A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics

被引:4
|
作者
Montasari, Reza [1 ]
Carpenter, Victoria [2 ]
Hill, Richard [3 ]
机构
[1] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham B4 7XG, W Midlands, England
[2] York St John Univ, Acad Dev Directorate, York YO31 7EX, N Yorkshire, England
[3] Univ Huddersfield, Dept Comp Sci, Huddersfield HD1 3DH, W Yorkshire, England
关键词
computer forensics; design science research; digital investigations; research methodology; information system; digital forensics; EXPERT KNOWLEDGE; COMPUTER FORENSICS; CONSERVATION; VALIDATION; SYSTEMS; FRAMEWORK; JUDGMENT; OPINION; FUTURE; GUIDE;
D O I
10.1504/IJESDF.2019.098784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compared to other well-established scientific fields computer forensics (CF) is still evolving as a new scientific field. CF lacks standardisation in various aspects including process models, datasets, procedures, techniques, and formal research methodologies. Consequently, progress in the establishment of CF as a scientific field has been hindered. Therefore, this paper aims to address one of such issues concerning the lack of standardisation, namely the absence of formal research methods in CF. Our study adds to the body of knowledge by filling the gap that there does not currently exist a well-established research methodology in CF. To this end, we borrow a well-established research methodology from the domain of IS, namely Peffers et al.'s (2006), adapt and extend it and make it relevant to research studies in CF. Our study sets a precedent for other researchers to identify, adapt, extend and apply other well-established research methods to studies in CF.
引用
收藏
页码:194 / 224
页数:31
相关论文
共 50 条
  • [31] An Ontology of Digital Video Forensics: Classification, Research Gaps & Datasets
    Sharma, Himani
    Kanwal, Navdeep
    Batth, Ranbir Singh
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 492 - 498
  • [32] Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics
    Horsman, Graeme
    COMPUTERS & SECURITY, 2018, 73 : 294 - 306
  • [33] Analytical Method and Research of Uyghur Language Chunks Based on Digital Forensics
    Aizezi, Yasen
    Jamal, Anwar
    Mamat, Dilxat
    Abdurexit, Ruxianguli
    Ubul, Kurban
    NEW TRENDS IN IMAGE ANALYSIS AND PROCESSING - ICIAP 2015 WORKSHOPS, 2015, 9281 : 258 - 266
  • [34] Project Design and Implementation for Digital Forensics Education
    Wang, Xinli
    Bai, Yan
    Goda, Bryan
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 33 - 38
  • [35] Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations
    Shin, Dong-Hyuk
    Han, Seung-Ju
    Kim, Yu-Bin
    Euom, Ieck-Chae
    APPLIED SCIENCES-BASEL, 2024, 14 (03):
  • [36] Design of a digital forensics image mining system
    Brown, R
    Pham, B
    de Vel, O
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 395 - 404
  • [37] What does a digital forensics opinion look like? A comparative study of digital forensics and forensic science reporting practices
    Sunde, Nina
    SCIENCE & JUSTICE, 2021, 61 (05) : 586 - 596
  • [38] Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews
    Casino, Fran
    Dasaklis, Thomas K.
    Spathoulas, Georgios P.
    Anagnostopoulos, Marios
    Ghosal, Amrita
    Borocz, Istvan
    Solanas, Agusti
    Conti, Mauro
    Patsakis, Constantinos
    IEEE ACCESS, 2022, 10 : 25464 - 25493
  • [39] Research and implementation of key technologies of digital forensics based on cloud computing
    Fang, Wei, 1600, Universidad Central de Venezuela (55):
  • [40] An Overview of Digital Security Forensics Approach and Modelling
    Hellany, A.
    Achi, H.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 257 - 260