Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
How to find exculpatory and inculpatory evidence using a circular digital forensics process model
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
Concordia University, Canada.
2009 (English)In: International Journal of Electronic Security and Digital Forensics, ISSN 1751-911X, E-ISSN 1751-9128, Vol. 2, no 1, 68-76 p.Article in journal (Refereed) Published
Abstract [en]

With raising the number of cyber crimes, the need of having a proper digital forensic process also increases. Although digital forensics is practiced in recent years, there is still a big gap between previously suggested digital forensics processes and what is really needed to be done in real cases. Some problems with current processes are lack of flexible transition between phases, not having a clear method or a complete scenario for addressing reliable evidence, and not paying enough attention to management aspects and team roles. This article provides a process model by paying special attention to the team roles and management aspects as well as both exculpatory and inculpatory evidence.

Place, publisher, year, edition, pages
2009. Vol. 2, no 1, 68-76 p.
Keyword [en]
Cyber crime, Digital evidence, Digital forensics, Digital forensics process, Exculpatory, Inculpatory, Process model
National Category
Other Computer and Information Science
Identifiers
URN: urn:nbn:se:kth:diva-153619DOI: 10.1504/IJESDF.2009.023877Scopus ID: 2-s2.0-63149141416OAI: oai:DiVA.org:kth-153619DiVA: diva2:752788
Note

QC 20141006

Available from: 2014-10-06 Created: 2014-10-06 Last updated: 2017-12-05Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Khatir, MarjanHejazi, Seyed Mahmood
By organisation
Computer and Systems Sciences, DSV
In the same journal
International Journal of Electronic Security and Digital Forensics
Other Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 23 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf