Cyber forensics and comparative analysis of digital forensic investigation frameworks

KS Singh, A Irfan, N Dayal - 2019 4th International Conference …, 2019 - ieeexplore.ieee.org
With industrial revolution 4.0, automation foster communications between digital devices
around the globe which involves several digital devices including cyber physical system …

PRECEPT: a framework for ethical digital forensics investigations

RI Ferguson, K Renaud, S Wilford… - Journal of Intellectual …, 2020 - emerald.com
Purpose Cyber-enabled crimes are on the increase, and law enforcement has had to
expand many of their detecting activities into the digital domain. As such, the field of digital …

Rules of professional responsibility in digital forensics: A comparative analysis

F Sharevski - Journal of Digital Forensics, Security and Law, 2015 - commons.erau.edu
The consolidation of the rules of professional responsibility as recommended by the
Committee on Identifying the Needs of Forensic Sciences Community (2009) accents the …

Protecting digital evidence integrity and preserving chain of custody

MSMB Shah, S Saleem… - Journal of Digital …, 2017 - commons.erau.edu
Evidence is the key to solve any crime. Evidence integrity needs to be protected in order to
make it admissible in the court of law. Digital evidence is more revealing, but it is fragile; it …

Defining principles for preserving privacy in digital forensic examinations

G Horsman - Forensic Science International: Digital Investigation, 2022 - Elsevier
As digital devices play an increasing role in criminal investigations, where in some cases the
data they contain may describe events where few other sources of information exist, there is …

Ethical and legal aspects of digital forensics algorithms: the case of digital evidence acquisition

MI Maratsi, O Popov, C Alexopoulos… - Proceedings of the 15th …, 2022 - dl.acm.org
The first step that forensic examiners perform is identifying and acquiring data. Both are
among the most critical segments in the forensic process since they are sine qua non for …

Cryptographic Techniques for Data Privacy in Digital Forensics

TB Ogunseyi, OM Adedayo - IEEE Access, 2023 - ieeexplore.ieee.org
The acquisition and analysis of data in digital forensics raise different data privacy
challenges. Many existing works on digital forensic readiness discuss what information …

A privacy-aware digital forensics investigation in enterprises

L Englbrecht, G Pernul - … of the 15th International Conference on …, 2020 - dl.acm.org
Stricter policies, laws and regulations for companies on the handling of private information
arise challenges in the handling of data for Digital Forensics investigations. This paper …

Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation

W Halboob, R Mahmod, NI Udzir… - Procedia Computer …, 2015 - Elsevier
Computer forensics and privacy protection fields are two conflicting directions in computer
security. In the other words, computer forensics tools try to discover and extract digital …

[HTML][HTML] A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis

S Saleem, O Popov, I Baggili - Digital Investigation, 2016 - Elsevier
The omnipresence of mobile devices (or small scale digital devices–SSDD) and more
importantly the utility of their associated applications for our daily activities, which range from …