Skip to main navigation menu Skip to main content Skip to site footer

Vol. 20 (2016)

Artykuły

The variety of digital forensic investigation models – research perspective

  • Piotr Karasek
DOI: https://doi.org/10.52097/pwk.5543  [Google Scholar]
Published: 2023-06-07

Abstract

Digital evidence is becoming more and more ubiquitous in courts, which presents a new challenge for the justice system. For digital data to be credible evidence at court, its authenticity and reliability must be ensured in accordance with rules designed within the field of forensic computer science. Unfortunately, there is a vast number of different „model procedures” in digital forensics. In terms of future research it is worth creating a uniform digital forensics procedure, suitable for polish criminal procedure.

References

  1. Adams R.B., The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, Murdoch University, Perth 2012 [Google Scholar]
  2. Adamski A., Prawo karne komputerowe, C.H. Beck, Warszawa 2000 [Google Scholar]
  3. Agarwal A., Gupta M., Gupta S., Gupta S.C., Systematic digital forensic investigation model, International „Journal of Computer Science and Security” 2011, t. 5 (1) [Google Scholar]
  4. Baryamereeba V., Tushabe F., The Enhanced Digital Investigation Process Model, Proceeding of Digital Forensic Research Workshop, Baltimore 2004 [Google Scholar]
  5. Bem D., Huebner E., Computer forensic analysis in a virtual environment, „International Journal of Digital Evidence” 2007, t. 6, nr 2 [Google Scholar]
  6. Carrier B., Spafford E.H., Getting physical with the digital investigation process, „International Journal of Digital Evidence” 2003, t. 2. [Google Scholar]
  7. Ciardhuain S., An extended model of cybercrime investigation, „International Journal of Digital Evidence” 2009, t. 3, nr 1 [Google Scholar]
  8. Czeczot Z., Tomaszewski T., Kryminalistyka ogólna, Comer, Toruń 1996 [Google Scholar]
  9. Gruza E., Goc M., Moszczyński J., Kryminalistyka – czyli rzecz o metodach śledczych, Wydawnictwa Akademickie i Profesjonalne, Warszawa 2008 [Google Scholar]
  10. Karasek P., Gdy dowodem są dane – czyli prawdy i mity związane z pozyskiwaniem dowodów cyfrowych, „Edukacja Prawnicza” 2015, nr 2 [Google Scholar]
  11. Kaur R., Kaur A., Digital forensics, „International Journal of Computer Applications” 2012, t. 50, nr 5 [Google Scholar]
  12. Kodner R.L., Manipulated digital evidence: how to spot it?, „Family Advocate” 2005–2006, t. 28 (16) [Google Scholar]
  13. Kohn M., J.H.P. Eloff, M.S. Olivier, Framework for a digital forensic investigation, Information and Computer Security Architectures Research Group (ICSA), Department of Computer Science, University of Pretoria [Google Scholar]
  14. Krejza P., Najlepsze praktyki w poszukiwaniu i zabezpieczaniu dowodów elektronicznych, w: Szmit M. (red.), Elementy informatyki sądowej, Polskie Towarzystwo Informatyczne, Warszawa 2011, s. 43. [Google Scholar]
  15. Kruse II W.G., Heiser J.G., Computer Forensics: Incident Response Essentials, Addison-Wesley, New York 2002. [Google Scholar]
  16. Lach A., Dowody elektroniczne w procesie karnym, Dom Organizatora, Toruń 2004, za: Casey E., Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Academic Press, Amsterdam–London–New York2000 [Google Scholar]
  17. McKimmish R., What is Forensic Computing?, Australian Institute of Criminology, Canberra 1999, http://aic.gov.au/documents/9/C/A/%7B9CA41AE8-EADB-4BBF-9894-64E0DF87BDF7%7Dti118.pdf [Google Scholar]
  18. Mukasey M.B., Sedgwick J.L., Hagy D.W., Electronic Crime Scene Investigation: A Guide for First Responders, U.S. Department of Justice, Office of Justice Programs, Washington DC 2008 [Google Scholar]
  19. Niebrzydowska M., Kotowicz R., Wstęp do informatyki śledczej, „Przegląd Bezpieczeństwa Wewnętrznego” 2012, nr 6 (4) [Google Scholar]
  20. Olber P., Polskie procedury vs Międzynarodowe standardy zabezpieczania dowodów cyfrowych, „Magazyn Informatyki Śledczej i Bezpieczeństwa IT” 2010, nr 8 [Google Scholar]
  21. Palmer G., DTR-T001-01 Technical Report. A Road Map for Digital Forensic Research, Digital Forensics Workshop (DFRWS), Utica New York 2001. [Google Scholar]
  22. Palmer G.L., A road map for digital forensic research, Technical Report DTR-T0010-01 for the First Digital Forensic Research Workshop 2001 [Google Scholar]
  23. Perrin B., Remy M., Rouloaty R., Electronic evidence in Swiss criminal procedure, „Digital Evidence and Electronic Signature Law Review” 2011, t. 8 [Google Scholar]
  24. Perumal S., Digital forensic model based on Malaysian investigation process, „International Journal of Computer Science and Network Security” 2009, t. 9, nr 8 [Google Scholar]
  25. Pollitt M.M., Computer Forensics: An Approach to Evidence in Cyberspace, „Proceeding of the National Information Systems Security Conference, Baltimore, MD” 1995, t. II [Google Scholar]
  26. Reith M., Carr C., Gunsh G., An examination of digital forensics models, „International Journal of Digital Evidence” 2002, t. 1, nr 3. [Google Scholar]
  27. Rogers M.K., Goldman J., Mislan R., Wedge T., Debrota S., Computer Forensic Field Triage Process Model, Conference on Digital Forensics, Security and Law 2006 [Google Scholar]
  28. Sundresan P., Digital forensic model based on Malaysian investigation process, „International Journal of Computer Science and Network Security” 2009, t. 9 [Google Scholar]
  29. vonSolms S., Louwrens C., Reekie C., Grobler T., A control framework for digital forensics, w: M.S. Olivier, S. Shenoi (red.), Advances in Digital Forensics II, „IFIP Advances in Information and Communication Technology” 2006, t. 222 [Google Scholar]
  30. Williams J., ACPO Good practice guide for digital evidence, Association of Chief Police Officers, March 2012 [Google Scholar]