Abstract
Mazkur maqolada elektron ma’lumotlarning kriminalistik ahamiyati, ularning texnologik xususiyatlari hamda potensial dalil manbalari sifatida tutgan o‘rni tahlil etilgan. Axborot-kommunikatsiya texnologiyalarining jadal rivojlanishi sharoitida elektron dalillar jinoyatlarni sodir etish, yashirish va fosh etishda muhim rol o‘ynayotgani asoslab berilgan. Tadqiqotda elektron ma’lumotlarning an’anaviy moddiy dalillardan farqli jihatlari, ularni to‘plash, saqlash, tekshirish va baholash jarayonlarida yuzaga keladigan muammolar ko‘rib chiqilgan. Xususan, elektron qurilmalarning asosiy komponentlari — markaziy protsessor (CPU), dasturiy ta’minot, tizim soati, xotira va saqlash vositalarining elektron dalillar shakllanishiga ta’siri ilmiy asosda yoritilgan. Shuningdek, vaqt belgilarining (time stamp) kriminalistik ahamiyati, ularning aniqligi va noto‘g‘ri sozlanishining tergov xulosalariga ta’siri tahlil qilingan. Elektron dalillarni aniqlash, tiklash va baholash jarayonida yuzaga keladigan texnik va protsessual muammolar, jumladan yo‘qolgan ma’lumotlarni qayta tiklash hamda ularning ishonchliligini baholash masalalari yoritilgan. Tadqiqot natijasida elektron dalillarni baholashda texnologik xususiyatlarni chuqur tahlil qilish zarurligi, shuningdek, tergov amaliyotida maxsus bilim va yondashuvlardan foydalanish muhimligi asoslab berilgan.
References
1. Mason, S., & Seng, D. (Eds.). (2017). Electronic Evidence (4th ed.). University of London Press. p. 1 http://www.jstor.org/stable/j.ctv512x65
2. Carrier, B. (2005). File system forensic analysis. Addison-Wesley.
3. Tanenbaum, A. S., & Bos, H. (2015). Modern operating systems (4th ed.). Pearson.
4. Casey, E. (2011). Digital evidence and computer crime (3rd ed.). Academic Press.
5. David Anderson, Janet Delve, Milena Dobreva. (2025). The Preservation of Complex Objects. Volume 1. Visualisations and Simulations. Published by The University of Portsmouth.
6. Casey, E. (2011). Digital evidence and computer crime (3rd ed.). Academic Press.
7. Carrier, B. (2005). File system forensic analysis. Addison-Wesley.
8. Garfinkel, S. (2015). Digital media triage with bulk data analysis. Digital Investigation, 14, S49–S59.
9. Andrews, D. L., Bradshaw, D. S., & Scholes, G. D. (2015). Resonance energy transfer. In Photonics: Scientific Foundations, Technology and Applications (Vol. IV). John Wiley & Sons.
10. Hosmer, Chet. (2002). Proving the Integrity of Digital Evidence with Time.. IJDE. 1.
11. Chris Boyd, Pete Forster, Time and date issues in forensic computing - a case study, Digital Investigation, Volume 1, Issue 1, 2004, Pages 18-23, ISSN 1742-2876, https://doi.org/10.1016/j.diin.2004.01.002.
12. Malcolm W. Stevens, Unification of relative time frames for digital forensics, Digital Investigation, Volume 1, Issue 3, 2004, Pages 225-239, ISSN 1742-2876, https://doi.org/10.1016/j.diin.2004.07.003.
13. Casey, E. (2011). Digital evidence and computer crime (3rd ed.). Academic Press.
14. Carrier, B. (2005). File system forensic analysis. Addison-Wesley.
15. Tanenbaum, A. S., & Bos, H. (2015). Modern operating systems (4th ed.). Pearson.
16. https://en.wikipedia.org/wiki/Random-access_memory
17. https://en.wikipedia.org/wiki/EPROM
18. https://en.wikipedia.org/wiki/Network-attached_storage
19. J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. 2009. Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52, 5 (May 2009), 91–98. https://doi.org/10.1145/1506409.1506429
20. Sommer, Peter. (1997). Downloads, Logs and Captures: Evidence from Cyberspace. Journal of Financial Crime. 5. 138-151. 10.1108/eb025826.
21. Casey, Eoghan. (2002). Error, Uncertainty and Loss in Digital Evidence.. IJDE. 1.
22. https://en.wikipedia.org/wiki/Numeral_system
23. J.Klensin and Michael Padlipsky, “Unicode format for Network Interchange” (2008) RFC 5198 <https://tools.ietf.org/html/rfc5198>
24. Vinton Cerf, “RFC 20 – ASCII format for Network Interchange” (1969) RFC 20 <https://tools.ietf.org/html/rfc20>.
25. R.T.Braden, “EBCDIC/ASCII mapping for Network RJE” (1972) RFC 338 <https://tools.ietf.org/html/rfc338>.
26. F.Yergeau, “UTF-8, a transformation format of ISO 10646” (2003) RFC 3629 <https://tools.ietf.org/html/rfc3629>.