Review Article
BibTex RIS Cite
Year 2024, Volume: 4 Issue: 1, 1 - 5, 31.12.2024
https://doi.org/10.57020/ject.1445625

Abstract

References

  • Houck, M. M., & Siegel, J. A. (2009). Fundamentals of forensic science. Academic Press.
  • Houck, M. M., & Budowle, B. (2002). Correlation of microscopic and mitochondrial DNA hair comparisons. Journal of forensic sciences, 47(5), JFS15515J.
  • Jamieson, A., & Moenssens, A. (2009). Wiley Encyclopedia of Forensic Science, 5 Volume Set. John Wiley & Sons.
  • Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
  • Cole, S. A. (2013). Forensic culture as epistemic culture: The sociology of forensic science. Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences, 44(1), 36-46.
  • Dolliver, D. S., Collins, C., & Sams, B. (2017). Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context. Digital Investigation, 23, 124-137.
  • Prade, P., Groβ, T., & Dewald, A. (2020). Forensic analysis of the resilient file system (ReFS) version 3.4. Forensic Science International: Digital Investigation, 32, 300915.
  • Kessler, G. C. (2004). Guide to Computer Forensics and Investigations. Forensic Science Communications, 6(1).
  • Sammons, J. (2012). The basics of digital forensics: the primer for getting started in digital forensics. Elsevier.
  • Hassan, N. A. (2019). Digital forensics basics: A practical guide using Windows OS. Apress.
  • Kapoor, N., Sulke, P., Pardeshi, P., Kakad, R., & Badiye, A. (2023). Introduction to Forensic Science. In Textbook of Forensic Science (pp. 41-66). Singapore: Springer Nature Singapore.
  • Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19, 243-256.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Carrier, B. (2005). File system forensic analysis. Addison-Wesley Professional.
  • Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
  • Laykin, E. (2013). Investigative computer forensics: the practical guide for lawyers, accountants, investigators, and business executives. John Wiley & Sons.
  • Cheng, E. K., & Yoon, A. H. (2005). Does Frye or Daubert Matter-a Study of Scientific Admissibility Standards. Va. L. Rev., 91, 471.
  • Kerr, O. S. (2005). Search warrants in an era of digital evidence. Miss. LJ, 75, 85.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Stephenson, P., & Gilbert, K. (2013). Investigating computer-related crime.CRC Press.

The Role of Digital Forensic Analysis in Modern Investigations

Year 2024, Volume: 4 Issue: 1, 1 - 5, 31.12.2024
https://doi.org/10.57020/ject.1445625

Abstract

This paper explores the pivotal role of digital forensic analysis in modern criminal investigations, emphasizing its integration with traditional investigative practices and the challenges it faces in the digital age. The fusion of digital expertise with traditional forensic methods is crucial for effective crime-solving, allowing investigators to utilize a wide range of evidence from both physical and digital sources. Specialized techniques are required to handle the unique complexities of digital crime scenes, ensuring the accurate preservation and analysis of digital evidence to uncover motives and behavioral patterns behind criminal acts. As digital forensic analysis adapts to evolving challenges such as data volume and encryption, advanced tools and interdisciplinary collaboration become essential. In the legal realm, adherence to established standards and transparency in digital forensic processes are paramount for the admissibility of evidence. Digital forensic analysis is a cornerstone in modern investigations, providing critical insights for justice in an increasingly digital world.

References

  • Houck, M. M., & Siegel, J. A. (2009). Fundamentals of forensic science. Academic Press.
  • Houck, M. M., & Budowle, B. (2002). Correlation of microscopic and mitochondrial DNA hair comparisons. Journal of forensic sciences, 47(5), JFS15515J.
  • Jamieson, A., & Moenssens, A. (2009). Wiley Encyclopedia of Forensic Science, 5 Volume Set. John Wiley & Sons.
  • Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
  • Cole, S. A. (2013). Forensic culture as epistemic culture: The sociology of forensic science. Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences, 44(1), 36-46.
  • Dolliver, D. S., Collins, C., & Sams, B. (2017). Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context. Digital Investigation, 23, 124-137.
  • Prade, P., Groβ, T., & Dewald, A. (2020). Forensic analysis of the resilient file system (ReFS) version 3.4. Forensic Science International: Digital Investigation, 32, 300915.
  • Kessler, G. C. (2004). Guide to Computer Forensics and Investigations. Forensic Science Communications, 6(1).
  • Sammons, J. (2012). The basics of digital forensics: the primer for getting started in digital forensics. Elsevier.
  • Hassan, N. A. (2019). Digital forensics basics: A practical guide using Windows OS. Apress.
  • Kapoor, N., Sulke, P., Pardeshi, P., Kakad, R., & Badiye, A. (2023). Introduction to Forensic Science. In Textbook of Forensic Science (pp. 41-66). Singapore: Springer Nature Singapore.
  • Saracevic, M., Selimi, A., & Selimovic, F. (2018). Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers. Computer Science, 19, 243-256.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Carrier, B. (2005). File system forensic analysis. Addison-Wesley Professional.
  • Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
  • Laykin, E. (2013). Investigative computer forensics: the practical guide for lawyers, accountants, investigators, and business executives. John Wiley & Sons.
  • Cheng, E. K., & Yoon, A. H. (2005). Does Frye or Daubert Matter-a Study of Scientific Admissibility Standards. Va. L. Rev., 91, 471.
  • Kerr, O. S. (2005). Search warrants in an era of digital evidence. Miss. LJ, 75, 85.
  • Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations (p. 720). Course Technology Cengage Learning.
  • Stephenson, P., & Gilbert, K. (2013). Investigating computer-related crime.CRC Press.
There are 20 citations in total.

Details

Primary Language English
Subjects Digital Forensics
Journal Section Reviews
Authors

Aybeyan Selim 0000-0001-8285-2175

İlker Ali 0000-0002-2111-415X

Early Pub Date April 1, 2024
Publication Date December 31, 2024
Submission Date March 1, 2024
Acceptance Date April 1, 2024
Published in Issue Year 2024 Volume: 4 Issue: 1

Cite

APA Selim, A., & Ali, İ. (2024). The Role of Digital Forensic Analysis in Modern Investigations. Journal of Emerging Computer Technologies, 4(1), 1-5. https://doi.org/10.57020/ject.1445625
Journal of Emerging Computer Technologies
is indexed and abstracted by
Index Copernicus, ROAD, Academia.edu, Google Scholar, Asos Index, Academic Resource Index (Researchbib), OpenAIRE, IAD, Cosmos, EuroPub, Academindex

Publisher
Izmir Academy Association