scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Proceedings ArticleDOI
19 Sep 2012
TL;DR: An anti-money laundering model is proposed by combining digital forensics practices along with database tools and database analysis methodologies and admissible Suspicious Activity Reports (SARs) can be generated, based on evidence obtained from forensically analysing database financial logs in compliance with Know-Your-Customer policies for money laundering detection.
Abstract: Digital forensics is the science that identify, preserve, collect, validate, analyse, interpret, and report digital evidence that may be relevant in court to solve criminal investigations. Conversely, money launderingis a form of crime that is compromising the internal policies in financial institutions, which is investigated by analysing large amount of transactional financial data. However, the majority of financial institutions have adopted ineffective detection procedures and extensive reporting tasks to detect money laundering without incorporating digital forensic practices to handle evidence. Thus, in this article, we propose an anti-money laundering model by combining digital forensics practices along with database tools and database analysis methodologies. As consequence, admissible Suspicious Activity Reports (SARs) can be generated, based on evidence obtained from forensically analysing database financial logs in compliance with Know-Your-Customer policies for money laundering detection.

18 citations

Journal ArticleDOI
TL;DR: The results provide the first empirical evidence that there is considerable variation in results between recovery methods in terms of the proportion of data recovered from different devices by different toolkits and suggest that a forensics investigator will face serious challenges verifying the data recovery using one method using the data recovered by another.

18 citations

Book
01 Jul 2008
TL;DR: In this paper, the authors present a legal and practical approach to the new world of digital information, providing an overview and history of digital evidence, as well as a thorough discussion of relevant issues, including how you can view and understand informational records, how to ensure that any digital record is authentic, identity issues and more.
Abstract: This book provides you with a legal and practical approach to the new world of digital information. It has been described as a must have for litigation lawyers, corporate counsel and records managers who want to understand how to appropriately handle the digital information of an enterprise. The book provides an overview and history of digital evidence, as well as a thorough discussion of relevant issues, including how you can view and understand informational records, how to ensure that any digital record is authentic, identity issues and more.

18 citations

Proceedings Article
01 Dec 2012
TL;DR: A survey on the current data acquisition methods of digital forensics for mobile phones is conducted and a comparative analysis between the currentData acquisition methods is provided.
Abstract: Today mobile phone devices are everywhere and they hold a great deal of information about the owner and their activities As a result of the widespread adoption of these devices into every aspect of our lives, they will be involved in almost any crime that occurs The aim of the digital forensics of mobile phones is to recover potential digital evidence in a forensically sound manner so that it can be presented and accepted in court There are several methods to acquire evidence from mobile phones In this paper, we have conducted a survey on the current data acquisition methods Then, we provide a comparative analysis between the current data acquisition methods

18 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111