<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Quality Assessment of LLM in Digital Forensics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Federico Costantini</string-name>
          <email>federico.costantini@uniud.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fausto Galvan</string-name>
          <email>galvanfausto14@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pier Luca Montessoro</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Crisci</string-name>
          <email>francesco.crisci@uniud.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Baron</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>AI4EVIR: Workshop on AI for evidential reasoning</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dipartimento Politecnico di Ingegneria e Architettura, Università degli Studi di Udine</institution>
          ,
          <addr-line>Via delle Scienze 206, 33100 Udine</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Dipartimento di Scienze Economiche e Statistiche, Università degli Studi di Udine</institution>
          ,
          <addr-line>Via Tomadini 30/a, 33100 Udine</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Dipartimento di Scienze Giuridiche, Università degli Studi di Udine</institution>
          ,
          <addr-line>Via Tomadini 3, 33100 Udine</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>The utilisation of Artificial Intelligence in investigative contexts facilitates the optimisation of the analysis of digital artefacts, which can be collected in a variety of formats, including text, printouts, images, and videos, as well as from diverse sources, such as datasets, networks, and devices. More recently, while the adoption of LLM (Large Language Models) appears to hold significant potentials, it is also accompanied by emerging concerns relating to its technological limitations, including distortions and hallucinations, which can hinder law enforcement and compromise the balance between the rights of the accused and the power of the judicial authorities. Notwithstanding the activities prohibited by Art. 5 of the AI ACT, the fact is that LLM technologies are already assuming a pivotal role in investigations, yet are still inadequate the principles, methodologies and tools allowing courts to assess accuracy and precision of the language models before implementing them. The objective of this research project is to develop a methodology that can be adopted for the assessment and comparison of LLMs in performing analytical processes. To this end, a synthetic dataset of electronic evidence is generated from a fictitious criminal scenario and fed to the agent with engineered prompting techniques.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Artificial intelligence</kwd>
        <kwd>Digital Forensics</kwd>
        <kwd>Large Language Models</kwd>
        <kwd>Quality of information</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        model [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. If we consider the concept of “quality” in a technical sense, defined as the capacity of a
given object to meet a certain purpose, then it is possible to identify a set of requirements that it - in
our case, the artifact generated by forensic acquisition - must possess. In this way, it is possible to
determine whether and to what extent the expectations of the actors involved – primarily the parties
of the legal proceedings – are met. In this sense, a general formula was defined that allowed one to
measure the reliability of the general information contained in a heterogeneous set of devices [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>On this regard, it is important to remember that international standards have been developed for
the sharing of digital evidence, as well as legal ontologies specifically dedicated to this sector, such as
CASE1, which contribute to spreading the adoption of AI in the forensic field and increasing the level
of reliability.</p>
      <p>However, if it is widely accepted that “data” and “algorithms” are two sides of the same coin, which
we can generically name "information", their “quality” must be assessed using diferent criteria. First of
all – but we will see this later on – very often assessments can only be made indirectly, because the
technologies used do not ofer transparency in their processing. Secondly, it should be noted that AI
is, on the one hand, an “object”, similar to the digital data being observed, and on the other hand, an
“agent”, like the human being who observes it. The automatism of the activity that AI is called upon
to perform reveals not only the essence of its instrumentality – the fact that it is used to make data
processing more eficient – but also the seed of issues concerning the balance between the operation
of the artificial agent and the surveillance of the human being. In other words, AI can perform its
tasks with "varying degrees of autonomy" – as also found in the regulatory definition of Art. 3(1) of
the “AI ACT” Regulation2 – and, consequently, external expectations – in terms of “quality”, which is
what interests us most specifically here – depend on a very heterogeneous set of factors, including, in
particular, the level of “trustworthiness” established by the human being with whom it interacts or in
the reference context. In this sense, it becomes crucial to establish criteria for determining also the
"quality" of algorithms.</p>
      <p>In this work, we intend to present a research proposal that addresses the "Information Quality" in
the implementation of Artificial Intelligence in Digital Forensics, with the aim of establishing an AIQA
(Artificial Intelligence Quality Assessment) framework. To this end, we created a pilot experiment in
which a "criminal scenario" is created based on oficial reports, and it is used to generate a synthetic
dataset, which has been fed to LLM agents in order to assess their performances according to given
benchmarks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Experimental methodology</title>
      <p>
        Recent contributions have explored the possibility of using LLMs in the forensic field for purposes other
than strictly evidentiary or investigative ones, especially for for training and educational purposes [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
In some cases, they have been used for creating quasi-real criminal scenarios to be used as a “test bed”
to evaluate artificial agent performances [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In our research, we intend to follow similar paths.
      </p>
      <sec id="sec-2-1">
        <title>2.1. Scenario description</title>
        <p>
          The narrative used as a starting point for this work refers to online fraud. This is a constantly growing
phenomenon in which fraud is perpetrated by ofering the opportunity to invest in funds or virtual
currencies [
          <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
          ]. In the most common modus operandi, victims are “lured”, for example, by believing
the promises of lucrative investments, via physical contacts, phone calls, direct messages on social
1The CASE (Cyber-investigation Analysis Standard Expression) ontology (https://caseontology.org) allows artifacts and their
properties to be thoroughly described, facilitating sharing, transmission, and automatic processing.
2Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on
artificial intelligence and amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) No 168/2013, (EU) 2018/858, (EU)
2018/1139 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (Artificial Intelligence Act), OJ L,
2024/1689, 12.7.2024, ELI: http://data.europa.eu/eli/reg/2024/1689/oj.
networks, sometimes with aggressive campaigns involving "deep fake" videos that can feature the
appearances of celebrities or even politicians, as happened recently with the Italian Prime Minister3.
        </p>
        <p>Fraudulent activities are perpetrated using a variety of methods, such as fake phone numbers (phone
spoofing), forged identity documents or professional qualification certificates (e.g. “financial advisor”),
sometimes issued by non-existent organizations, as well as web browsing techniques that allow them
to mask their IP connection while interacting with their victims and each other(TOR, VPN). In addition,
victims are often persuaded to grant remote access to their "consultants" to their computers, allowing
them to transfer funds overseas very easily. In similar cases, law enforcement oficers are expected to
perform several tasks, such as:
1. Forensic acquisition of digital evidence. Cloning the victim’s devices, acquiring chats, emails,
screenshots and files), while preserving data in accordance with international forensic standards
(e.g. ISO/IEC 27037)4.
2. Verification of the integrity of communications. Extracting and decoding data, verifying
links to the fraudulent platform, analysing metadata and recovering deleted items).
3. Tracing cryptocurrency flows. Following the path of cryptocurrency funds and identify any
wallets linked to exchanges or mixers, using blockchain forensic tools and specialised software
(e.g. Chainalysis, Elliptic).</p>
        <p>4. OSINT. Linking suspicious wallets, web domains, and digital identities.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Narrative, conventions adopted and dataset availability</title>
        <p>The fictitious criminal organization we created is composed of four individuals located in the European
Union (Italy, Austria, Croatia, Slovenia) with high operational capabilities and advanced technological
skills, capable of creating shell companies and counterfeited ID cards, or to use real documents stolen
from previous victims, managing spoofing techniques (both for emails and for telephone numbers), as
well as of setting up fraudulent websites, producing "deep fakes", and generating international financial
lfows through digital platforms and cryptocurrencies. They supposedly operated in a specific time
period (from 1 January 2024 to 30 June 2025), luring one hundred victims and recruiting five “straw
men” – some unaware, others accomplices – spread in their respective Countries, generating a total
revenue of at least five million euros.</p>
        <p>The LLM was instructed to generate various kinds of digital artefacts produced by this activity,
i.e. records of telephone conversations, texts (in diferent languages), and metadata from electronic
communications (among criminals, or towards victims and with "straw men"), as well as financial
transactions.</p>
        <p>In creating the dataset, some simplifications were introduced to optimize Prompt and output lengths
in accordance with the limitations of current LLM providers: telephone numbers are not falsified; the
IP addresses of the connections are not masked; it was assumed that the exchanges complied with KYC
(Know Your Customer) regulation and cooperated with the police authorities.</p>
        <p>The prompt used, the dataset containing the “synthetic data” generated by the LLM and the outcomes
are published in open format on a freely accessible dataset5.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Workflow overview</title>
      <p>As shown in Figure 1, our workflow can be divided into three phases: (1) Dataset preparation; (2) LLMs
testing; (3) LLMs benchmarking. In the following paragraphs, we ofer a few clarifications for each of
them.
3https://www.milanofinanza.it/news/trufe-online-falsi-video-di-giorgia-meloni-promettono-un-guadagno-di-50-000-eurocon-un-investimento-202412121252369462.
4https://www.iso.org/standard/44381.html.
5the LLM adopted was ChatGPT5, the dataset is available at https://zenodo.org/records/16927274.</p>
      <sec id="sec-3-1">
        <title>3.1. Dataset preparation</title>
        <p>In the training phase, the choice of examples that are as realistic as possible to provide to the model is a
critical aspect, since the quality of the outcome will depend on how the data are selected, classified,
labeled, and processed. Biases can also present themselves in the forensic field and are very dangerous.</p>
        <p>The methodology proposed here takes into account that inputs can be biased, and tries to reduce
such risks by adopting separate measures for each step.</p>
        <p>1. Criminal scenario design. As explained above, we created a simulation. In other worlds,
our intention is not to incriminate real individuals using predictive policing approaches but to
generate fictitious criminals enacting consolidated strategies.
2. Prompt design. The purpose is to generate a synthetic data set that can represent - as a whole
the narrative behind the data.
3. LLM1 prompting. Using an AI tool (preferably diferent from the one being evaluated), synthetic
data are generated. For example, for an investigation into a cryptocurrency scam conducted via
email and WhatsApp, sequences of messages will be produced that are consistent, appropriately
distributed over time, and similar to those actually received by real victims.
4. Criminal scenario data set. The data set based on the criminal scenario designed. Being
ifctitious, it is by design anonymous.
5. Reference data set. This data set contains public domain, hence neutral, references6. This
ensures also that the format of the evidences generated by the agent (e.g. bank account reports,
telephone call logs, Whatspp messages) is consistent with that used in real-life law enforcement
(e.g. ETSI Charging Data Records).
6. Synthetic data set. The synthetic data is added to the reference dataset to construct what we
will call the synthetic dataset. This represents a realistic and consistent example of a set of data
that could be found on one or more devices belonging to a possible perpetrator.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. LLMs Testing</title>
        <p>Detection, classification and analytical functions are applied to our datasets by the LLM to be evaluated,
and the results obtained are compared with those expected (i.e. with the information available a priori).
1. Prompt design. By applying appropriate metrics, the reliability of the tool in the specific context
is then determined objectively.
2. LLM2 - LLMn prompting. By applying the same procedure to diferent LLMs, it is possible
to compare them, to evaluate the best performer, or to obtain confidence indices with which to
measure the results, or even to deploy multiple LLMs for the same case.
3. LLM2-LLMn extracted criminal dataset. This sequence of operations can be repeated with
diferent synthetic datasets to average the measurements and obtain a higher level of confidence.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. LLMs benchmarking</title>
        <p>Inevitably, discrepancies will emerge between the results obtained and the original synthetic data;
therefore, the metrics described below are applied to quantitatively measure the performance of the
tool in the context under consideration.</p>
        <p>To define the metrics, it is necessary to consider the objectives of using the AI tool. Since, in the
course of judicial investigations, law enforcers cannot avoid directly analysing the original data, the AI
tool can be used to identify data of interest within device memories, which may contain – as typically
do – amounts of information that make manual searching and selection dificult or impossible.</p>
        <p>The metrics for evaluating the efectiveness of the AI tool in question must be defined in such a way
as to measure how close the automatic processing is to the ideal result.</p>
        <p>Some criteria for their definition are as follows:</p>
        <sec id="sec-3-3-1">
          <title>6E.g. Computer Forensic Reference DataSet Portal, NIST, https://cfreds.nist.gov.</title>
          <p>1. Eficiency. For each type of message, the ratio between the number of relevant messages found
and the total number of messages of the same type in the synthetic data.
2. False negatives. For each type of message, the ratio between the number of relevant messages
not found and the total number of messages of the same type in the synthetic data.
3. False positives. For each type of message, the ratio between the number of irrelevant messages
classified as relevant and the number of messages of the same type in the summary data.
4. Summary quality. The LLM can provide a summary of the content of messages identified as
relevant and recognise regular patterns, timing, operating modes, etc. The evaluation in this case
will be represented by a score, for example obtained as the average of the scores assigned by the
participants in the evaluation.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Concluding remarks and research prospects</title>
      <p>This methodology does not aim in solving the explainability issues, but just to ofer a tool for assessing
the trustworthiness of artificial agents. We believe that AIQA, possibly in synergy with IQA and sector
ontologies such as CASE, can be a useful tool with a variety of possible applications. For example, it
could be possible not only to train a single artificial agent – optimising its model – but also to compare
the quality of diferent agents used within a proceeding – for example, those of the prosecution, the
defence and the civil party – in an easily understandable and communicable way.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors employed Generative AI tools (ChatGPT 5.1 Plus,
Overleaf Writefull and Deepl) in supporting text polishing and translation. After using these tools, the
authors reviewed and edited the content as needed and take full responsibility for the publication’s
content.</p>
    </sec>
    <sec id="sec-6">
      <title>Online Resources</title>
      <sec id="sec-6-1">
        <title>The dataset generated is available at: https:zenodo.org/records/16927274 .</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Saba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. K.</given-names>
            <surname>Balwan</surname>
          </string-name>
          ,
          <article-title>Artificial intelligence in forensic science: Can it be a revolution or else?</article-title>
          ,
          <source>Scholars Academic Journal of Biosciences</source>
          <volume>13</volume>
          (
          <year>2025</year>
          )
          <fpage>335</fpage>
          -
          <lpage>339</lpage>
          . doi:
          <volume>10</volume>
          .36347/sajb.
          <year>2025</year>
          .
          <year>v13i03</year>
          .
          <fpage>005</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Brighi</surname>
          </string-name>
          , Informatica forense, algoritmi e garanzie processuali,
          <source>Ars interpretandi 1</source>
          (
          <year>2021</year>
          )
          <fpage>153</fpage>
          -
          <lpage>164</lpage>
          . URL: https://www.rivisteweb.it/doi/10.7382/100798. doi:
          <volume>10</volume>
          .7382/100798.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>K.-J. Kim</surname>
            ,
            <given-names>C.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S.-E.</given-names>
          </string-name>
          <string-name>
            <surname>Bae</surname>
            ,
            <given-names>J.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Choi</surname>
          </string-name>
          , W. Kang,
          <article-title>Digital forensics in law enforcement: A case study of llm-driven evidence analysis</article-title>
          ,
          <source>Forensic Science International: Digital Investigation</source>
          <volume>54</volume>
          (
          <year>2025</year>
          )
          <article-title>301939</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.fsidi.
          <year>2025</year>
          .
          <volume>301939</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Vyas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kothari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Golakia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Parikh</surname>
          </string-name>
          ,
          <article-title>Enhancing digital forensics: Machine learning techniques for social media investigation 258 (</article-title>
          <year>2025</year>
          -01-01)
          <fpage>2290</fpage>
          -
          <lpage>2301</lpage>
          . URL: https: //www.sciencedirect.com/science/article/pii/S1877050925015868. doi:
          <volume>10</volume>
          .1016/j.procs.
          <year>2025</year>
          .
          <volume>04</volume>
          .483.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hendrix</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Morozof</surname>
          </string-name>
          ,
          <article-title>Media forensics in the age of disinformation</article-title>
          , in: H.
          <string-name>
            <surname>T. Sencar</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Verdoliva</surname>
          </string-name>
          , N. Memon (Eds.),
          <source>Multimedia Forensics</source>
          , Springer Singapore,
          <year>2022</year>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>40</lpage>
          . URL: https://link. springer.com/10.1007/
          <fpage>978</fpage>
          -981-16-7621-
          <issue>5</issue>
          _2. doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-7621-
          <issue>5</issue>
          _2, series Title:
          <article-title>Advances in Computer Vision</article-title>
          and Pattern Recognition.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Vaghela</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Varshney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <surname>Leveraging</surname>
            <given-names>AI</given-names>
          </string-name>
          and
          <article-title>ML to innovate forensic frameworks for the identification of illicit operations and extraction of digital artifacts within deep web and dark web environments 2 (</article-title>
          <year>2025</year>
          -05-16)
          <fpage>20</fpage>
          -
          <lpage>35</lpage>
          . URL: https://www.digitalsecurityforensics.org/ digisecforensics/article/view/43. doi:
          <volume>10</volume>
          .29121/digisecforensics.v2.
          <year>i1</year>
          .
          <year>2025</year>
          .
          <volume>43</volume>
          ,
          <issue>number</issue>
          :
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rizvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scanlon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mcgibney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sheppard</surname>
          </string-name>
          ,
          <article-title>Application of artificial intelligence to network forensics: Survey, challenges and future directions 10 (</article-title>
          <year>2022</year>
          )
          <fpage>110362</fpage>
          -
          <lpage>110384</lpage>
          . URL: https://ieeexplore. ieee.org/abstract/document/9919162. doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2022</year>
          .
          <volume>3214506</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Costantini</surname>
          </string-name>
          , G. De Gasperis,
          <string-name>
            <given-names>R.</given-names>
            <surname>Olivieri</surname>
          </string-name>
          ,
          <source>Digital forensics and investigations meet artificial intelligence 86</source>
          <volume>(2019-07</volume>
          )
          <fpage>193</fpage>
          -
          <lpage>229</lpage>
          . URL: http://link.springer.com/10.1007/s10472-019-09632-y. doi:
          <volume>10</volume>
          .1007/s10472-019-09632-y.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R. S. A.</given-names>
            <surname>Faqir</surname>
          </string-name>
          ,
          <article-title>Digital criminal investigations in the era of artificial intelligence: A comprehensive overview 17 (</article-title>
          <year>2023</year>
          )
          <fpage>77</fpage>
          -
          <lpage>94</lpage>
          . URL: https://cybercrimejournal.com/menuscript/index.php/ cybercrimejournal/article/view/189.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Liepin</surname>
          </string-name>
          , a,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lagioia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lippi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pałka</surname>
          </string-name>
          , H.-W. Micklitz, G. Sartor,
          <article-title>Automating legal tasks: LLMs, legal documents, and the AI act</article-title>
          , in: M.
          <string-name>
            <surname>Zou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Poncibò</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ebers</surname>
          </string-name>
          , R. Calo (Eds.),
          <source>The Cambridge Handbook of Generative AI and the Law</source>
          , 1 ed., Cambridge University Press,
          <fpage>2025</fpage>
          -
          <volume>08</volume>
          -
          <issue>07</issue>
          , pp.
          <fpage>407</fpage>
          -
          <lpage>424</lpage>
          . URL: https://www.cambridge.org/core/product/identifier/9781009492553%23c23/type/book_part. doi:
          <volume>10</volume>
          .1017/9781009492553.029.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Floridi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Illari</surname>
          </string-name>
          , The Philosophy of Information Quality, Synthese library, Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Costantini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Galvan</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. A. De Stefani</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Battiato</surname>
          </string-name>
          ,
          <article-title>Assessing “information quality” in iot forensics: Theoretical framework and model implementation</article-title>
          ,
          <source>Journal of Applied Logics - IfCoLog Journal of Logics and their Applications</source>
          <volume>8</volume>
          (
          <year>2021</year>
          )
          <fpage>2373</fpage>
          -
          <lpage>2406</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Scanlon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Breitinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hargreaves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-N.</given-names>
            <surname>Hilgert</surname>
          </string-name>
          , J. Sheppard,
          <article-title>ChatGPT for digital forensic investigation: The good, the bad, and the unknown 46 (</article-title>
          <year>2023</year>
          )
          <article-title>301609</article-title>
          . URL: https://www.sciencedirect. com/science/article/pii/S266628172300121X. doi:
          <volume>10</volume>
          .1016/j.fsidi.
          <year>2023</year>
          .
          <volume>301609</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ghawaly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>McCleary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Webb</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Baggili</surname>
          </string-name>
          ,
          <article-title>ForensicLLM: A local large language model for digital forensics 52 (</article-title>
          <year>2025</year>
          -03-01)
          <fpage>301872</fpage>
          . URL: https://www.sciencedirect.com/science/ article/pii/S2666281725000113. doi:
          <volume>10</volume>
          .1016/j.fsidi.
          <year>2025</year>
          .
          <volume>301872</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <article-title>European Union Agency for Law Enforcement Cooperation</article-title>
          .,
          <string-name>
            <surname>Europol</surname>
          </string-name>
          (
          <year>2023</year>
          ),
          <article-title>Online fraud schemes: a web of deceit</article-title>
          ,
          <source>Technical Report, Europol</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <article-title>European Union Agency for Law Enforcement Cooperation., IOCTA, internet organised crime threat assessment 2024</article-title>
          ., Publications Ofice,
          <year>2024</year>
          . URL: https://data.europa.eu/doi/10.2813/442713.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>