• Title/Summary/Keyword: Digital investigation framework

Search Result 19, Processing Time 0.021 seconds

Methodology for digital investigation of illegal sharing using BitTorrent (BitTorrent를 이용한 저작물 불법 공유 조사 방법에 관한 연구)

  • Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2013
  • Sharing copyrighted files without copyright holder's permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.

Digital Forensics Framework for Cloud Computing (클라우드 환경을 고려한 디지털 포렌식 프레임워크)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2013
  • Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user's log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Social Media Adoption: Small and Medium-sized Enterprises' Perspective in Sri Lanka

  • SAMSUDEEN, Sabraz Nawaz;THELIJJAGODA, Samantha;SANJEETHA, Mohamed Buhary Fathima
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.759-766
    • /
    • 2021
  • In this digital age, all organizational environments force businesses to adopt Information and Communication Technologies (ICT) since these technologies have immense impact on such businesses' competitiveness and productivity. Nonetheless, the productivity and the competitiveness enjoyed by such firms vary depending on the size or the organizations, context of the country; developing or developed, and what kinds of technologies are adopted. This investigation focused on small- and medium-sized enterprises (SMEs) of Eastern province of Sri Lanka where such studies are scanty. The adoption of social media (SM) by SMEs is inclined to change how organizations operate, this calls for an investigation of the elements that impact SMEs to adopt SM and such investigation. Technology-Organization-Environment (TOE) framework was based to understand the factors. Research approach was quantitative approach using questionnaire survey. Data were collected using online form to see 285 valid responses. Structural Equation Modelling was deployed to evaluate the proposed model. Results revealed that Relative Advantage, Compatibility, Complexity, Observability, Competitive Intensity, Bandwagon Pressure, and Competitive Pressure were influencing, while Trialability, Top Management Support, CEO's Innovativeness did not show statistically significant influence on SMEs' social media adoption.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

  • CHOI, Do-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.6
    • /
    • pp.47-55
    • /
    • 2021
  • Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift (정부 ICT R&D 중장기전략과 ICT 패러다임 변화를 반영한 디지털 포렌식 표준정립을 위한 기술-정책적 통합프로세스 프레임워크)

  • Shin, Jun Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1495-1504
    • /
    • 2014
  • Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.

Examining the Practice of Digital Scholarship Services at Vietnam National University Ho Chi Minh City

  • Ngo, Thi Huyen;Nguyen, Hong Sinh;Ninh, Thi Kim Thoa
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.1-17
    • /
    • 2022
  • The article reports the results of an investigation on the practice of providing digital scholarship services at Vietnam National University Ho Chi Minh City, Vietnam. This study is part of an ongoing research project entitled Developing a digital scholarship service framework for universities at Vietnam National University Ho Chi Minh City. It employed a qualitative research approach through in-depth interviews with 31 individuals who are university managers, library managers, lecturers, and postgraduate and undergraduate students from six member universities and Central Library of Vietnam National University Ho Chi Minh City. Research results show that some digital scholarship services have been provided at Vietnam National University Ho Chi Minh City. However, they have not been yet systematically implemented and have not met users' needs. Lack of needed resources such as space, technology infrastructure, human resources, finance, and stakeholder support are among major challenges in developing digital scholarship services. The management of existing digital scholarship services is fragmented without a clear policy for developing digital scholarship and supporting services. The study contributes to the existing knowledge by adding substantially to current understanding of the practice of providing digital scholarship services in Vietnam's universities in the transition period, from state control to autonomy, which has not been much addressed in previous research. Furthermore, this study can be a useful reference for higher education institutions in developing countries regarding implementation of digital scholarship services.

Teacher Training Strategies for Improvement Technological Pedagogy Knowledge(TPK) connected with Problem Solving (문제해결 기반 디지털역량교수지식(TPK) 함양을 위한 교사연수 전략)

  • Shin, Soobum;Kim, Chul;Jeong, Youngsik
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.1
    • /
    • pp.23-32
    • /
    • 2018
  • This study is about in-service training structure combined digital competence and pedagogical knowledge in order to improve digital tools skill of a teacher in the school. Meanwhile domestic teacher training has been revealed low-level of applying into a teaching in the k12 school. Thus this study proposed teacher training system with focus on TPK sub-categories of TPACK. The core contents of TPK is to select appropriate digital tool for its teaching & learning. Additionally it is to select elements of teaching & learning associated with an attribute of digital tool. And this study presented modularize of 3 step such as teaching objective, teaching contents, assessment. Also we proposed that this training system should be operated with problem solving method which trainee itself compose TPK elements. And we committed quality investigation about picking up Strategies of TPK elements and the teacher training frame. The Participants concluded having a validity about TPK strategies, teacher training framework.

An Investigation into the Role of Technostress in Information Security Context (기술스트레스가 정보보안에 미치는 영향에 관한 연구)

  • Park, Chul-Ju;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.37-51
    • /
    • 2012
  • The purpose of this study is to approach information security from a more comprehensive perspective. Particularly, information countermeasures includes a technological tool for end users, thereby increasing the end users' technological stresses. Based on the technostress framework, we investigate a effect of security awareness training on technostress, and also examine a effect of technostress on the persistent security compliance. Results showed that security awareness training influenced on techno-overload and techno-uncertainty. We also found that techno-overload and techno-uncertainty have a significant effect on the persistent security compliance. Conclusion and implications are discussed.