To see the other types of publications on this topic, follow the link: Digital forensic process.

Journal articles on the topic 'Digital forensic process'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital forensic process.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Boateng, Bismark. "Mobile Device’s Digital Forensic Process Model." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 267–72. http://dx.doi.org/10.22624/aims/crp-bk3-p43.

Full text
Abstract:
The primary goal is to compare various digital forensics process models, particularly mobile devices. One must conduct investigations forensically to prosecute digital offenders, with the resulting evidence acknowledged in a court of law. Digital forensic process models outline the necessary procedures that one must follow to ensure a successful enquiry. Keywords: Mobile Devices, Digital Devices, Digital Evidence and Smartphone BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free
APA, Harvard, Vancouver, ISO, and other styles
2

Dr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.

Full text
Abstract:
Forensics is a constantly improvising field which can be said as an application of science to the legal process. Digital forensics is a division of forensic science detailing the recovery and investigation of material found in digital devices, frequently in relation to computer based crimes. The term digital forensics was initially used as a synonym for computer forensics and has extended to wrap investigation of all devices capable of storing digital data. Branches of forensic science are embedded in every branch of science and many other aspects of Digital era because of its capability to un
APA, Harvard, Vancouver, ISO, and other styles
3

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e.,
APA, Harvard, Vancouver, ISO, and other styles
4

Al Jum'ah, Muhammad Na'im, Hamid Wijaya, and Rima Ruktiari Ismail. "Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly." Cyber Security dan Forensik Digital 6, no. 2 (2024): 48–53. http://dx.doi.org/10.14421/csecurity.2023.6.2.4265.

Full text
Abstract:
Perkembangan teknologi yang semakin pesat dapat menjadi dampak posistif dan dapat negatif. Dampak positifnya adalah proses penyebaran informasi yang semakin cepat, namun dampak negatifnya adalah banyaknya informasi hoax dan hate space yang terjadi di media sosial akibat tidak adanya filter dan pengecekan keabsahan informasi. Hal ini juga mengakibatkan banyaknya tindak kejahatan yang terjadi di media sosial. Salah satu pemecahan masalah dengan banyaknya kasus yang terjadi akibat penyalahgunaan media sosial adalah dengan melakukan proses invesitgasi forensic pada social media. Proses investigasi
APA, Harvard, Vancouver, ISO, and other styles
5

Rochmadi, Tri, Abdul Fadlil, and Imam Riadi. "Tinjauan Pustaka Sistematis: Tantangan Dan Faktor-Faktor Pengembangan Kesiapan Forensik Digital." Cyber Security dan Forensik Digital 7, no. 2 (2024): 81–89. https://doi.org/10.14421/csecurity.2024.7.2.4861.

Full text
Abstract:
Teknologi informasi telah mengubah hampir segala lini kehidupan dari konvensional ke digitalisasi. Digitalisasi yang begitu cepat, menimbulkan permasalahan pada serangan siber yang belum diimbangi oleh penanganan insiden siber. Kesiapan forensik digital menjadi hal penting bagi organisasi agar proses penanganan insiden lebih efektif dan efisien. Tujuan penelitian ini adalah mengidentifikasi faktor-faktor dan tantangan terkait topik kesiapan digital forensik. Metode yang digunakan dalam penelitian ini menggunakan metode tinjauan pustaka sistematis. Hasil yang didapatkan pada penelitian ini memb
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic
APA, Harvard, Vancouver, ISO, and other styles
7

Hakim, Muhamad Faishol, and Alamsyah Alamsyah. "Development of Digital Forensic Framework for Anti-Forensic and Profiling Using Open Source Intelligence in Cyber Crime Investigation." Recursive Journal of Informatics 2, no. 2 (2024): 114–23. http://dx.doi.org/10.15294/rji.v2i2.73731.

Full text
Abstract:
Abstract. Cybercrime is a crime that increases every year. The development of cyber crime occurs by utilizing mobile devices such as smartphones. So it is necessary to have a scientific discipline that studies and handles cybercrime activities. Digital forensics is one of the disciplines that can be utilized in dealing with cyber crimes. One branch of digital forensic science is mobile forensics which studies forensic processes on mobile devices. However, in its development, cybercriminals also apply various techniques used to thwart the forensic investigation process. The technique used is ca
APA, Harvard, Vancouver, ISO, and other styles
8

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirement
APA, Harvard, Vancouver, ISO, and other styles
9

Venter, Hein, and Ivan Burke. "The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1721–40. https://doi.org/10.3217/jucs-018-12-1721.

Full text
Abstract:
Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cybercrime. WLAN digital forensics is seen as not only a response to cybercrime in wireless networks, but also a means to stem the increase of cybercrime in WLANs. The challenge in WLAN digital forensics is to intercept and preserve all the communications generated by the mobile stations and to conduct a proper digital forensic investigation. This
APA, Harvard, Vancouver, ISO, and other styles
10

Holdberh, Natalia, and Viktoriya Kolonska. "DIGITAL FORENSICS IN MARTIAL LAW." Scientific works of National Aviation University Series Law Journal "Air and Space Law" 4, no. 73 (2024): 213–18. https://doi.org/10.18372/2307-9061.73.19470.

Full text
Abstract:
The purpose of the article is to study a new area of forensics - digital forensics. Research methods: the article uses the hermeneutic method, the method of classification, logical methods (analysis, synthesis, induction, deduction, generalization, etc.), and the method of systematization. Results: the article explores a new branch of forensics, namely digital forensics. Digital forensics is becoming increasingly important and is becoming one of the main components of traditional forensics. Knowledge of digital forensics is used in many investigative actions and in the process of appointing re
APA, Harvard, Vancouver, ISO, and other styles
11

Kohn, M. D., M. M. Eloff, and J. H. P. Eloff. "Integrated digital forensic process model." Computers & Security 38 (October 2013): 103–15. http://dx.doi.org/10.1016/j.cose.2013.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Firdonsyah, Arizona, Purwanto Purwanto, and Imam Riadi. "Framework for Digital Forensic Ethical Violations: A Systematic Literature Review." E3S Web of Conferences 448 (2023): 01003. http://dx.doi.org/10.1051/e3sconf/202344801003.

Full text
Abstract:
Handling digital forensic cases plays a critical role in maintaining public interest and trust. However, the lack of an ethical code in digital forensics work processes can compromise the integrity and reliability of inspection results. This study aims to address this issue by conducting a systematic literature review (SLR) to explore existing standards for digital forensic frameworks. This study uses SLR techniques to identify and map various digital forensic investigation processes described in the literature. While there are some topics that address digital forensic frameworks in this revie
APA, Harvard, Vancouver, ISO, and other styles
13

Malik, Basit Ahmad. "Provocations Open Problems Encountered By Digital Forensics Ensuing Trends in Near Future." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 879–83. https://doi.org/10.31142/ijtsrd16955.

Full text
Abstract:
There has been a substantial and extensive use of Internet and technology in present day life which relatively has made the digital devices apropos to criminal investigations or legal prosecutions. Investigating huge amount of digital evidence consisting of data in various formats requires a digital forensic analysis or cyber forensics . As the number of cases keeps on growing continuously, it is expected that the digital forensic analysis will increase significantly in near future. The forensic process involves the examination of digital devices which include computers, cell phones, devices s
APA, Harvard, Vancouver, ISO, and other styles
14

Alex, Makheti, Gilbert Gilibrays Ocen, Badru Lusiba, et al. "A Process Model to Enhance the Accuracy of Digital Forensic Investigations: A case of National Identification and Registration Authority (NIRA-Uganda)." East African Journal of Information Technology 5, no. 1 (2022): 216–43. http://dx.doi.org/10.37284/eajit.5.1.1015.

Full text
Abstract:
The field of digital forensics has become commonplace due to the increasing prevalence of technology since the late 20th century and the inevitable relevance of this technology in the conducting of criminal activity. In traditional forensics, the evidence is generally something tangible that could identify the criminal, such as hair, blood or fingerprints. In contrast, digital forensics deals with files and data in digital form extracted from digital devices like computers, and phones, among other digital devices, meaning is derived from the fact that a computer or computerised device is the s
APA, Harvard, Vancouver, ISO, and other styles
15

Baroto, Wishnu Agung. "Advancing Digital Forensic through Machine Learning: An Integrated Framework for Fraud Investigation." Asia Pacific Fraud Journal 9, no. 1 (2024): 1–16. http://dx.doi.org/10.21532/apfjournal.v9i1.346.

Full text
Abstract:
The rise of cybercrime and cyber-related crime encourages efficient digital forensic investigations more crucial than ever before. Traditional investigation methods can be time-consuming, costly, and resource-intensive, while machine learning algorithms have the potential to reduce the complexity by promoting automation and investigation capabilities. This study begins with an analysis of digital forensics framework using a document analysis methodology. Moreover, exploring current practice and potential implementation of machine learning in digital forensics for fraud investigation is demonst
APA, Harvard, Vancouver, ISO, and other styles
16

Saniyazova, Yerkemay, Renat Mediyev, Elmira Saitova, Gulzat Utegenova, and Aisaulem Kzylkhojayeva. "Advancing Forensic Science in Kazakhstan." Law, State and Telecommunications Review 16, no. 2 (2024): 48–68. https://doi.org/10.26512/lstr.v16i2.49190.

Full text
Abstract:
[Purpose] The purpose of the article was to study digital forensics, its role in the Kazakh legal system and the process of investigating cybercrime. [Methodology] Analysis, synthesis, comparison, deduction, generalization, abstraction, formal legal methods of scientific research were used. [Findings] A result, it was proved that forensics is an indispensable component of the future development of forensic science in Kazakhstan. It has been established that digital forensics enables speeding up the process of solving cybercrimes, as well as determining their sources and prerequisites. Thus, on
APA, Harvard, Vancouver, ISO, and other styles
17

Grobler, Marthie. "The Need for Digital Evidence Standardisation." International Journal of Digital Crime and Forensics 4, no. 2 (2012): 1–12. http://dx.doi.org/10.4018/jdcf.2012040101.

Full text
Abstract:
Continuous developments in forensic processes and tools have aided in elevating the positioning of digital forensics within the legal system. The equally continuous developments in technology and electronic advances, however, are making it more difficult to match forensic processes and tools with the advanced technology. Therefore, it is necessary to create and maintain internationally accepted standards to control the use and application of digital forensic processes. This article addresses this need and touches on the motivation for such internationally recognised standards on digital eviden
APA, Harvard, Vancouver, ISO, and other styles
18

Nasrulloh, Imam Mahfudl, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 5 (2019): 509. http://dx.doi.org/10.25126/jtiik.2019651516.

Full text
Abstract:
<p class="Abstrak">Teknologi komputer pada empat tahun terahir ini mengalami perkembangan yang pesat. Bersamaan dengan itu juga berdampak negatif salah satunya adalah berupa kejahatan komputer. Kejahatan komputer akan meninggalkan jejak aktivitas kejahatan, maka perlu dilakukan analisa dengan ilmu dan metode forensik untuk mendapatkan barang bukti. Bagaimana jika terjadi kejahatan komputer pada media penyimpanan komputer berjenis <em>non-volatile memory</em> dan dilakukan secara <em>live</em> forensik<em>.</em> Pada penelitian ini dilakukan proses fore
APA, Harvard, Vancouver, ISO, and other styles
19

Arizona, Nanda Diaz, Muhammad Agung Nugroho, Ahmad Rois Syujak, Rizqi Kurniawan Saputra, and Istri Sulistyowati. "Metadata Forensic Analysis as Support for Digital Investigation Process by Utilizing Metadata-Extractor." Journal of Intelligent Software Systems 3, no. 2 (2024): 27. https://doi.org/10.26798/jiss.v3i2.1503.

Full text
Abstract:
Abstract — The rapid development of technology in the current era, in addition to providing positive impacts, certainly also has negative impacts. In Indonesia, based on data from the Cyber Crime Directorate (Dittipidsiber) website, the crime rate related to the ITE Law (Information and Electronic Transactions) is increasing day by day. This encourages digital forensic investigators to be able to develop a concept or method that can be adjusted to digital cases, for example cases of digital data manipulation such as photos or documents. Metadata is an information structure that describes, expl
APA, Harvard, Vancouver, ISO, and other styles
20

Vadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.

Full text
Abstract:
In the modern life, there is a rapid increase in the usage of the technology. One reason of increasing the technology is usage of cloud. The mobile devices or any other technological devices mainly depend on cloud. The cloud can be accessible from anywhere. Cloud forensic process had introduced to help the investigators to find the evidence when the criminal attacks the cloud and to maintain the integrity and security for the data stored in the cloud. The increasing in the criminal attacks in cloud, made the investigators to find the latest methods for the forensic investigation process. Simil
APA, Harvard, Vancouver, ISO, and other styles
21

Alexander, Cheryl Ann, and Lidong Wang. "Cyber Forensic Reporting: Benefits, Elements, Process, Expert Witnesses, and Ethical Considerations." International Journal of Criminology and Sociology 14 (July 10, 2025): 129–35. https://doi.org/10.6000/1929-4409.2025.14.12.

Full text
Abstract:
Cyber forensic reporting creates a complete and evidence-based record. Appropriate cyber forensic reporting includes the investigation process with compliance and legal evidence, analysis, findings, and actionable recommendations for legal admissibility. In healthcare, cyber forensic reporting helps improve compliance with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and facilitates the detection of vulnerabilities. This paper deals with cyber forensic reporting, which includes its benefits, elements, and process; expert witnesses; and ethical considerati
APA, Harvard, Vancouver, ISO, and other styles
22

Narayana Samy, Ganthan, Nurazean Maarop, Doris Hooi-Ten Wong, et al. "Proposed Proactive Digital Forensic Approach for Cloud Computing Environment." International Journal of Engineering & Technology 7, no. 4.15 (2018): 12. http://dx.doi.org/10.14419/ijet.v7i4.15.21362.

Full text
Abstract:
There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multi-tenancy, multi-stakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approa
APA, Harvard, Vancouver, ISO, and other styles
23

Tuharea, Ibnu Rohan, Ahmad Luthfi, and Erika Ramadani. "Enhancing Digital Forensic Investigation: A Focus on Compact Electronic Devices and Social Media Metadata." Journal of Information Systems and Informatics 5, no. 4 (2023): 1385–401. http://dx.doi.org/10.51519/journalisi.v5i4.594.

Full text
Abstract:
The rise of portable electronic devices and social media has led to new criminal activities, necessitating advancements in digital forensics. This paper introduces Small-Scale Digital Device Forensics (SSDDF), focusing on the forensic examination of miniature digital devices often used in crimes. SSDDF addresses the challenges posed by these devices, particularly in extracting and analyzing data from them. A key aspect of this research is exploring ontology in social media forensics, particularly within the Android operating system. This involves extracting digital evidence like user accounts,
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2022): 412. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp412-420.

Full text
Abstract:
Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-ori
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2023): 412–20. https://doi.org/10.11591/ijeecs.v29.i1.pp412-420.

Full text
Abstract:
Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-ori
APA, Harvard, Vancouver, ISO, and other styles
26

Kausar Parveen. "Digital Investigations: Navigating Challenges in Tool Selection for Operating System Forensics." International Journal for Electronic Crime Investigation 8, no. 1 (2024): 79–92. http://dx.doi.org/10.54692/ijeci.2024.0801189.

Full text
Abstract:
The process of gathering, identifying, extracting, and documenting electronic evidence for use in court is known as "digital forensics." We have a lot of tools at our disposal to make this procedure quick and straightforward. Four tools have been selected for investigation and analysis in this work. For every kind of digital forensics, the top tools have been selected based on several criteria. For computer forensic tools, (Stellar and Forensic Tool Kit) have been investigated; for network forensic tools, Network Map has been selected, and OSF mount has been examined as a live forensic tool. O
APA, Harvard, Vancouver, ISO, and other styles
27

Zamsari, Febriand Gysberth Pariela, and Teguh Wahyono. "Forensic Investigation of Digital Evidence on Flash Disk with Forensic Process Method Based on NIST." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 11, no. 1 (2024): 88–96. http://dx.doi.org/10.33019/jurnalecotipe.v11i1.4489.

Full text
Abstract:
Flash disk merupakan barang yang tidak lepas dari kehidupan sehari-hari. Dengan Flash disk pengguna dapat menyimpan beberapa daya penting baik bagi pribadi maupun perusahaan. Selain itu, tidak dapat disangkal bahwa banyak kasus-kasus hukum di Indonesia yang menjadikan Flash disk sebagai barang bukti. UU ITE (Undang-undang Informasi dan Transaksi Elektronik) mengatur tentang bagaimana ketentuan bagaimana barang bukti digital menjadi barang bukti yang kuat di persidangan. Penelitian ini melakukan studi investigasi forensik terhadap bukti digital pada Flashdisk dengan empat skenario percobaan. Pe
APA, Harvard, Vancouver, ISO, and other styles
28

Igonor, Oshoke Samson, Muhammad Bilal Amin, and Saurabh Garg. "The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review." Blockchains 3, no. 1 (2025): 5. https://doi.org/10.3390/blockchains3010005.

Full text
Abstract:
Blockchain technology has risen in recent years from its initial application in finance to gain prominence across diverse sectors, including digital forensics. The possible application of blockchain technology to digital forensics is now becoming increasingly explored with many researchers now looking into the unique inherent properties that blockchain possesses to address the inherent challenges in this sector such as evidence tampering, the lack of transparency, and inadmissibility in court. Despite the increasing interest in integrating blockchain technology into the field of digital forens
APA, Harvard, Vancouver, ISO, and other styles
29

Horsman, Graeme, and Nina Sunde. "Unboxing the digital forensic investigation process." Science & Justice 62, no. 2 (2022): 171–80. http://dx.doi.org/10.1016/j.scijus.2022.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Omeleze, Stacey, and Hein S. Venter. "Digital forensic application requirements specification process." Australian Journal of Forensic Sciences 51, no. 4 (2017): 371–94. http://dx.doi.org/10.1080/00450618.2017.1374456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mantiri, Astria Santa Natalia, and Elvis Sumanti. "THE ROLE OF DIGITAL FORENSICS IN THE PRELIMINARY INVESTIGATION." Klabat Accounting Review 3, no. 1 (2022): 79. http://dx.doi.org/10.60090/kar.v3i1.821.79-95.

Full text
Abstract:
In this era, technological developments have a significant influence in business. However, many taxpayers abuse the use of technology to commit fraud. Therefore, there needs to be a system that can filter and detect data of taxpayers who commit fraud. This research is conducted to analyze digital forensics' role in dealing with fraud and to determine the critical success factors that support the digital forensics in detecting fraud. This study uses qualitative reasearch where the author wanted to find out the role of Digital Forensics in the Preliminary Evidence Examination by interviewing the
APA, Harvard, Vancouver, ISO, and other styles
32

Wodugah, Francis. "SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 55–58. http://dx.doi.org/10.22624/aims/crp-bk3-p9.

Full text
Abstract:
The number of cyber incidents in which computer system or device is currently increasing every day. This requiring the opening up of forensic investigations in to multi-purpose forensic operating system for digital forensic process, a research that can shed light on what has occurred, In order to be able to provide investigators with proper solutions. for performing complete and efficient examinations in this new environment, operating systems platform and devices are being studied from a forensic perspective so that tools and procedures can be designed accordingly Keywords: Forensic Investiga
APA, Harvard, Vancouver, ISO, and other styles
33

Surayyo, Yusupova, Radjabova Madina, Abdullayev Ibrohim, and Avazbekov Mirsaid. "RESEARCH CHALLENGES & OPEN PROBLEMS IN DIGITAL FORENSICS (DF)." RESEARCH AND EDUCATION 2, no. 1 (2023): 80–89. https://doi.org/10.5281/zenodo.7530249.

Full text
Abstract:
Digital forensics is a branch of forensic science concerned with the use of digital information produced, stored and transmitted by computers as source of evidence in investigations and legal proceedings. Digital forensics has existed for as long as computers have stored data that could be used as evidence.  For many years, digital forensics was performed primarily by government agencies, but has become common in the commercial sector over the past several years.  Originally, much of the analysis software was custom and proprietary and eventually specialized analysis software was mad
APA, Harvard, Vancouver, ISO, and other styles
34

Jiang, Jian Guo, Bo Yang, Sen Lin, Ming Xing Zhang, and Kun Ying Liu. "A Practical Approach for Digital Forensic Triage." Applied Mechanics and Materials 742 (March 2015): 437–44. http://dx.doi.org/10.4028/www.scientific.net/amm.742.437.

Full text
Abstract:
In order to uncover truths to serve justice, case-related data collected from a digital investigation requires substantial resources to analyze, especially in time-critical situations. At present, however, digital forensics has not evolved to meet this ever-increasing demand. Digital forensic triage is a promising solution, as it is designed to maximize the use of resources according to a system of priorities, and hence the efficiency and effectiveness of forensic examinations can be increased. Nevertheless, the lack of concrete methods limits efforts to implement triage. This paper presents a
APA, Harvard, Vancouver, ISO, and other styles
35

Parra de Gallo, Herminia Beatriz, and Marcela Vegetti. "OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics." JUCS - Journal of Universal Computer Science 29, no. 12 (2023): 1482–509. http://dx.doi.org/10.3897/jucs.97822.

Full text
Abstract:
This paper shows the research conducted to respond to a continuous requirement of justice regarding the application of scientifically supported forensic tools. Considering ontological engineering as the appropriate framework to respond to this requirement, the article presents OntoFoCE (Spanish abbreviation for Ontology for Electronic Mail Forensics), a specific ontology for the forensic analysis of emails. The purpose of this ontology is to help the computer expert in the validation of an email presented as judicial evidence. OntoFoCE is the fundamental component of the ObE Forensics (Ontolog
APA, Harvard, Vancouver, ISO, and other styles
36

Parra, de Gallo Herminia Beatriz, and Marcela Vegetti. "OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics." JUCS - Journal of Universal Computer Science 29, no. (12) (2023): 1482–509. https://doi.org/10.3897/jucs.97822.

Full text
Abstract:
This paper shows the research conducted to respond to a continuous requirement of justice regarding the application of scientifically supported forensic tools. Considering ontological engineering as the appropriate framework to respond to this requirement, the article presents OntoFoCE (Spanish abbreviation for Ontology for Electronic Mail Forensics), a specific ontology for the forensic analysis of emails. The purpose of this ontology is to help the computer expert in the validation of an email presented as judicial evidence. OntoFoCE is the fundamental component of the ObE Forensics (Ontolog
APA, Harvard, Vancouver, ISO, and other styles
37

Alqahtany, Saad Said, and Toqeer Ali Syed. "ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management." Information 15, no. 2 (2024): 109. http://dx.doi.org/10.3390/info15020109.

Full text
Abstract:
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice. To address this, we developed a generic methodology integrating each forensic transaction into an immutable blockchain entry, establishing transparency and authenticity from data preservation to final reporting. Our framework was designed to manage a wide range of forensic applications across different domains, including technology-focused areas s
APA, Harvard, Vancouver, ISO, and other styles
38

Fakhriansyah, Amru Rizal, and Ahmad Luthfi. "Development of Xiaomi Product Mobile Forensic Acquisition Framework on Second Space Features Based on SNI/ISO 27037:2014." JURNAL INFOTEL 16, no. 2 (2024): 255–72. http://dx.doi.org/10.20895/infotel.v16i2.1091.

Full text
Abstract:
Abstract — In conducting digital forensic activities, it must follow the rules of SOP procedures or frameworks as a reference. One of the acquisition frameworks used in digital forensics practice is ISO 27037:2014, which contains specific guidelines related to digital forensic investigation activities. On the other hand, mobile cellular is one of the branches of digital forensics that is always developing, but with the large variety of mobile devices today, ISO 27037: 2014 has not provided specific standards in the digital forensics process on mobile devices that have special features that are
APA, Harvard, Vancouver, ISO, and other styles
39

Meshram, Bandu B., Vikas Mendhe, and Manish Kumar Singh. "Medical Forensics Principles and Cyber Crime Forensic Investigation Model." Journal of Web Applications and Cyber Security 2, no. 1 (2024): 1–17. http://dx.doi.org/10.48001/jowacs.2024.211-17.

Full text
Abstract:
The paper deals with medical principles of forensic and their proposed utilization in computer forensic. This paper explores how the medical/traditional forensic science law principles like individuality, exchange, progressive change, comparison analysis, facts do not lie are useful in cybercrime forensic investigation with forensic principles applicability cybercrime scenarios with case law. Lastly the research explores the Digital forensics methodology useful for the prosecution of digital criminals. The researchers have done extensive literature survey of the existing crime investigation fo
APA, Harvard, Vancouver, ISO, and other styles
40

Dwi Lestari, Yuyun, Yessi Fitri Annisah Lubis, and Fadli Akbar Siregar. "Analisis Perbandingan Kinerja Root Explorer Dan Oxygen Forensic Detective Pada Forensic Digital." Jurnal Syntax Fusion 3, no. 08 (2023): 832–46. http://dx.doi.org/10.54543/fusion.v3i08.350.

Full text
Abstract:
Rapid information and communication technology has a positive impact in the form of speed and ease of obtaining information and data by using an Android-based smartphone. But, on the other hand, it also has a negative impact in the form of cybercrime. This study aims to raise evidence of digital data and information in identifying pornographic crime cases using the Tantan app. The forensics analysis process in this study uses the National Institute of Justice (NIJ) method and 1 forensic tool, namely Oxygen Forensics Detective. The research scenario is the occurrence of pornography crimes. The
APA, Harvard, Vancouver, ISO, and other styles
41

Maulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.

Full text
Abstract:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mo
APA, Harvard, Vancouver, ISO, and other styles
42

Montasari, Reza. "A comprehensive digital forensic investigation process model." International Journal of Electronic Security and Digital Forensics 8, no. 4 (2016): 285. http://dx.doi.org/10.1504/ijesdf.2016.079430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lutui, Raymond. "A multidisciplinary digital forensic investigation process model." Business Horizons 59, no. 6 (2016): 593–604. http://dx.doi.org/10.1016/j.bushor.2016.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Jian, Zhen Min Tang, and Xian Li Jin. "An OCL-Based Formal Model for Cloud Forensics." Advanced Materials Research 989-994 (July 2014): 1513–16. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1513.

Full text
Abstract:
Cloud Computing is gaining acceptance and increasing in popularity. However, digital forensics within Cloud becomes difficult. This paper proposes an extensible semantic model using OCL (Object Constraint Language) for cloud digital forensics data. We give a brief introduction to Trusted Digital Forensics, and then detail the modeling process using OCL and FODA (Feature Oriented Domain Analysis). Therefore, a feature tree can be built with semantic logical relation in order to get the overall semantic description of features in the forensic domain of digital data.
APA, Harvard, Vancouver, ISO, and other styles
45

Aidil Wijaya Kusuma, Erick Irawadi Alwi, and Ramdaniah Ramdaniah. "Analisis Bukti Digital Pada Media Penyimpanan Flash Disk Menggunakan Metode National Institute Of Standards And Technology (NIST)." Cyber Security dan Forensik Digital 7, no. 1 (2024): 18–24. http://dx.doi.org/10.14421/csecurity.2024.7.1.4345.

Full text
Abstract:
Dalam perkembangan teknologi digital yang semakin pesat, analisis bukti digital menjadi semakin penting dalam mendukung penegakan hukum dan mengamankan ranah keamanan siber. Proses analisis bukti digital melibatkan pemeriksaan terhadap berbagai informasi digital yang ditemukan dalam investigasi kejahatan atau kasus hukum. Bukti digital tersebut dapat berupa file, pesan teks, email, rekaman panggilan, atau data lainnya yang terdapat dalam perangkat digital seperti komputer, ponsel, dan tablet. Penelitian ini membahas tentang bagaimana memperoleh, mengambil, melestarikan, dan menyajikan data ata
APA, Harvard, Vancouver, ISO, and other styles
46

Al Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.

Full text
Abstract:
Computer forensics investigates crimes on digital devices hard disk and any other digital storage devices to determine the evidence of any unauthorized access. Essentially, forensic investigators conduct forensic analysis with the help of different approaches (Static and Dynamic) and also tools like ProDiscover, Encase, Accessdata FTK and Autopsy to guarantee the security of a system in an organization. The process requires knowledge of different registry, laws, and regulations related to computer crimes, the operating system (Windows, Linux, etc.) and the network in an organization (e.g., Win
APA, Harvard, Vancouver, ISO, and other styles
47

Nahdli, Muhammad Fahmi Mubarok, Imam Riadi, and Muhammad Kunta Biddinika. "Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method." Scientific Journal of Informatics 11, no. 4 (2024): 891–902. https://doi.org/10.15294/sji.v11i4.13463.

Full text
Abstract:
Purpose: Cybercrime is an unlawful act that utilizes computer technology and the development of the internet. Cybercrime can occur on all electronic devices, including Android smartphones. Forensic handling, particularly mobile forensics, has become crucial in addressing drug trafficking cases conducted through Instagram. As the primary device for accessing Instagram, smartphones store digital data that can serve as evidence in investigations. This research aims to produce a more accurate comparison of results in analyzing Instagram Messenger data containing content related to drug trafficking
APA, Harvard, Vancouver, ISO, and other styles
48

Shin, Dong-Hyuk, Seung-Ju Han, Yu-Bin Kim, and Ieck-Chae Euom. "Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations." Applied Sciences 14, no. 3 (2024): 1128. http://dx.doi.org/10.3390/app14031128.

Full text
Abstract:
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things (IoT) in smart-home technology presents intricate challenges for digital forensics. This study investigates these challenges, focusing on developing forensic methodologies suitable for the diverse and complex world of smart-home IoT devices. This research is contextualized within the rising trend of interconnected smart homes and their associated cybersecurity vulnerabilities. Methodologically, we formulate a comprehensive approach combining open-source intelligence, application, network, and hardwa
APA, Harvard, Vancouver, ISO, and other styles
49

Adesoji, A. Adesina, Ariyo Adebiyi Ayodele, and K. Ayo Charles. "Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 521–29. https://doi.org/10.11591/eei.v11i1.3489.

Full text
Abstract:
The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be
APA, Harvard, Vancouver, ISO, and other styles
50

Adesina, Adesoji A., Ayodele Ariyo Adebiyi, and Charles K. Ayo. "Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 521–29. http://dx.doi.org/10.11591/eei.v11i1.3489.

Full text
Abstract:
The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!