İnceleme Makalesi
BibTex RIS Kaynak Göster
Yıl 2024, Cilt: 4 Sayı: 1, 1 - 5
https://doi.org/10.57020/ject.1445625

Öz

Kaynakça

  • Houck, M. M., & Siegel, J. A. (2009). Fundamentals of forensic science. Academic Press.
  • Houck, M. M., & Budowle, B. (2002). Correlation of microscopic and mitochondrial DNA hair comparisons. Journal of forensic sciences, 47(5), JFS15515J.
  • Jamieson, A., & Moenssens, A. (2009). Wiley Encyclopedia of Forensic Science, 5 Volume Set. John Wiley & Sons.
  • Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
  • Cole, S. A. (2013). Forensic culture as epistemic culture: The sociology of forensic science. Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences, 44(1), 36-46.
  • Dolliver, D. S., Collins, C., & Sams, B. (2017). Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context. Digital Investigation, 23, 124-137.
  • Prade, P., Groβ, T., & Dewald, A. (2020). Forensic analysis of the resilient file system (ReFS) version 3.4. Forensic Science International: Digital Investigation, 32, 300915.
  • Kessler, G. C. (2004). Guide to Computer Forensics and Investigations. Forensic Science Communications, 6(1).
  • Sammons, J. (2012). The basics of digital forensics: the primer for getting started in digital forensics. Elsevier.
  • Hassan, N. A. (2019). Digital forensics basics: A practical guide using Windows OS. Apress.
  • Kapoor, N., Sulke, P., Pardeshi, P., Kakad, R., & Badiye, A. (2023). Introduction to Forensic Science. In Textbook of Forensic Science (pp. 41-66). Singapore: Springer Nature Singapore.
  • Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19, 243-256.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Carrier, B. (2005). File system forensic analysis. Addison-Wesley Professional.
  • Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
  • Laykin, E. (2013). Investigative computer forensics: the practical guide for lawyers, accountants, investigators, and business executives. John Wiley & Sons.
  • Cheng, E. K., & Yoon, A. H. (2005). Does Frye or Daubert Matter-a Study of Scientific Admissibility Standards. Va. L. Rev., 91, 471.
  • Kerr, O. S. (2005). Search warrants in an era of digital evidence. Miss. LJ, 75, 85.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Stephenson, P., & Gilbert, K. (2013). Investigating computer-related crime.CRC Press.

The Role of Digital Forensic Analysis in Modern Investigations

Yıl 2024, Cilt: 4 Sayı: 1, 1 - 5
https://doi.org/10.57020/ject.1445625

Öz

This paper explores the pivotal role of digital forensic analysis in modern criminal investigations, emphasizing its integration with traditional investigative practices and the challenges it faces in the digital age. The fusion of digital expertise with traditional forensic methods is crucial for effective crime-solving, allowing investigators to utilize a wide range of evidence from both physical and digital sources. Specialized techniques are required to handle the unique complexities of digital crime scenes, ensuring the accurate preservation and analysis of digital evidence to uncover motives and behavioral patterns behind criminal acts. As digital forensic analysis adapts to evolving challenges such as data volume and encryption, advanced tools and interdisciplinary collaboration become essential. In the legal realm, adherence to established standards and transparency in digital forensic processes are paramount for the admissibility of evidence. Digital forensic analysis is a cornerstone in modern investigations, providing critical insights for justice in an increasingly digital world.

Kaynakça

  • Houck, M. M., & Siegel, J. A. (2009). Fundamentals of forensic science. Academic Press.
  • Houck, M. M., & Budowle, B. (2002). Correlation of microscopic and mitochondrial DNA hair comparisons. Journal of forensic sciences, 47(5), JFS15515J.
  • Jamieson, A., & Moenssens, A. (2009). Wiley Encyclopedia of Forensic Science, 5 Volume Set. John Wiley & Sons.
  • Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
  • Cole, S. A. (2013). Forensic culture as epistemic culture: The sociology of forensic science. Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences, 44(1), 36-46.
  • Dolliver, D. S., Collins, C., & Sams, B. (2017). Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context. Digital Investigation, 23, 124-137.
  • Prade, P., Groβ, T., & Dewald, A. (2020). Forensic analysis of the resilient file system (ReFS) version 3.4. Forensic Science International: Digital Investigation, 32, 300915.
  • Kessler, G. C. (2004). Guide to Computer Forensics and Investigations. Forensic Science Communications, 6(1).
  • Sammons, J. (2012). The basics of digital forensics: the primer for getting started in digital forensics. Elsevier.
  • Hassan, N. A. (2019). Digital forensics basics: A practical guide using Windows OS. Apress.
  • Kapoor, N., Sulke, P., Pardeshi, P., Kakad, R., & Badiye, A. (2023). Introduction to Forensic Science. In Textbook of Forensic Science (pp. 41-66). Singapore: Springer Nature Singapore.
  • Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19, 243-256.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Carrier, B. (2005). File system forensic analysis. Addison-Wesley Professional.
  • Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
  • Laykin, E. (2013). Investigative computer forensics: the practical guide for lawyers, accountants, investigators, and business executives. John Wiley & Sons.
  • Cheng, E. K., & Yoon, A. H. (2005). Does Frye or Daubert Matter-a Study of Scientific Admissibility Standards. Va. L. Rev., 91, 471.
  • Kerr, O. S. (2005). Search warrants in an era of digital evidence. Miss. LJ, 75, 85.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Stephenson, P., & Gilbert, K. (2013). Investigating computer-related crime.CRC Press.
Toplam 20 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Dijital Adli Tıp
Bölüm Derlemeler
Yazarlar

Aybeyan Selim 0000-0001-8285-2175

İlker Ali 0000-0002-2111-415X

Erken Görünüm Tarihi 1 Nisan 2024
Yayımlanma Tarihi
Gönderilme Tarihi 1 Mart 2024
Kabul Tarihi 1 Nisan 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 4 Sayı: 1

Kaynak Göster

APA Selim, A., & Ali, İ. (2024). The Role of Digital Forensic Analysis in Modern Investigations. Journal of Emerging Computer Technologies, 4(1), 1-5. https://doi.org/10.57020/ject.1445625

Journal of Emerging Computer Technologies
is indexed and abstracted by
Index Copernicus, ROAD, Academia.edu, Google Scholar, Asos Index, Academic Resource Index (Researchbib), OpenAIRE, IAD, Cosmos, EuroPub, Academindex

Publisher
Izmir Academy Association
www.izmirakademi.org