International Journal of Academic Research in Business and Social Sciences

search-icon

The Modern Scientific Proofs and their Authenticity in Criminal Evidence: Literature Review

Open access
This research seeks to review the growing literature on modern criminal evidence and the role of technological advancement in forensic science. We reviewed 114 forensic science studies based on a systematic literature review approach. The studies provide supporting evidence that technological advancement has permitted improved progress on modern criminal evidence. The analysis cybercrime and related offenses pose a global danger to many private and corporate entities around the world. Some nations (e.g., Algeria) have adopted the notion of proof-free prosecution, which means that there is no exception to the rule in modern criminal legislation comparison as a result of the necessity to adapt and cope with changes in all parts of one's existence. Also, conventional crimes, such as fraud and money laundering, have been creatively changed into new forms by the rising popularity of the Internet. Fruitful directions for further studies and implications for policymakers were discussed.
Al-Alawi, A. I., Al-Faresi, R. K. E., & Abdel-Razek, R. H. (2015). Evaluating the effectiveness of biometric technologies in controlling the border ports of the state of Kuwait. Proceedings of the 25th International Business Information Management Association Conference - Innovation Vision 2020: From Regional Development Sustainability to Global Economic Growth, IBIMA 2015, 2016, 1335–1352. https://doi.org/10.5171/2016.542264
Al-Dahhan, W., Hashim, H., Yousif, E., & Alkaim, A. F. (2020). Lipsticks Elemental Analysis by Energy Dispersive X-Ray Used as Criminal Evidence. Indian Journal of Forensic Medicine & Toxicology, 14(3).
Al Madani, O. M., Kharoshah, M. A. A., Zaki, M. K., Galeb, S. S., Al Moghannam, S. A., & Moulana, A. A. R. (2012). Origin and development of forensic medicine in the Kingdom of Saudi Arabia. American Journal of Forensic Medicine and Pathology, 33(2), 147–151. https://doi.org/10.1097/PAF.0b013e318221b895
Ask, K., Rebelius, A., & Granhag, P. A. (2008). The ‘elasticity’of criminal evidence: A moderator of investigator bias. Applied Cognitive Psychology: The Official Journal of the Society for Applied Research in Memory and Cognition, 22(9), 1245–1259.
https://doi.org/https://doi.org/10.1002/acp.1432
Ask, Karl, Reinhard, M. A., Marksteiner, T., & Granhag, P. A. (2011). Elasticity in evaluations of criminal evidence: Exploring the role of cognitive dissonance. Legal and Criminological Psychology, 16(2), 289–306. https://doi.org/10.1348/135532510X510153
Biber, K. (2013). In crime’s archive: The cultural afterlife of criminal evidence. British Journal of Criminology, 53(6), 1033–1049. https://doi.org/10.1093/bjc/azt049
Biber, K. (2018). Evidence in the museum: Curating a miscarriage of justice. Theoretical Criminology, 22(4), 505–522. https://doi.org/10.1177/1362480617707950
Block, J. H., & Fisch, C. (2020). Eight tips and questions for your bibliographic study in business and management research. Management Review Quarterly, 70(3), 307–312. https://doi.org/10.1007/s11301-020-00188-4
Brockman, B., & Humphreys, M. (1998). Criminal evidence (Amendment) Act 1997. Compromised ethics: Consequences of compulsory DNA sampling from psychiatric patients. Journal of Forensic Psychiatry, 9(2), 245–247.
https://doi.org/10.1080/09585189808402194
Brownlee, I. (1998). Taking DNA samples without consent from mentally disordered offenders: The impact of Home Office Circular 27/1997. Journal of Forensic Psychiatry, 9(2), 413–423. https://doi.org/10.1080/09585189808402207
Chalfin, A., & McCrary, J. (2017). Criminal deterrence: A review of the literature. Journal of Economic Literature, 55(1), 5–48. https://doi.org/10.1257/jel.20141147
Chen, S., & Leung, H. (2005). A Chaotic Authentication Technique for Digital Video Surveillance. Proceedings. (ICASSP ’05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., 2, 533–536.
https://doi.org/10.1109/ICASSP.2005.1415459
Ellison, L., & Munro, V. E. (2014). A “Special” Delivery? Exploring the Impact of Screens, Live-Links and Video-Recorded Evidence on Mock Juror Deliberation in Rape Trials. Social and Legal Studies, 23(1), 3–29. https://doi.org/10.1177/0964663913496676
Grigaliunas, Š., & Toldinas, J. (2020). Habits attribution and digital evidence object models based tool for cybercrime investigation. Baltic Journal of Modern Computing, 8(2), 275–292. https://doi.org/10.22364/BJMC.2020.8.2.05
Grose, V. L. (2013). Aircraft Flight Data Recorders. In Encyclopedia of Forensic Sciences: Second Edition (2nd ed.). Elsevier Ltd. https://doi.org/10.1016/B978-0-12-382165-2.00129-X
Gudjonsson, G., & Mackeith, J. (1994). Learning Disability and the Police and Criminal Evidence Act 1984. Protection During Investigative Interviewing: A Video-Recorded False Confession to Double Murder. Journal of Forensic Psychiatry, 5(1), 35–49. https://doi.org/10.1080/09585189408410896
Hall, M. (2007). The use and abuse of special measures: Giving victims the choice? Journal of Scandinavian Studies in Criminology and Crime Prevention, 8(SUPPL. 1), 33–53. https://doi.org/10.1080/14043850701686139
Hazaea, S. A., Zhu, J., Al-Matari, E. M., Senan, N. A. M., Khatib, S. F. A., & Ullah, S. (2021). Mapping of internal audit research in China: A systematic literature review and future research agenda. Cogent Business & Management, 8(1), 1938351. https://doi.org/10.1080/23311975.2021.1938351
Hazaea, S. A., Zhu, J., Khatib, S. F. A., Bazhair, A. H., & Elamer, A. A. (2021). Sustainability assurance practices: a systematic review and future research agenda. Environmental Science and Pollution Research, ahead of p(ahead of print). https://doi.org/10.1007/s11356-021-17359-9
Henderson, H. M., & Lamb, M. E. (2019). Does implementation of reforms authorized in Section 28 of the Youth Justice and Criminal Evidence Act affect the complexity of the questions asked of young alleged victims in court? Applied Cognitive Psychology, 33(2), 201–213. https://doi.org/10.1002/acp.3466
Horvath, M. A. H. (2009). Eyewitness Evidence. Understanding Criminal Investigation, 93–114. https://doi.org/10.1002/9780470682388.ch5
Hsu, C. Y., Kang, L. W., & Mark Liao, H. Y. (2013). Cross-camera vehicle tracking via affine invariant object matching for video forensics applications. Proceedings - IEEE International Conference on Multimedia and Expo.
https://doi.org/10.1109/ICME.2013.6607446
Khan, A. (1984). The police and Criminal Evidence Bill. II. Police Journal, 57(2), 177–192. https://doi.org/10.1177/0032258X8405700209
Khatib, S., Abdullah, D. F., Elamer, A., & Hazaea, S. A. (2022). The Development of Corporate Governance Literature in Malaysia: A Systematic Literature Review and Research Agenda. Corporate Governance International Journal of Business in Society, ahead of p(ahead of print). https://doi.org/10.1108/CG-12-2020-0565
Khatib, S. F. A., Abdullah, D. F., Elamer, A. A., & Abueid, R. (2021). Nudging toward diversity in the boardroom: A systematic literature review of board diversity of financial institutions. Business Strategy and the Environment, 30(2), 985–1002.
https://doi.org/10.1002/bse.2665
Khatib, S. F. A., Abdullah, D. F., Elamer, A., Yahaya, I. S., & Owusu, A. (2021). Global trends in board diversity research?: a bibliometric view. Meditari Accountancy Research, ahead of p(ahead of print). https://doi.org/10.1108/MEDAR-02-2021-1194
Khatib, S. F. A., Abdullah, D. F., Hendrawaty, E., & Elamer, A. A. (2021). A bibliometric analysis of cash holdings literature: current status, development, and agenda for future research. Management Review Quarterly, ahead of p(ahead of print).
https://doi.org/10.1007/s11301-021-00213-0
Lee, J. H., & Park, D. W. (2012). A study on evidence data collection through iPhone forensic. Communications in Computer and Information Science, 310 CCIS, 268–276. https://doi.org/10.1007/978-3-642-32692-9_35
Ligertwood, A. (2013). Forensic science expressions and legal proof. Australian Journal of Forensic Sciences, 45(3), 263–270. https://doi.org/10.1080/00450618.2013.782341
Linnenluecke, M. K., Marrone, M., & Singh, A. K. (2020). Conducting systematic literature reviews and bibliometric analyses. Australian Journal of Management, 45(2), 175–194. https://doi.org/10.1177/0312896219877678
Manova, N. S., Shinkaruk, V. M., & Solovyeva, P. V. (2019). The problems of using electronic information in criminal proof. In In Ubiquitous Computing and the Internet of Things: Prerequisites for the Development of ICT (pp. 77–83). Springer.
Marjuni, S. H., Zain, A. B. M., Mahmod, R., Mustapha, A., & Ghani, A. A. A. (2009). Lexical criminal identification for chatting corpus. Proceedings - 2009 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009, 360–364. https://doi.org/10.1109/ICCSIT.2009.5234700
Mason, S. (2014). Electronic evidence: A proposal to reform the presumption of reliability and hearsay. Computer Law and Security Review, 30(1), 80–84. https://doi.org/10.1016/j.clsr.2013.12.005
Meterko, V., & Cooper, G. (2021). Cognitive Biases in Criminal Case Evaluation: A Review of the Research. Journal of Police and Criminal Psychology, 0123456789. https://doi.org/10.1007/s11896-020-09425-8
Miller, J., Bland, N., & Quinton, P. (2001). A challenge for police-community relations: Rethinking stop and search in England and Wales. European Journal on Criminal Policy and Research, 9(1), 71–93. https://doi.org/10.1023/A:1011271727673
Mohammadi, A., Asgarkhani, A., & Mirabbasi, S. B. (2020). The position of modern biotechnology in proving the violation of the living right as a right to determine the destiny. Journal of Applied Biotechnology Reports, 7(2), 59–62. https://doi.org/10.30491/jabr.2020.107559
Myers, D. (1991). The Computer Game Anti-aesthetic. Play Redux, 31(3), 65–70. https://doi.org/10.2307/j.ctv65swkk.8
Pai, C. Y., Hsieh, L. L., Lee, T. C., Yang, S. B., Linville, J., Chou, S. L., & Yang, C. H. (2006). Mitochondrial DNA sequence alterations observed between blood and buccal cells within the same individuals having betel quid (BQ)-chewing habit. Forensic Science International, 156(2–3), 124–130. https://doi.org/10.1016/j.forsciint.2004.12.021
Rassin, E. (2018). Fundamental failure to think logically about scientific questions: An illustration of tunnel vision with the application of Wason’s Card Selection Test to criminal evidence. Applied Cognitive Psychology, 32(4), 506–511. https://doi.org/10.1002/acp.3417
Robson, J. (2018). ‘Lend me your ears’: An analysis of how voice identification evidence is treated in four neighbouring criminal justice systems. International Journal of Evidence and Proof, 22(3), 218–238. https://doi.org/10.1177/1365712718782989
Ruggeri, S. (2015). Human rights in European criminal law: New developments in European legislation and case law after the lisbon treaty. In Human Rights in European Criminal Law: New Developments in European Legislation and Case Law after the Lisbon Treaty (Issue 1). https://doi.org/10.1007/978-3-319-12042-3
Sahi, A. M., Khalid, H., Abbas, A. F., & Khatib, S. F. A. (2021). The Evolving Research of Customer Adoption of Digital Payment?: Learning from Content and Statistical Analysis of the Literature. Journal of Open Innovation: Technology, Market, and Complexity, 7(4), 1–25. https://doi.org/https://doi.org/10.3390/ joitmc7040230
Senkyire, I. B., & Kester, Q. A. (2019). Validation of Forensic Crime Scene Images Using Watermarking and Cryptographic Blockchain. 2019 ICDSA International Conference on Computer, Data Science and Applications, ICDSA 2019, 2–5. https://doi.org/10.1109/ICDSA46371.2019.9404235
Tahmasebi, M. (2015). A comparative study of criminal evidence in iran and Egypt law. Advances in Environmental Biology, 9(3), 784–790.
Wang, D., Zhou, Z., & Ma, H. (2010). Application of PageRank algorithm in computer forensics. 2010 Second International Conference on Information Technology and Computer Science, 250–253. https://doi.org/10.1109/ITCS.2010.68
Wang, S. J. (2006). Procedural response and digital evidence exposure in information security incidents. Journal of Discrete Mathematical Sciences and Cryptography, 9(3), 417–427. https://doi.org/10.1080/09720529.2006.10698088
Wang, S. J. (2007). Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Computer Standards and Interfaces, 29(2), 216–223. https://doi.org/10.1016/j.csi.2006.03.008
Winne, D. A., Knowles, H. D., Bull, D. R., & Canagarajah, C. N. (2002). Spatial digital watermark for MPEG-2 video authentication and tamper detection. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 4, 3457–3460. https://doi.org/10.1109/icassp.2002.5745398
Winne, D. A., Knowles, H. D., Bull, D. R., & Canagarajah, C. N. (2003). Efficient watermarking system with increased reliability for video authentication. Visual Communications and Image Processing 2003, 5150, 862–871. https://doi.org/10.1117/12.503207
Woods, A. K. (2017). Mutual legal assistance in the digital age. The Cambridge Handbook of Surveillance Law, 659–676. https://doi.org/10.1017/9781316481127.029
Xiu, W., & Li, X. (2014). The design of cybercrime spatial analysis system. ICIST 2014 - Proceedings of 2014 4th IEEE International Conference on Information Science and Technology, 132–135. https://doi.org/10.1109/ICIST.2014.6920348
Zamil, I. A., Ramakrishnan, S., Jamal, N. M., Hatif, M. A., & Khatib, S. F. A. (2021). Drivers of corporate voluntary disclosure: a systematic review. Journal of Financial Reporting and Accounting, ahead of p(ahead of print). https://doi.org/10.1108/JFRA-04-2021-0110
Zhu, W. J., Zhuang, C. Z., Liu, J. W., & Huang, M. (2018). Design of multimodal biometric information management system based on commercial systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Vol. 10996 LNCS. Springer International Publishing. https://doi.org/10.1007/978-3-319-97909-0_21