scispace - formally typeset
Search or ask a question
JournalISSN: 1938-0917

International Journal of Digital Evidence 

About: International Journal of Digital Evidence is an academic journal. The journal publishes majorly in the area(s): Digital evidence & Diabetes mellitus. Over the lifetime, 135 publications have been published receiving 3807 citations.


Papers
More filters
Journal Article
TL;DR: This paper explores the development of the digital forensics process, compares and contrasts four particular forensic methodologies, and finally proposes an integrated methodology that encompasses the forensic analysis of all genres of digital crime scene investigations.
Abstract: Law enforcement is in a perpetual race with criminals in the application of digital technologies, and requires the development of tools to systematically search digital devices for pertinent evidence. Another part of this race, and perhaps more crucial, is the development of a methodology in digital forensics that encompasses the forensic analysis of all genres of digital crime scene investigations. This paper explores the development of the digital forensics process, compares and contrasts four particular forensic methodologies, and finally proposes an

487 citations

Journal Article
TL;DR: The notion of a digital crime scene with its own witnesses, evidence, and events that can be investigated using the same model as a physical crime scene is introduced.
Abstract: In this paper, a process model for digital investigations is defined using the theories and techniques from the physical investigation world. While digital investigations have recently become more common, physical investigations have existed for thousands of years and the experience from them can be applied to the digital world. This paper introduces the notion of a digital crime scene with its own witnesses, evidence, and events that can be investigated using the same model as a physical crime scene. The proposed model integrates the physical crime scene investigation with the digital crime scene investigation to identify a person who is responsible for the digital activity. The proposed model applies to both law enforcement and corporate investigations.

448 citations

Journal Article
TL;DR: This paper proposes a ten step process for an organisation to implement forensic readiness, which aims to maximise its potential to use digital evidence whilst minimising the costs of an investigation.
Abstract: A forensic investigation of digital evidence is commonly employed as a post-event response to a serious information security incident. In fact, there are many circumstances where an organisation may benefit from an ability to gather and preserve digital evidence before an incident occurs. Forensic readiness is defined as the ability of an organisation to maximise its potential to use digital evidence whilst minimising the costs of an investigation. The costs and benefits of such an approach are outlined. Preparation to use digital evidence may involve enhanced system and staff monitoring, technical, physical and procedural means to secure data to evidential standards of admissibility, processes and procedures to ensure that staff recognise the importance and legal sensitivities of evidence, and appropriate legal advice and interfacing with law enforcement. This paper proposes a ten step process for an organisation to implement forensic readiness.

272 citations

Journal Article
TL;DR: A model of investigations is presented which combines the existing models, generalises them, and extends them by explicitly addressing certain activities not included in them and captures the full scope of an investigation, rather than only the processing of evidence.
Abstract: A comprehensive model of cybercrime investigations is important for standardising terminology, defining requirements, and supporting the development of new techniques and tools for investigators. In this paper a model of investigations is presented which combines the existing models, generalises them, and extends them by explicitly addressing certain activities not included in them. Unlike previous models, this model explicitly represents the information flows in an investigation and captures the full scope of an investigation, rather than only the processing of evidence. The results of an evaluation of the model by practicing cybercrime investigators are presented. This new model is compared to some important existing models and applied to a real investigation.

232 citations

Journal Article
TL;DR: The nature of tools in digital forensics is examined and a discussion of the definitions, properties, and error types of abstraction layers when used with digital forensic analysis tools is discussed.
Abstract: This paper uses the theory of abstraction layers to describe the purpose and goals of digital forensic analysis tools. Using abstraction layers, we identify where tools can introduce errors and provide requirements that the tools must follow. Categories of forensic analysis types are also defined based on the abstraction layers. Abstraction layers are not a new concept, but their usage in digital forensic analysis is not well documented. What does it mean to be a Digital Forensic Analysis Tool? How do we categorize the different types of analysis tools? For example, an investigator can view the files and directories of a suspect system by using either specialized forensic software or by using the operating system (OS) of an analysis system and viewing the files by mounting the drive. Both methods allow the investigator to view evidence in allocated files, but only the specialized forensic software allows him to easily view unallocated files. Additional tools are required if he is relying on the OS. Clearly both allow the investigator to find evidence and therefore should be considered forensic tools, but it is unclear how we should compare and categorize them. The high-level process of digital forensics includes the acquisition of data from a source, analysis of the data and extraction of evidence, and preservation and presentation of the evidence. Previous work has been done on the theory and requirements of data acquisition [7] and the preservation of evidence [4]. This paper addresses the tools that are used for the analysis of data and extraction of evidence. This paper examines the nature of tools in digital forensics and proposes definitions and requirements. Current digital forensic tools produce results that have been successfully used in prosecutions, but lack designs that were created with forensic science needs. They provide the investigator with access to evidence, but typically do not provide access to methods for verifying that the evidence is reliable. This is necessary when approaching digital forensics from a scientific point of view and could be a legal requirement in the future. The core concept of this paper is the basic notion of abstraction layers. Abstraction layers exist in all forms of digital data and therefore in the tools used to analyze them. The idea of using tools for layers of abstraction is not new, but a discussion of the definitions, properties, and error types of abstraction layers when used with digital

222 citations

Network Information
Related Journals (5)
Journal of Oral and Maxillofacial Pathology
1.6K papers, 17.9K citations
72% related
Digital Investigation
843 papers, 23.6K citations
70% related
Journal of Indian Society of Periodontology
1.4K papers, 16.6K citations
69% related
Journal of Maxillofacial and Oral Surgery
1.9K papers, 15.6K citations
69% related
Contemporary Clinical Dentistry
1.5K papers, 16.3K citations
68% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20223
202115
202020
201913
201812
20175