How to find exculpatory and inculpatory evidence using a circular digital forensics process model
2009 (English)In: International Journal of Electronic Security and Digital Forensics, ISSN 1751-911X, E-ISSN 1751-9128, Vol. 2, no 1, 68-76 p.Article in journal (Refereed) Published
With raising the number of cyber crimes, the need of having a proper digital forensic process also increases. Although digital forensics is practiced in recent years, there is still a big gap between previously suggested digital forensics processes and what is really needed to be done in real cases. Some problems with current processes are lack of flexible transition between phases, not having a clear method or a complete scenario for addressing reliable evidence, and not paying enough attention to management aspects and team roles. This article provides a process model by paying special attention to the team roles and management aspects as well as both exculpatory and inculpatory evidence.
Place, publisher, year, edition, pages
2009. Vol. 2, no 1, 68-76 p.
Cyber crime, Digital evidence, Digital forensics, Digital forensics process, Exculpatory, Inculpatory, Process model
Other Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-153619DOI: 10.1504/IJESDF.2009.023877ScopusID: 2-s2.0-63149141416OAI: oai:DiVA.org:kth-153619DiVA: diva2:752788
QC 201410062014-10-062014-10-062014-10-06Bibliographically approved