Skip to main content

Proof of Concept of the Online Neighbourhood Watch System

  • Conference paper
  • First Online:

Abstract

Potential digital evidence captured by an onlooker at a crime scene when stored in a repository can be used during criminal investigations, or as admissible evidence in a court of law. However, to employ the captured and stored potential digital evidence (PDE) some challenges are required to be dealt with, such as, retaining the forensic soundness of the captured PDE, adequate measures to secure the PDE and measures to protect the privacy rights of the PDE uploader (citizens).

In previous work, the authors proposed a conceptual model termed online neighbourhood watch (ONW). The ONW model allows community members to use their mobile devices in capturing PDE, store the captured PDE to a repository to be used in neighbourhood crime investigation in South Africa. But, the focus of this paper is to present a proof of concept of the ONW model. The proof of concept outlines the functional and architectural requirements specifications of the ONW system and evaluates the performance of the underlying functional requirements using mathematical proofs in testing the forensic soundness of the captured and stored PDE. Furthermore, using the information security services mechanisms, the forensic soundness indicators (FSI) are generated. The FSI ensures originality, authenticity and admissibility of PDE from the ONW system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Aker, J.C., Fafchamps, M.: Mobile phone coverage, producer markets: evidence from west africa. World Bank Econ. Rev. lhu006 (2014)

    Google Scholar 

  2. Cohen, F.A.: Digital Forensic Evidence Examination. Fred Cohen and Associates Out of Livermore, 3rd edn. (2009). 9781878109446

    Google Scholar 

  3. Government Gazette: Electronic Communications and Transactions Act, Act 25 of 2002. Technical report, PDF Scanned by Sabinet. Accessed 08 February 2014. South Africa Government Gazette - Legislation- South Africa - National/Acts and Regulations/E/Electronic Communications and Transactions Act No. 25 Of 2002/The Act, August 2002

    Google Scholar 

  4. Hargreaves, C.J.: Assessing the reliability of digital evidence from live investigations involving encryption. Ph.D. thesis, Deartment of Informatics and Sensors, Cranfield University, UK (2009)

    Google Scholar 

  5. Holovaty, A., Kaplan-Moss, J.: The Definitive Guide to Django: Web Development Done Right. Apress (2009)

    Google Scholar 

  6. Klir, G., Yuan, B.: Fuzzy Sets and Fuzzy Logic, vol. 4. Prentice Hall, New Jersey (1995)

    MATH  Google Scholar 

  7. Bass, R.K.L., Clements, P.: Software Architecture in Practice. Part of the SEI Series in Software Engineering Series, 3rd edn. Addison-wesley Professional, USA (2012). ISBN -13: 000-0321815734, ISBN-10: 0321815734

    Google Scholar 

  8. Omeleze, S., Venter, H.S.: Towards a model for acquiring digital evidence using mobile devices. In: Tenth International Network Conference (INC 2014) and WDFIA 2014 Plymouth University, UK, pp. 1–14 (2014)

    Google Scholar 

  9. Omeleze, S., Venter, S.H.: A model for access management of potential digital evidence. In: 10th International Conference on Cyber Warfare and Security (ICCWS), pp. 491–501. CSIR, University of Vender and Academic Conferences Limited (2015)

    Google Scholar 

  10. Pawlak, Z.: Rough set theory and its applications to data analysis. Cybern. Syst. 29(7), 661–688 (1998)

    Article  MATH  Google Scholar 

  11. Charles Pfleeger, P., Pfleeger, S.L.: Security in Computing, 4th edn, pp. 35–43. Prentice Hall Publication, Upper Saddle Rivers (2006). ISBN:0132390779

    MATH  Google Scholar 

  12. Government-Gazette POPI-Act: Privacy and data protection - discussion paper 109 (project 124) - South African law reform commission (2005–2010). Technical report, Accessed 08 August 2014. South Africa Government Gazette - Legislation - South Africa - National/Acts - Privacy and data protection Act No. 4, August 2013

    Google Scholar 

  13. Saleem, S., Popov, O., Dahman, R.: Evaluation of security methods for ensuring the integrity of digital evidence. Institute of Electrical Electronics Engineers (IEEE Xplore Digital Library) (2011)

    Google Scholar 

  14. Schwikkard, P.-J., Van der Merwe, S.E.: Principles of Evidence. Juta and Company Ltd. (2009). ISBN:978 0 7021 79501

    Google Scholar 

  15. Susanto, H., Almunawar, M.N., Tuan, Y.C.: Information security manage-ment system standards: a comparative study of the big five (2011)

    Google Scholar 

Download references

Acknowledgment

This work is based on the research supported wholly or in part by the National Research Foundation of South Africa (Grant Numbers 88211, 89143 and TP13081227420).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stacey Omeleze .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Omeleze, S., Venter, H.S. (2016). Proof of Concept of the Online Neighbourhood Watch System. In: Glitho, R., Zennaro, M., Belqasmi, F., Agueh, M. (eds) e-Infrastructure and e-Services. AFRICOMM 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 171. Springer, Cham. https://doi.org/10.1007/978-3-319-43696-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43696-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-43695-1

  • Online ISBN: 978-3-319-43696-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics