How to find exculpatory and inculpatory evidence using a circular digital forensics process model
2008 (English)In: Global E-Security, Proceedings / [ed] Jahankhani, H; Revett, K; PalmerBrown, D, 2008, Vol. 12, 10-17 p.Conference paper (Refereed)
With raising the number of cyber crimes, the need of having a proper digital forensic process also increases. Although digital forensics is practiced in recent years, there is still a big gap between previously suggested digital forensics processes and what is really needed to be done in real cases. Some problems with current processes are lack of flexible transition between phases, not having a clear method or a complete scenario for addressing reliable evidence, and not paying enough attention to management aspects and team roles. This paper provides a process model by paying special attention to the team roles and management aspects as well as both exculpatory and inculpatory evidence.
Place, publisher, year, edition, pages
2008. Vol. 12, 10-17 p.
, Communications In Computer And Information Science, ISSN 1865-0929 ; 12
digital forensics, digital forensics process, cyber crime, process model, digital evidence, inculpatory, exculpatory
Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-38441ISI: 000259141100002ISBN: 978-3-540-69402-1OAI: oai:DiVA.org:kth-38441DiVA: diva2:436813
4th International Conference on Global e-Security (ICGeS) Location: London, ENGLAND Date: JUN 23-25, 2008