |
MARC
LEADER | 00000naa a22000002c 4500 | ||
---|---|---|---|
001 | 1919689737 | ||
003 | DE-627 | ||
005 | 20250313150626.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250313s2024 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.52922/ti77550 |2 doi | |
035 | |a (DE-627)1919689737 | ||
035 | |a (DE-599)KXP1919689737 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Westlake, Bryce |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Benefits and risks of implementing cloud-based technology for child sexual abuse investigations in Australia |c Bryce Westlake, Russell Brewer, Kellie Toole, Tom Daly, Thomas Swearingen, Scott Fletcher, Franco Ucci and Katie Logos |
264 | 1 | |c 2024 | |
300 | |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Literaturverzeichnis: Seite 14-16 | ||
520 | |a Transitioning to cloud-based infrastructure (CBI) for processing child sexual abuse material (CSAM) collected during police investigations could address resource challenges agencies currently face. While CBI provides quantifiable scalability and budgetary and inter-agency collaborative advantages, potential risks associated with data security, data sovereignty, and various legal and regulatory concerns may make agencies hesitant to make this transition. However, this paper demonstrates how a ‘shared responsibility model’ approach to cloud security can minimise risks, allowing investigators to take advantage of CBI benefits. In partnership with Oracle Corporation, we demonstrate how this could be implemented and continually monitored for new vulnerabilities within a CSAM context over time. | ||
650 | 4 | |a Child sexual exploitation material | |
650 | 4 | |a Investigations | |
650 | 4 | |a Peer-reviewed | |
650 | 4 | |a risk factors | |
650 | 4 | |a Risk Management | |
650 | 4 | |a Technology | |
700 | 1 | |a Brewer, Russell |e VerfasserIn |0 (DE-588)1059899779 |0 (DE-627)798983620 |0 (DE-576)408649518 |4 aut | |
700 | 1 | |a Toole, Kellie |e VerfasserIn |4 aut | |
700 | 1 | |a Daly, Tom |e VerfasserIn |4 aut | |
700 | 1 | |a Swearingen, Thomas |e VerfasserIn |4 aut | |
700 | 1 | |a Fletcher, Scott |e VerfasserIn |4 aut | |
700 | 1 | |a Ucci, Franco |e VerfasserIn |4 aut | |
700 | 1 | |a Logos, Katie |e VerfasserIn |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Trends & issues in crime and criminal justice |d Canberra : AIC, 1986 |g (2024), Artikel-ID 699, Seite 1-18 |h Online-Ressource |w (DE-627)326645934 |w (DE-600)2041616-7 |w (DE-576)098304925 |x 1836-2206 |7 nnas |
773 | 1 | 8 | |g year:2024 |g elocationid:699 |g pages:1-18 |
856 | 4 | 0 | |u https://doi.org/10.52922/ti77550 |x Resolving-System |z kostenfrei |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4686529409 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1919689737 | ||
LOK | |0 005 20250313150626 | ||
LOK | |0 008 250313||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-21-110 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a krzo | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |