To see the other types of publications on this topic, follow the link: Digital Forensic investigations.

Journal articles on the topic 'Digital Forensic investigations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital Forensic investigations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.
APA, Harvard, Vancouver, ISO, and other styles
2

Sabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.

Full text
Abstract:
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems (CFMDE). Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.
APA, Harvard, Vancouver, ISO, and other styles
3

Ferguson, R. I., Karen Renaud, Sara Wilford, and Alastair Irons. "PRECEPT: a framework for ethical digital forensics investigations." Journal of Intellectual Capital 21, no. 2 (March 9, 2020): 257–90. http://dx.doi.org/10.1108/jic-05-2019-0097.

Full text
Abstract:
PurposeCyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization's right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.Design/methodology/approachIn this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals' rights to privacy and organizations' rights to control intellectual capital disclosure.FindingsThe investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically informed approach to digital forensics investigations, as a remedy, is highlighted and a framework proposed to provide this.Research limitations/implicationsThe proposed ethically informed framework for guiding digital forensics investigations suggests a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.Originality/valueJustice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.
APA, Harvard, Vancouver, ISO, and other styles
4

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. Abstract Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Jian Guo, Bo Yang, Sen Lin, Ming Xing Zhang, and Kun Ying Liu. "A Practical Approach for Digital Forensic Triage." Applied Mechanics and Materials 742 (March 2015): 437–44. http://dx.doi.org/10.4028/www.scientific.net/amm.742.437.

Full text
Abstract:
In order to uncover truths to serve justice, case-related data collected from a digital investigation requires substantial resources to analyze, especially in time-critical situations. At present, however, digital forensics has not evolved to meet this ever-increasing demand. Digital forensic triage is a promising solution, as it is designed to maximize the use of resources according to a system of priorities, and hence the efficiency and effectiveness of forensic examinations can be increased. Nevertheless, the lack of concrete methods limits efforts to implement triage. This paper presents a practical approach that is designed to build a prioritizing solution. In this work a new process model is derived based on the presented approach, and it is particularly suited to scenarios where forensic examiners do not have enough time and resources to conduct a full examination and analysis. An example is described to demonstrate how this approach can be used to meet the requirements of network forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
6

Zav’yalova, D. V. "Current Capacities of Digital Forensics for Investigations of Different Types of Crimes." Theory and Practice of Forensic Science 15, no. 3 (October 23, 2020): 89–97. http://dx.doi.org/10.30764/1819-2785-2020-3-89-97.

Full text
Abstract:
The article focuses on the present state of digital forensics and its potential when investigating different types of crimes with a “digital” element. It also presents a brief historical overview of the development of digital forensics as an independent type of forensic examination, its theoretical framework.The paper presents a summary of the practice of the Laboratory of Digital Forensics of the Russian Federal Centre of Forensic Science of the Russian Ministry of Justice over 2017–2019. In the course of the summary, the author analyses typical questions to experts, the percentage of cases’ categories, the most common objects of the expertise, and experts’ opinions, their form, and completeness. Following the summary’s results, the most frequent investigators’ requests for this kind of examination have been highlighted. Also, typical errors at appointing the expertise have been revealed.The author presents a prognosis for the further development of digital forensics and proposes strategies and measures to minimize the errors at the appointment of the examinations and unsustainable expenditure of resources in appointment and conduct of this type of research.
APA, Harvard, Vancouver, ISO, and other styles
7

Karabiyik, Umit, and Tugba Karabiyik. "A Game Theoretic Approach for Digital Forensic Tool Selection †." Mathematics 8, no. 5 (May 12, 2020): 774. http://dx.doi.org/10.3390/math8050774.

Full text
Abstract:
Digital forensic investigations are getting harder and more time consuming everyday because of various problems including rapid advances in technology, wide variety of available devices in investigations, and large amount of data to be analyzed. In order to tackle with these issues, digital forensic tools are developed by open-source communities and software companies. These software products are released as a complete toolkit or standalone tools targeting specific tasks. In either case, digital forensic investigators use these tools based on their familiarity because of previous training experiences, available funding from their agencies/businesses, tool’s ease of use, etc. Moreover, using additional tools to verify the findings is a common practice in digital forensic investigations. This is particularly common when the previously selected tools do not generate an expected output. In this paper, we propose a game theoretic approach to the tool selection problem in order to help investigators to make a decision on which digital forensic tool to use. We particularly focused on file carving tool usage when building and analyzing our model because of the available data on these tools. Our results show how important it is to investigate the dynamics of strategy changes between the tools during an investigation to increase the efficiency of the investigation using game theoretic modeling.
APA, Harvard, Vancouver, ISO, and other styles
8

Montasari, Reza, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian-Far, and Alireza Daneshkhah. "Digital Forensics." International Journal of Organizational and Collective Intelligence 10, no. 2 (April 2020): 37–53. http://dx.doi.org/10.4018/ijoci.2020040103.

Full text
Abstract:
Considering the ever-growing ubiquity of technology, there is an associated growth in the possibility of digital devices related to a criminal investigation or civil litigation. As the variety of digital devices is increasing, the storage capacity of each is also rising exponentially. Due to the varied and large volumes of data produced, law enforcement agencies (LEAs) worldwide are facing a significant backlog of cases. This has culminated in significant delays in dealing with cases that urgently require digital forensic investigations (DFIs). It is of paramount importance that new research approaches be adopted to address such challenges. This article evaluates the existing set of circumstances surrounding the field of digital forensics (DF). The article provides two important contributions to the field of DF; it identifies and analyses the most important mid- and long-term challenges that need to be considered by LEAs. It also proposes important specific future research directions, the undertaking of which can assist LEAs in adopting a new approach to addressing these challenges.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xiu Zhi, Bao Ling Qin, Huan Qiu, and Song Min Jia. "Sparse Lp-Norm Based ICP for 3D Registration." Applied Mechanics and Materials 742 (March 2015): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.742.433.

Full text
Abstract:
In order to uncover truths to serve justice, case-related data collected from a digital investigation requires substantial resources to analyze, especially in time-critical situations. At present, however, digital forensics has not evolved to meet this ever-increasing demand. Digital forensic triage is a promising solution, as it is designed to maximize the use of resources according to a system of priorities, and hence the efficiency and effectiveness of forensic examinations can be increased. Nevertheless, the lack of concrete methods limits efforts to implement triage. This paper presents a practical approach that is designed to build a prioritizing solution. In this work a newprocess model is derived based on the presented approach, and it is particularly suited to scenarios where forensic examiners do not have enough time and resources to conduct a full examination and analysis. An example is described to demonstrate how this approach can be used to meet the requirements of network forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
10

Nortje, Jacobus Gerhardus, and Daniel Christoffel Myburgh. "The Search and Seizure of Digital Evidence by Forensic Investigators in South Africa." Potchefstroom Electronic Law Journal 22 (April 25, 2019): 1–42. http://dx.doi.org/10.17159/1727-3781/2019/v22i0a4886.

Full text
Abstract:
The discipline of digital forensics requires a combination of skills, qualifications and knowledge in the area of forensic investigation, legal aspects and information technology. The uniqueness of digital evidence makes the adoption of traditional legal approaches problematic. Information technology terminology is currently used interchangeably without any regard to being unambiguous and consistent in relation to legal texts. Many of the information technology terms or concepts have not yet achieved legal recognition. The recognition and standardisation of terminology within a legal context are of the utmost importance to ensure that miscommunication does not occur. To provide clarity or guidance on some of the terms and concepts applicable to digital forensics and for the search and seizure of digital evidence, some of the concepts and terms are reviewed and discussed, using the Criminal Procedure Act 51 of 1977 as a point of departure. Digital evidence is often collected incorrectly and analysed ineffectively or simply overlooked due to the complexities that digital evidence poses to forensic investigators. As with any forensic science, specific regulations, guidelines, principles or procedures should be followed to meet the objectives of investigations and to ensure the accuracy and acceptance of findings. These regulations, guidelines, principles or procedures are discussed within the context of digital forensics: what processes should be followed and how these processes ensure the acceptability of digital evidence. These processes include international principles and standards such as those of the Association of Chiefs of Police Officers and the International Organisation of Standardisation. A summary is also provided of the most influential or best-recognised international (IOS) standards on digital forensics. It is concluded that the originality, reliability, integrity and admissibility of digital evidence should be maintained as follows: Data should not be changed or altered. Original evidence should not be directly examined. Forensically sound duplicates should be created. Digital forensic analyses should be performed by competent persons. Digital forensic analyses should adhere to relevant local legal requirements. Audit trails should exist consisting of all required documents and actions. The chain of custody should be protected. Processes and procedures should be proper, while recognised and accepted by the industry. If the ACPO (1997) principles and ISO/IEC 27043 and 27037 Standards are followed as a forensic framework, then digital forensic investigators should follow these standards as a legal framework.
APA, Harvard, Vancouver, ISO, and other styles
11

Inglot, Bartosz, and Lu Liu. "Enhanced Timeline Analysis for Digital Forensic Investigations." Information Security Journal: A Global Perspective 23, no. 1-2 (January 2, 2014): 32–44. http://dx.doi.org/10.1080/19393555.2014.897401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Overill, Richard E., Jantje A. M. Silomon, and Keith A. Roscoe. "Triage template pipelines in digital forensic investigations." Digital Investigation 10, no. 2 (September 2013): 168–74. http://dx.doi.org/10.1016/j.diin.2013.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Christinina, E. V. "ON THE USE OF DIGITAL LOGISTICS IN CRIMINAL PROCEEDINGS AND CRIMINALISTICS." Juridical Journal of Samara University 6, no. 3 (September 28, 2020): 128–32. http://dx.doi.org/10.18287/2542-047x-2020-6-3-128-132.

Full text
Abstract:
The scientific article explores the concept and content of digital forensic logistics. The author substantiates the close relationship of digital forensic logistics with the process of organizing criminal investigations, building forensic versions, planning investigative actions and operational search activities. The author presents several areas of forensic logistics: logistics of evidence in criminal cases; logistics of the overall organization of the investigation of crimes; logistics of planning (selection of means and methods of investigation); logistics of putting forward versions; logistics of decisions made in criminal cases. The article makes a logical conclusion that the entire process of criminal investigation is carried out using a single digital logistics platform that includes algorithmization of actions and decisions in a criminal case. The author has established that the digital platform is based on various information flows, which are: digital forensic records; digital traces; electronic requests and instructions; digital video library, audio recording and photography; electronic assistant to the investigator; digital expertise; electronic forensic recommendations for the investigation of criminal cases. In conclusion, it is concluded that it is necessary to use digital logistics in criminal proceedings and criminalistics to improve the efficiency of investigative bodies in the investigation of criminal crimes.
APA, Harvard, Vancouver, ISO, and other styles
14

Wilson-Kovacs, Dana. "Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales." Policing: An International Journal 44, no. 4 (May 7, 2021): 669–82. http://dx.doi.org/10.1108/pijpsm-02-2021-0019.

Full text
Abstract:
PurposeIn-depth knowledge about specific national approaches to using digital evidence in investigations is scarce. A clearer insight into the organisational barriers and professional challenges experienced, alongside a more detailed picture of how digital evidence can help police investigations are required to empirically substantiate claims about how digital technologies are changing the face of criminal investigations. The paper aims to focus on the introduction of digital media investigators to support investigating officers with the collection and interpretation of digital evidence.Design/methodology/approachDrawing on ethnographic and interview data collected as part of an Economic and Social Research Council-funded project on the application of digital forensics expertise in policing in England and Wales, this paper examines the changing face of investigations in relation to escalating digital demand.FindingsThe analysis presents the national and regional organisational parameters of deploying digital expertise in criminal investigation and examines some of the challenges of being a digital media investigator (DMI). Through testimonies from DMIs, digital forensic practitioners, investigating and senior officers and forensic managers, the analysis explores the organisational tensions in the collection, processing, interpretation and use of information from digital devices for evidential purposes.Research limitations/implicationsThe paper offers an empirical basis for the comparative study of how the DMI role has been implemented by law enforcement agencies and its fit within broader institutional considerations and processes.Practical implicationsThe development of the DMI role has raised questions about the supply of digital expertise, especially to volume crime investigations, and tensions around occupational divisions between scientific and operational units.Social implicationsThe findings show that while the introduction of the DMI role was much needed, the development of this valuable provision within each force and the resources available require sustained and coordinated support to protect these professionals and retain their skills.Originality/valueThis study contributes to the growing sociological and criminological literature with an ethnographically based perspective into the organisational and occupational tensions in the identification and processing of digital evidence in England and Wales.
APA, Harvard, Vancouver, ISO, and other styles
15

Veber, Jaromír, Lea Nedomová, and Petr Doucek. "Corporate Digital Incident Investigation." Quality Innovation Prosperity 20, no. 1 (June 30, 2016): 57. http://dx.doi.org/10.12776/qip.v20i1.656.

Full text
Abstract:
<p><strong>Purpose:</strong> Information and communication technology are fundamental part of most business entities. Unfortunately, use of these technologies needs to be secured, and in the case that stipulated and legal regulations are not observed, it is very important to not only recognize but also prove such actions/incidents on time. Therefore, the ability to investigate the events/incidents in organization using traces in the information systems may be key component for regulation enforcement.<br /><strong>Methodology/Approach:</strong> We propose a model for digital investigations within the organization, based on ISO standards and existing models for common digital investigations.<br /><strong>Findings:</strong> The result of our work is a model that can serve as a guide to draft procedures for digital investigations within the organization. Such a procedure should provide evidence of a quality comparable to forensic evidence.<br /><strong>Research Limitation/Implication:</strong> Our model provides an overview of the entire process and recommendations for its implementation; However, it does not provide a list of specific examination methods, because they vary depending on the case.<br /><strong>Originality/Value of paper:</strong> Most of the previously presented models for digital investigations were focused on the investigation of the police forensic laboratories. The originality of our model lies in its focus on investigations in the business organization.</p>
APA, Harvard, Vancouver, ISO, and other styles
16

Lizarti, Nora, Bambang Sugiantoro, and Yudi Prayudi. "PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK." JISKA (Jurnal Informatika Sunan Kalijaga) 2, no. 1 (August 29, 2017): 26. http://dx.doi.org/10.14421/jiska.2017.21-04.

Full text
Abstract:
Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.
APA, Harvard, Vancouver, ISO, and other styles
17

Yadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.

Full text
Abstract:
Abstract: Cyber Forensics is termed as scientific methods or applications in association with the judiciary or court of laws. The aim behind these methods is to unveil the digital evidence to be utilized in court for solving crime cases. This sort of technology wasn’t practiced before therefore most criminals tend to urge away with their criminal acts without valid proof to incriminate or prosecute them. During that time the oaths, confessions, testimonies from witnesses were the sole determining factors of evidence Crimes committed within electronic or digital domains, particularly within cyberspace, have become common. Criminals are using technology to commit their offenses and make new challenges for law enforcement agents, attorneys, judges, military, and security professionals. Digital forensics has become a vital instrument in identifying and solving computer-based and computerassisted crime. This paper provides a quick introduction to cyber forensics. During this paper we present a typical model for both Incident Response and Computer Forensics processes which mixes their advantages in an exceedingly flexible way: It allows for a management oriented approach in digital investigations while retaining the chance of a rigorous forensics investigation. Keywords: cyber forensics, digital forensic science, computer forensics, evidence, judicial system.
APA, Harvard, Vancouver, ISO, and other styles
18

Riadi, Imam, Anton Yudhana, and Mushab Al Barra. "Forensik Mobile pada Layanan Media Sosial LinkedIn." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 1 (January 20, 2021): 9–20. http://dx.doi.org/10.14421/jiska.2021.61-02.

Full text
Abstract:
The research explores mobile forensic on LinkedIn social media. Forensic mobile finds digital evidence of job hoax cases in LinkedIn, investigation using the NIST (National Institute of Standard and Technology) method. Data collection techniques using Andriller tools in investigations. Data examination using tools Root Browser, Autopsy in the forensic process. data analysis using tools MOBILedit in the forensic process. The investigation found digital evidence of log activity, a status update on LinkedIn. Other results found in the investigation are 17 WiFi password, 117 download history, 263 phone calls, 1 file deleted, 1 file hidden, and 1 file raised, the research has reached the expected target.
APA, Harvard, Vancouver, ISO, and other styles
19

Ostrovsky, Oleg A. "THE VALUE OF DIGITAL EVIDENCE IN CRIMINAL INVESTIGATIONS." RUDN Journal of Law 23, no. 1 (December 15, 2019): 123–40. http://dx.doi.org/10.22363/2313-2337-2019-23-1-123-140.

Full text
Abstract:
Modern information systems, such as e-learning, e-voting, e-health, etc., are often used inappropriately for irregular data changes (data falsification). These facts force to review security measures and find a way to improve them. Proof of computer crime is accompanied by very complex processes that are based on the collection of digital evidence, forensic analysis and investigation. Forensic analysis of database systems is a very specific and complex task and therefore is the main source of inspiration for research. This article presents the fact that classical methods of collecting digital evidence are not suitable and effective. To improve efficiency, a combination of well-known, world-independent database technologies and their application in the field of forensic science are proposed. It also offers new directions for research in this area.
APA, Harvard, Vancouver, ISO, and other styles
20

Akremi, Aymen, Hassen Sallay, Mohsen Rouached, and Rafik Bouaziz. "Applying Digital Forensics to Service Oriented Architecture." International Journal of Web Services Research 17, no. 1 (January 2020): 17–42. http://dx.doi.org/10.4018/ijwsr.2020010102.

Full text
Abstract:
Digital forensics is an emerging research field involving critical technologies for obtaining evidence in digital crime investigations. Several methodologies, tools, and techniques have been developed to deal with the acquisition, preservation, examination, analysis, and presentation of digital evidence from different sources. However, new emerging infrastructures such as service-oriented architecture has brought new serious challenges for digital forensic research to ensure that evidence will be neutral, comprehensive, and reliable in such complex environment is a challenging research task. To address this issue, the authors propose in this article a generic conceptual model for digital forensics methodologies to enable their application in a service-oriented architecture. Challenges and requirements to construct a forensically sound evidence management framework for these environments are also discussed. Finally, the authors show how digital forensics standards and recommendations can be mapped to service-oriented architecture.
APA, Harvard, Vancouver, ISO, and other styles
21

Polański, Jan. "Dawn Raids and the Role of Forensic IT in Antitrust Investigations." Yearbook of Antitrust and Regulatory Studies 12, no. 21 (2020): 187–218. http://dx.doi.org/10.7172/1689-9024.yars.2020.13.21.7.

Full text
Abstract:
While digital markets attract much attention of the antitrust community, important developments also take place in relation to the way antitrust investigations are handled and evidence is preserved. More and more enforcement actions of antitrust authorities rely on the ability to find and preserve digital evidence of an illegal activity. This article focuses on recent case law developments in relation to the approach to forensic IT in antitrust enforcement and investigates whether enough leeway is left to the antitrust authorities to properly discharge their powers. The article focuses on the procedural developments at the EU level and in one EU national jurisdiction, i.e. Poland. The article concludes that the current approach to forensics in antitrust does not allow to use available capabilities to a full extent. A proposal is made for an alternative approach, which would benefit effective antitrust enforcement and due process.
APA, Harvard, Vancouver, ISO, and other styles
22

Kloosterman, Ate, Anna Mapes, Zeno Geradts, Erwin van Eijk, Carola Koper, Jorrit van den Berg, Saskia Verheij, Marcel van der Steen, and Arian van Asten. "The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system." Philosophical Transactions of the Royal Society B: Biological Sciences 370, no. 1674 (August 5, 2015): 20140264. http://dx.doi.org/10.1098/rstb.2014.0264.

Full text
Abstract:
In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms.
APA, Harvard, Vancouver, ISO, and other styles
23

Sarkar, Niladri. "Risk Mitigation and Quality Assurance in Digital Forensic Investigations." International Journal of Scientific and Research Publications (IJSRP) 9, no. 6 (June 6, 2019): p9022. http://dx.doi.org/10.29322/ijsrp.9.06.2019.p9022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dagher, Gaby G., and Benjamin C. M. Fung. "Subject-based semantic document clustering for digital forensic investigations." Data & Knowledge Engineering 86 (July 2013): 224–41. http://dx.doi.org/10.1016/j.datak.2013.03.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bas Seyyar, M., and Z. J. M. H. Geradts. "Privacy impact assessment in large-scale digital forensic investigations." Forensic Science International: Digital Investigation 33 (June 2020): 200906. http://dx.doi.org/10.1016/j.fsidi.2020.200906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hargreaves, Christopher, and Jonathan Patterson. "An automated timeline reconstruction approach for digital forensic investigations." Digital Investigation 9 (August 2012): S69—S79. http://dx.doi.org/10.1016/j.diin.2012.05.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Preda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation." Journal of Military Technology 3, no. 1 (June 26, 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.

Full text
Abstract:
The Internet of Things (IoT) integrates the Internet and electronic devices with applicability to a large spectrum of domains, from smart home automation, industrial processes, military applications, to health and environmental monitoring. Despite the clear advantages, from a forensically sound perspective, IoT can improve the accuracy and integrity of forensic investigations, but still requires extensive scientific validation in practice. In this paper, we review selected stateof-the-art challenges corresponding to digital forensics of IoT environments, and we present an empirical method on how to investigate a security incident reported for an IoT specific case - Smart Heating system.
APA, Harvard, Vancouver, ISO, and other styles
28

Nour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. "Anti- Forensics: The Tampering of Media." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 10 (October 31, 2020): 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.

Full text
Abstract:
In the context of forensic investigations, the traditional understanding of evidence is changing where nowadays most prosecutors, lawyers and judges heavily rely on multimedia signs. This modern shift has allowed the law enforcement to better reconstruct the crime scenes or reveal the truth of any critical event.In this paper we shed the light on the role of video, audio and photos as forensic evidences presenting the possibility of their tampering by various easy-to-use, available anti-forensics softwares. We proved that along with the forensic analysis, digital processing, enhancement and authentication via forgery detection algorithms to testify the integrity of the content and the respective source of each, differentiating between an original and altered evidence is now feasible. These operations assist the court to attain higher degree of intelligibility of the multimedia data handled and assert the information retrieved from each that support the success of the investigation process.
APA, Harvard, Vancouver, ISO, and other styles
29

Batten, Lynn, Lei Pan, and Nisar Khan. "Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations." International Journal of Digital Crime and Forensics 4, no. 4 (October 2012): 1–14. http://dx.doi.org/10.4018/jdcf.2012100101.

Full text
Abstract:
The need for an automated approach to forensic digital investigation has been recognized for some years, and several authors have developed frameworks in this direction. The aim of this paper is to assist the forensic investigator with the generation and testing of hypotheses in the analysis phase. In doing so, the authors present a new architecture which facilitates the move to automation of the investigative process; this new architecture draws together several important components of the literature on question and answer methodologies including the concept of ‘pivot’ word and sentence ranking. Their architecture is supported by a detailed case study demonstrating its practicality.
APA, Harvard, Vancouver, ISO, and other styles
30

M. Karie, Nickson. "Knowledge Management as a Strategic Asset in Digital Forensic Investigations." International Journal of Cyber-Security and Digital Forensics 7, no. 1 (2018): 10–20. http://dx.doi.org/10.17781/p002311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Montasari, Reza. "A standardised data acquisition process model for digital forensic investigations." International Journal of Information and Computer Security 9, no. 3 (2017): 229. http://dx.doi.org/10.1504/ijics.2017.085139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Montasari, Reza. "A standardised data acquisition process model for digital forensic investigations." International Journal of Information and Computer Security 9, no. 3 (2017): 229. http://dx.doi.org/10.1504/ijics.2017.10005908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Horsman, Graeme. "The different types of reports produced in digital forensic investigations." Science & Justice 61, no. 5 (September 2021): 627–34. http://dx.doi.org/10.1016/j.scijus.2021.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sudyana, Didik, Reza Tanujiwa Putra, and Soni Soni. "Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014." Sinkron 3, no. 2 (March 9, 2019): 67–72. http://dx.doi.org/10.33395/sinkron.v3i2.10029.

Full text
Abstract:
Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly
APA, Harvard, Vancouver, ISO, and other styles
35

Ho, Shuyuan Mary, and Mike Burmester. "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi." International Journal of Cyber Forensics and Advanced Threat Investigations 2, no. 1 (May 22, 2021): 29–49. http://dx.doi.org/10.46386/ijcfati.v2i1.22.

Full text
Abstract:
Any device can now connect to the Internet, and Raspberry Pi is one of the more popular applications, enabling single-board computers to make robotics, devices, and appliances part of the Internet of Things (IoT). The low cost and customizability of Raspberry Pi makes it easily adopted and widespread. Unfortunately, the unprotected Raspberry Pi device—when connected to the Internet—also paves the way for cyber-attacks. Our ability to investigate, collect, and validate digital forensic evidence with confidence using Raspberry Pi has become important. This article discusses and presents techniques and methodologies for the investigation of timestamp variations between different Raspberry Pi ext4 filesystems (Raspbian vs. UbuntuMATE), comparing forensic evidence with that of other ext4 filesystems (i.e., Ubuntu), based on interactions within a private cloud, as well as a public cloud. Sixteen observational principles of file operations were documented to assist in our understanding of Raspberry Pi’s behavior in the cloud environments. This study contributes to IoT forensics for law enforcement in cybercrime investigations.
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Soram, Myungseo Park, Sehoon Lee, and Jongsung Kim. "Smart Home Forensics—Data Analysis of IoT Devices." Electronics 9, no. 8 (July 28, 2020): 1215. http://dx.doi.org/10.3390/electronics9081215.

Full text
Abstract:
A smart home is a residence that provides a variety of automation services based on Internet of Things (IoT) devices equipped with sensors, cameras, and lights. These devices can be remotely controlled through controllers such as smartphones and smart speakers. In a smart home, IoT devices collect and process data related to motion, temperature, lighting control, and other factors and store more diverse and complex user data. This data can be useful in forensic investigations but it is a challenge to extract meaningful data from various smart home devices because they have different data storage methods. Therefore, data collection from different smart home devices and identification and analysis of data that can be used in digital forensics is crucial. This study focuses on how to acquire, classify, and analyze smart home data from Google Nest Hub, Samsung SmartThings, and Kasa cam for forensic purposes. We thus analyzed the smart home data collected using companion apps, Web interfaces, and APIs to identify meaningful data available for the investigation. Moreover, the paper discusses various types of smart home data and their usage as core evidence in some forensic scenarios.
APA, Harvard, Vancouver, ISO, and other styles
37

Keim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.

Full text
Abstract:
New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These new devices are sometimes also shipped with OSes that are developed by open source communities and are otherwise never seen by investigators. Ubuntu Touch is one of these OSes and is currently being developed for deployment on the PinePhone. There is little research behind both the device and OS on what methodology an investigator should follow to reliably and accurately extract data. This results in potentially flawed methodologies being used before any testing can occur and contributes to the backlog of devices that need to be processed. Therefore, in this paper, the first forensic analysis of the PinePhone device with Ubuntu Touch OS is performed using Autopsy, an open source tool, to establish a framework that can be used to examine and analyze devices running the Ubuntu Touch OS. The findings include analysis of artifacts that could impact user privacy and data security, organization structure of file storage, app storage, OS, etc. Moreover, locations within the device that stores call logs, SMS messages, images, and videos are reported. Interesting findings include forensic artifacts, which could be useful to investigators in understanding user activity and attribution. This research will provide a roadmap to the digital forensic investigators to efficiently and effectively conduct their investigations where they have Ubuntu Touch OS and/or PinePhone as the evidence source.
APA, Harvard, Vancouver, ISO, and other styles
38

Paligu, Furkan, and Cihan Varol. "Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage." Future Internet 12, no. 11 (October 28, 2020): 184. http://dx.doi.org/10.3390/fi12110184.

Full text
Abstract:
Digital Evidence is becoming an indispensable factor in most legal cases. However, technological advancements that lead to artifact complexity, are forcing investigators to create sophisticated connections between the findings and the suspects for admissibility of evidence in court. This paper scrutinizes whether IndexedDB, an emerging browser technology, can be a source of digital evidence to provide additional and correlating support for traditional investigation methods. It particularly focuses on the artifacts of the worldwide popular application, WhatsApp. A single case pretest–posttest quasi experiment is applied with WhatsApp Messenger and Web Application to populate and investigate artifacts in IndexedDB storage of Google Chrome. The findings are characterized and presented with their potential to be utilized in forensic investigation verifications. The storage locations of the artifacts are laid out and operations of extraction, conversion and presentation are systematized. Additionally, a proof of concept tool is developed for demonstration. The results show that WhatsApp Web IndexedDB storage can be employed for time frame analysis, demonstrating its value in evidence verification.
APA, Harvard, Vancouver, ISO, and other styles
39

Yeboah-Boateng, Ezer Osei, and Elvis Akwa-Bonsu. "Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-crimes." Journal of Cyber Security and Mobility 4, no. 2 (2016): 87–104. http://dx.doi.org/10.13052/jcsm2245-1439.425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Eskidere, Ömer. "Source Digital Voice Recorder Identification by Wavelet Analysis." International Journal on Artificial Intelligence Tools 25, no. 03 (June 2016): 1650016. http://dx.doi.org/10.1142/s0218213016500160.

Full text
Abstract:
Identification of the speech signal origin is an important issue since it may play a vital role for criminal and forensic investigations. Yet, in the media forensics field, source digital voice recorder (DVR) identification has not been given much attention. In this paper we study the effect of subband based features obtained using uniform wavelet packet decomposition and Teager energy operator on the DVR model and brand identification performance. In order to assess the effects of these features on the proposed system, one-class classifiers (OCCs) with two reference multi-class classifiers were carried out. The performance of the DVR identification system is tested on a custom database of twelve portable DVRs of six different brands. The results showed that the proposed system can effectively identify the correct DVR brands/models with a high accuracy. Moreover, it was observed that the combination of the traditional speech features with subband Teager energy cepstral parameters (STEC) and short time frame energy as a feature improved recognition accuracy under both silent and noisy recording conditions.
APA, Harvard, Vancouver, ISO, and other styles
41

Çakır, Huseyin, and Mehmet Serkan Kılıç. "The keyword search method and its importance in computer forensics Adli bilişimde anahtar kelime araması metodu ve önemi." Journal of Human Sciences 13, no. 1 (April 26, 2016): 2368. http://dx.doi.org/10.14687/ijhs.v13i1.3401.

Full text
Abstract:
In this study “keyword search method” used in the filed of digital forensics sciences is investigated. Similar to using search engines on internet investigations, using keyword search method of computer forensics investigations has too much benefits. In the study, keyword search method loop of preparing of electronic data, indexing, query with keywords, matching on database and showing results to the users are explained. Also information of keyword search method on different data type such as forensic image data, live forensics data, static data and cloud computing data are discussed.The importance of using keyword search method on computer forensics is examined in 5 different aspect as rapid and effective computer forensics investigations, contribution to privacy, relational analysis of human-event-computing device, creating dictionary for decrypt passwords and recover some deleted data and detect steganography data. In this context, all-round about using keyword searches’ contribution to computer forensics investigation are evaluated. Finally, some examples about computer forensics tools are handled. ÖzetBu çalışmada, adli bilişim biliminde kullanılan “anahtar kelime araması metodu” incelenmiştir. İnternet araştırmalarında yaygın olarak kullanılan arama motorlarına benzer şekilde adli bilişim çalışmalarında da anahtar kelime araması metodu kullanılmasının çok faydası bulunmaktadır. Çalışmada; elektronik verilerin hazırlanması, verilerin indekslenmesi, anahtar kelimeler sorgusu, veri tabanı üzerinde eşleştirme yapılması ve kullanıcıya sonuçlarının gösterilmesi şeklinde oluşan anahtar kelime araması metodu açıklanmış ve adli kopya verileri, canlı sistem verileri, sabit veriler ve bulut bilişim verileri üzerinde anahtar kelime araması hakkında bilgi verilmiştir.Adli bilişim çalışmaları sürecinde anahtar kelime araması metodunun kullanımının önemi; hızlı ve etkili bir adli bilişim çalışması yapılması, özel hayatın gizliliğine katkı sağlaması, şahıs-olay-bilgisayar medyası arasında ilişki analizi kurulması, sözlük oluşturulması ve şifre tespiti ile silinmiş ve gizlenmiş verilerin tespiti olmak üzere 5 farklı açıdan irdelenmiştir. Bu bağlamda anahtar kelime araması metodunun elektronik delil elde etme çalışmalarına sağlayacağı katkı çok yönlü olarak ele alınmış ayrıca adli bilişim yazılımları özelinde örnekler verilmeye çalışılmıştır.
APA, Harvard, Vancouver, ISO, and other styles
42

Faheem, Muhammad, Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 1–19. http://dx.doi.org/10.4018/ijdcf.2015040101.

Full text
Abstract:
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Yunhyong, and Seamus Ross. "Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving." International Journal of Digital Curation 7, no. 2 (October 23, 2012): 21–39. http://dx.doi.org/10.2218/ijdc.v7i2.227.

Full text
Abstract:
In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.
APA, Harvard, Vancouver, ISO, and other styles
44

Renaud, Karen, Ivano Bongiovanni, Sara Wilford, and Alastair Irons. "PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations." Science & Justice 61, no. 5 (September 2021): 477–92. http://dx.doi.org/10.1016/j.scijus.2021.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Graeme, Horsman. "Part 1:- quality assurance mechanisms for digital forensic investigations: Introducing the Verification of Digital Evidence (VODE) framework." Forensic Science International: Reports 2 (December 2020): 100038. http://dx.doi.org/10.1016/j.fsir.2019.100038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Haggerty, John, Sheryllynne Haggerty, and Mark Taylor. "Forensic triage of email network narratives through visualisation." Information Management & Computer Security 22, no. 4 (October 7, 2014): 358–70. http://dx.doi.org/10.1108/imcs-11-2013-0080.

Full text
Abstract:
Purpose – The purpose of this paper is to propose a novel approach that automates the visualisation of both quantitative data (the network) and qualitative data (the content) within emails to aid the triage of evidence during a forensics investigation. Email remains a key source of evidence during a digital investigation, and a forensics examiner may be required to triage and analyse large email data sets for evidence. Current practice utilises tools and techniques that require a manual trawl through such data, which is a time-consuming process. Design/methodology/approach – This paper applies the methodology to the Enron email corpus, and in particular one key suspect, to demonstrate the applicability of the approach. Resulting visualisations of network narratives are discussed to show how network narratives may be used to triage large evidence data sets. Findings – Using the network narrative approach enables a forensics examiner to quickly identify relevant evidence within large email data sets. Within the case study presented in this paper, the results identify key witnesses, other actors of interest to the investigation and potential sources of further evidence. Practical implications – The implications are for digital forensics examiners or for security investigations that involve email data. The approach posited in this paper demonstrates the triage and visualisation of email network narratives to aid an investigation and identify potential sources of electronic evidence. Originality/value – There are a number of network visualisation applications in use. However, none of these enable the combined visualisation of quantitative and qualitative data to provide a view of what the actors are discussing and how this shapes the network in email data sets.
APA, Harvard, Vancouver, ISO, and other styles
47

LEE, Sangwook, Ji Eun SONG, Wan Yeon LEE, Young Woong KO, and Heejo LEE. "Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations." IEICE Transactions on Information and Systems E98.D, no. 1 (2015): 95–97. http://dx.doi.org/10.1587/transinf.2014mul0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Dolliver, Diana S., Carson Collins, and Beau Sams. "Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context." Digital Investigation 23 (December 2017): 124–37. http://dx.doi.org/10.1016/j.diin.2017.10.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Overill, Richard E., and Jan Collie. "Quantitative evaluation of the results of digital forensic investigations: a review of progress." Forensic Sciences Research 6, no. 1 (January 2, 2021): 13–18. http://dx.doi.org/10.1080/20961790.2020.1837429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Naru, A. S., and E. Dykes. "Digital image cross-correlation technique for bite mark investigations." Science & Justice 37, no. 4 (October 1997): 251–58. http://dx.doi.org/10.1016/s1355-0306(97)72199-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography