Academic literature on the topic 'Digital forensic readiness management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital forensic readiness management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital forensic readiness management"
Serketzis, Nikolaos, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, and George J. Pangalos. "Actionable threat intelligence for digital forensics readiness." Information & Computer Security 27, no. 2 (June 12, 2019): 273–91. http://dx.doi.org/10.1108/ics-09-2018-0110.
Full textReddy, K., and H. S. Venter. "The architecture of a digital forensic readiness management system." Computers & Security 32 (February 2013): 73–89. http://dx.doi.org/10.1016/j.cose.2012.09.008.
Full textAli, Md Iman, and Sukhkirandeep Kaur. "Next-Generation Digital Forensic Readiness BYOD Framework." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6664426.
Full textElyas, Mohamed, Sean B. Maynard, Atif Ahmad, and Andrew Lonie. "Towards A Systemic Framework for Digital Forensic Readiness." Journal of Computer Information Systems 54, no. 3 (March 2014): 97–105. http://dx.doi.org/10.1080/08874417.2014.11645708.
Full textPratama, Yogi. "MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 1–5. http://dx.doi.org/10.14421/csecurity.2020.3.2.2005.
Full textKebande, Victor R., and H. S. Venter. "Novel digital forensic readiness technique in the cloud environment." Australian Journal of Forensic Sciences 50, no. 5 (January 17, 2017): 552–91. http://dx.doi.org/10.1080/00450618.2016.1267797.
Full textEnglbrecht, Ludwig, Stefan Meier, and Günther Pernul. "Towards a capability maturity model for digital forensic readiness." Wireless Networks 26, no. 7 (January 1, 2019): 4895–907. http://dx.doi.org/10.1007/s11276-018-01920-5.
Full textKebande, Victor R., Phathutshedzo P. Mudau, Richard A. Ikuesan, H. S. Venter, and Kim-Kwang Raymond Choo. "Holistic digital forensic readiness framework for IoT-enabled organizations." Forensic Science International: Reports 2 (December 2020): 100117. http://dx.doi.org/10.1016/j.fsir.2020.100117.
Full textElyas, Mohamed, Atif Ahmad, Sean B. Maynard, and Andrew Lonie. "Digital forensic readiness: Expert perspectives on a theoretical framework." Computers & Security 52 (July 2015): 70–89. http://dx.doi.org/10.1016/j.cose.2015.04.003.
Full textKovrigin, E. A., and V. A. Vasilyev. "The problems of quality management system readiness to integrate modern digital technologies." Quality. Innovation. Education, no. 5 (2020): 17–23. http://dx.doi.org/10.31145/1999-513x-2020-5-17-23.
Full textDissertations / Theses on the topic "Digital forensic readiness management"
Kruger, Jaco-Louis. "Digital forensic readiness for IOT devices." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73385.
Full textDissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc
Unrestricted
Singh, Avinash. "A Digital Forensic Readiness Approach for Ransomware Forensics." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.
Full textDissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc (Computer Science)
Unrestricted
Mouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Full textDissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
De, Souza Pedro. "A Chain of findings for digital investigations." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/40842.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Mankantshu, Mninawe Albert. "Investigating the factors that influence digital forensic readiness in a South African organisation." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8504.
Full textComputer crimes affect the bottom line of organisations across the globe. The ability of criminals to exploit organisational systems and avoid prosecution is a concern for most organisations. This is due to the increased use of information and communication technology (ICT) by individuals and organisations. The rapid growth of ICT has affected our communication and information exchange. These advances have not only influenced the way we conduct our daily activities, but has also led to new opportunities, risks and challenges for technical and legal structures. Unfortunately, some individuals and groups have decided to use these ICT advances in order to engage in criminal activities, such as cybercrime. The increase of cyber-related crimes puts a lot of pressure on law enforcement agencies and organisations across the globe to produce credible digital forensic evidence.
Pollitt, Mark. "The Hermeneutics of the Hard Drive: Using Narratology, Natural Language Processing, and Knowledge Management to Improve the Effectiveness of the Digital Forensic Process." Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6004.
Full textPh.D.
Doctorate
Dean's Office, Arts and Humanities
Arts and Humanities
Texts and Technology
Umurerwa, Janviere, and Maja Lesjak. "AI IMPLEMENTATION AND USAGE : A qualitative study of managerial challenges in implementation and use of AI solutions from the researchers’ perspective." Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-187810.
Full textMacNeil, Tanya. "Police Opinions of Digital Evidence Response Handling in the State of Georgia: An Examination from the Viewpoint of Local Agencies’ Patrol Officers." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/369.
Full textReddy, Kamil. "On digital forensic readiness for information privacy incidents." Thesis, 2012. http://hdl.handle.net/2263/28209.
Full textThesis (PhD)--University of Pretoria, 2012.
Computer Science
unrestricted
Pooe, El Antonio. "Developing a multidisciplinary digital forensic readiness model for evidentiary data handling." Thesis, 2018. http://hdl.handle.net/10500/25316.
Full textInformation Science
Ph.D. (Information Systems)
Books on the topic "Digital forensic readiness management"
Richard, Ovenden, Redwine Gabriela, and Donahue Rachel, eds. Digital forensics and born-digital content in cultural heritage collections. Washington, D.C: Council on Library and Information Resources, 2010.
Find full textImplementing Digital Forensic Readiness. Elsevier, 2016. http://dx.doi.org/10.1016/c2015-0-00701-8.
Full textSachowski, Jason. Implementing Digital Forensic Readiness. CRC Press, 2019. http://dx.doi.org/10.4324/9780429441363.
Full textSachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process. Elsevier Science & Technology Books, 2016.
Find full textFraser, Jim. Forensic Science: A Very Short Introduction. Oxford University Press, 2020. http://dx.doi.org/10.1093/actrade/9780198834410.001.0001.
Full textBook chapters on the topic "Digital forensic readiness management"
Dilijonaite, Ausra. "Digital Forensic Readiness." In Digital Forensics, 117–45. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119262442.ch4.
Full textNgobeni, Sipho, Hein Venter, and Ivan Burke. "A Forensic Readiness Model for Wireless Networks." In Advances in Digital Forensics VI, 107–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15506-2_8.
Full textPooe, Antonio, and Les Labuschagne. "Cognitive Approaches for Digital Forensic Readiness Planning." In Advances in Digital Forensics IX, 53–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_4.
Full textSingh, Avinash, Adeyemi R. Ikuesan, and Hein S. Venter. "Digital Forensic Readiness Framework for Ransomware Investigation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 91–105. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05487-8_5.
Full textValjarevic, Aleksandar, and Hein Venter. "A Harmonized Process Model for Digital Forensic Investigation Readiness." In Advances in Digital Forensics IX, 67–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_5.
Full textEnglbrecht, Ludwig, Stefan Meier, and Günther Pernul. "Toward a Capability Maturity Model for Digital Forensic Readiness." In Innovative Computing Trends and Applications, 87–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03898-4_10.
Full textForfot, Alexander D., and Grethe Østby. "Digital Forensic Readiness in IoT - A Risk Assessment Model." In Communications in Computer and Information Science, 53–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71711-7_5.
Full textSimou, Stavros, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, and Stefanos Gritzalis. "A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness." In Trust, Privacy and Security in Digital Business, 150–64. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98385-1_11.
Full textvan der Veen, Michiel, Aweke Lemma, Mehmet Celik, and Stefan Katzenbeisser. "Forensic Watermarking in Digital Rights Management." In Security, Privacy, and Trust in Modern Data Management, 287–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_19.
Full textGrobler, C. P., and C. P. Louwrens. "Digital Forensic Readiness as a Component of Information Security Best Practice." In New Approaches for Security, Privacy and Trust in Complex Environments, 13–24. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-72367-9_2.
Full textConference papers on the topic "Digital forensic readiness management"
Bajramovic, Edita, Jürgen Bochtler, Ines Ben Zid, and Andreas Lainer. "Planning the Selection and Assignment of Security Forensics Countermeasures." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67328.
Full textGupta, Deeksha, Edita Bajramovic, Holger Hoppe, and Antonio Ciriello. "The Need for Integrated Cybersecurity and Safety Training." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67330.
Full textKwon, Sungmoon, Jaehan Jeong, and Taeshik Shon. "Digital Forensic Readiness for Financial Network." In 2019 International Conference on Platform Technology and Service (PlatCon). IEEE, 2019. http://dx.doi.org/10.1109/platcon.2019.8669428.
Full textTrenwith, Philip M., and H. S. Venter. "Digital forensic readiness in the cloud." In 2013 Information Security for South Africa. IEEE, 2013. http://dx.doi.org/10.1109/issa.2013.6641055.
Full textMitha, Yusuf, and HS Venter. "Digital forensic readiness for branchless banking." In 2015 IST-Africa Conference. IEEE, 2015. http://dx.doi.org/10.1109/istafrica.2015.7190578.
Full textKazadi, Jeff Mutunda, and Husin Jazri. "Using digital forensic readiness model to increase the forensic readiness of a computer system." In 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2015. http://dx.doi.org/10.1109/etncc.2015.7184822.
Full textSibiya, George, Thomas Fogwill, H. S. Venter, and Sipho Ngobeni. "Digital forensic readiness in a cloud environment." In AFRICON 2013. IEEE, 2013. http://dx.doi.org/10.1109/afrcon.2013.6757831.
Full textKyaw, ArKar, Brian Cusack, and Raymond Lutui. "Digital Forensic Readiness In Wireless Medical Systems." In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2019. http://dx.doi.org/10.1109/itnac46935.2019.9078005.
Full textPooe, Antonio, and L. Labuschagne. "A conceptual model for digital forensic readiness." In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320452.
Full textVan Staden, F. R., and H. S. Venter. "Adding digital forensic readiness to the email trace header." In 2010 Information Security for South Africa (ISSA). IEEE, 2010. http://dx.doi.org/10.1109/issa.2010.5588258.
Full text