Excellence in Research and Innovation for Humanity

International Science Index


Select areas to restrict search in scientific publication database:
10006637
Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence
Abstract:
Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.

References:

[1] Technology Working Group for Investigative Uses of High Technology. Investigative uses of technology: Devices, tools, and techniques. NIJ Special Report NCJ213030. Washington, DC: National Institute of Justice (2007).
[2] IDC. Available at http://www.idc.com/prodserv/smartphone-os-market-share.jsp. (Accessed: 30 Sep 2016).
[3] Electronic CSI, A Guide for First Responders, 2nd Edition, National Institute of Justice, (2008).
[4] Zhang, Li, Xu, Chao, Pathak, Parth H., Mohapatra, Prasant. Characterizing Instant Messaging on Smartphones. Volume 8995. Lecture Notes in Computer Science pp 83-95. 2015
[5] Mell, P., Grance, T. “Draft NIST working definition of cloud compuing-v15”, 21. Aug (2009).
[6] Zhang, Q., Cheng, L. Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Application. 1(1), 7-18. (2010)
[7] Google. Google Drive. Available at https://drive.google.com (Accessed 08 Jan 2015).
[8] Rackspace. Focus on your business. Available at http://www.rackspace.com (Accessed 03 Jan 2015).
[9] Azure. Windows azure. Available at http://www.windowsazure.com (Accessed 10 Jan 2015).
[10] GAE. Google App Engine. Available at http://appengine.google.com (Accessed 10 Jan 2015).
[11] Amazon. Amazon Elastic Computing Cloud. Available at htt://aws.amazon.com/ec2 (Accessed 10 Jan 2015).
[12] GoGrid. Cloud Hosting, Cloud Computing and Hybrid Infrastructure from GoGrid. Available at http://www.gogrid.com (Accessed 09 Jan 2015).
[13] Zawoad, S., Hasan R. Cloud Forensics: A meta-Study of Challenges, Approaces, and And Open Problems. arXiv preprint arXiv:1302.63.12, pp 1-15, (2013).
[14] Bosack et al. Social Media Evidence: Ethical and Practical Considerations for Collecting and Using Social Media Evidence in Litigation. Corporate Conseul CLE Seminar (2014)
[15] Murphy, J., Fontecilla, A. Social Media Evidence in Criminal Proceedings: An Uncertain Frontier.Richmond Journal of Law & Technology. Volume XIX, Issue 3. 2013
[16] How to Gather Social Media Evidence. Avoid Legal Disasters and Win More Cases. Available at http://i-sight.com/how-to-gather-social-media-evidence. (Accessed: 10 Nov 2014).
[17] Camtasia. Available at http://www.techsmith.com/camtasia.html (Accessed: 03 Jan 2015).
[18] Screencast-O-Matic. Available at http://screencast-o-matic.com/ (Accessed: 05 Jan 2015).
Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007