Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
How to find exculpatory and inculpatory evidence using a circular digital forensics process model
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
2008 (English)In: Global E-Security, Proceedings / [ed] Jahankhani, H; Revett, K; PalmerBrown, D, 2008, Vol. 12, 10-17 p.Conference paper, Published paper (Refereed)
Abstract [en]

With raising the number of cyber crimes, the need of having a proper digital forensic process also increases. Although digital forensics is practiced in recent years, there is still a big gap between previously suggested digital forensics processes and what is really needed to be done in real cases. Some problems with current processes are lack of flexible transition between phases, not having a clear method or a complete scenario for addressing reliable evidence, and not paying enough attention to management aspects and team roles. This paper provides a process model by paying special attention to the team roles and management aspects as well as both exculpatory and inculpatory evidence.

Place, publisher, year, edition, pages
2008. Vol. 12, 10-17 p.
Series
Communications In Computer And Information Science, ISSN 1865-0929 ; 12
Keyword [en]
digital forensics, digital forensics process, cyber crime, process model, digital evidence, inculpatory, exculpatory
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:kth:diva-38441ISI: 000259141100002ISBN: 978-3-540-69402-1 (print)OAI: oai:DiVA.org:kth-38441DiVA: diva2:436813
Conference
4th International Conference on Global e-Security (ICGeS) Location: London, ENGLAND Date: JUN 23-25, 2008
Available from: 2011-08-25 Created: 2011-08-25 Last updated: 2011-08-25Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Khatir, MarjanHejazi, Seyed Mahmood
By organisation
Computer and Systems Sciences, DSV
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 57 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf