scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Journal ArticleDOI
Teri A Flory1
TL;DR: In this paper, the authors provided a current and localized assessment of the ability of Indiana law enforcement agencies to effectively investigate crimes involving digital evidence, the availability of training for both law enforcement officers and prosecuting attorneys, and the ability for prosecuting attorneys to pursue and obtain convictions in cases involving digital data.
Abstract: Cyber crime is a growing problem, with the impact to society increasing exponentially, but the ability of local law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. Many national needs assessments have previously been conducted, and all indicated that state and local law enforcement did not have the training, tools, or staff to effectively conduct digital investigations, but very few have been completed recently. This study provided a current and localized assessment of the ability of Indiana law enforcement agencies to effectively investigate crimes involving digital evidence, the availability of training for both law enforcement officers and prosecuting attorneys, and the ability of prosecuting attorneys to pursue and obtain convictions in cases involving digital evidence. The results support the recommendation that a comprehensive resource guide is needed, as standard operating procedures are lacking, and law enforcement is unaware of available training courses and resources.

6 citations

Proceedings ArticleDOI
07 Dec 2015
TL;DR: A digital forensics investigation procedure to acquire and analyze digital evidences found in a smart device based on file systems, logical memory storage and operating system architectures is reported.
Abstract: Smart Device Forensics is a classification under Digital Forensics, which primarily deals with the investigation of digital evidence found in smart devices such as Smart phones, tablets and televisions. There is an enormous rate of increase in threats with ever growing releases of smart devices and rapid advancement in innovative technologies. In this paper, we report a digital forensics investigation procedure to acquire and analyze digital evidences found in a smart device based on file systems, logical memory storage and operating system architectures.

6 citations

Book ChapterDOI
01 Jan 2012
TL;DR: In this paper, criminal profiling can be most useful when little is known about the offender, which is particularly important when offenders use the Internet to conceal their identities and activities, and they express thoughts that they would otherwise keep to themselves.
Abstract: As computers and networks become more prevalent, investigators are encountering an increasing amount of digital evidence of witness, victim, and criminal activity. Criminals can use the Internet proactively to enhance their current modus operandi (MO) or they can use it reactively to avoid detection and capture. Additionally, the Internet gives offenders greater access to victims, extending their reach from a limited geographical area to victims all around the world. To date, the majority of efforts to apply profiling to crimes involving computers have focused on criminals who target computers. Although these efforts to create inductive profiles give a general overview of past offenders and may be useful for diagnosing and treating associated psychological disorders, they are of limited use in an investigation. They can even be misleading. Criminal profiling can be most useful when little is known about the offender, which is particularly important when offenders use the Internet to conceal their identities and activities. Feeling protected by some level of anonymity, individuals often do things on the Internet that they would only imagine doing in the physical world, and they express thoughts that they would otherwise keep to themselves. Digital evidence may also contain information that can be used to determine the offender's sex, age, occupation, interests, relationship status, and other potentially useful information. When an offender uses the Internet to commit crimes, it can be difficult to pinpoint all of the relevant evidence in the digital vastness. The Internet, however, has many areas that are private and may never show up in a routine search. Developing an understanding of the offender's MO can direct investigators to look for particular traces of digital behavior or to monitor particular virtual areas where the intruder is likely to appear.

6 citations

Proceedings ArticleDOI
17 Aug 2012
TL;DR: This paper emphasizes on finding and analyzing digital evidence in virtualized environment for cloud computing using traditional digital forensic analysis techniques.
Abstract: Cloud computing is an Internet based computing paradigm that delivers on-demand software and hardware computing capability as a "service" where the consumer is completely abstracted from the computing resources. These services are provided by means of virtualization. As virtualization provides many benefits, it also makes it difficult to detect digital evidence when it is in cloud environment. This paper emphasizes on finding and analyzing digital evidence in virtualized environment for cloud computing using traditional digital forensic analysis techniques.

6 citations

Book ChapterDOI
29 Jan 2006
TL;DR: Some of the principal challenges facing the emerging discipline of digital forensics are engineering in nature, requiring the construction of new software and hardware to enable the collection, retention and examination of potential digital evidence.
Abstract: This essay discusses some of the principal challenges facing the emerging discipline of digital forensics. Most of the challenges have a scientific basis—understanding the needs and limitations caused by changes in the scope and pace of information technology. Others are engineering in nature, requiring the construction of new software and hardware to enable the collection, retention and examination of potential digital evidence. All of the challenges have administrative and legal frameworks within which they must be addressed, and the limits and structures imposed by these frameworks must evolve and be shaped by science, engineering and practice.

6 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111