Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners
نویسندگان
چکیده
The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task performance responses from forensic computer examiners with an expert review panel and measure the relationship with the characteristics of the examiners to their quality responses. The results of this analysis provide insight into identifying forensic computer examiners that provide high-quality responses.
منابع مشابه
Identifying Trace Evidence from Target-Specific Data Wiping Application Software
One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in o...
متن کاملInvestigating the effect of selecting delivery method on medical malpractice incidence in the specialized field of obstetrics and gynaecology in complaints referred to medical forensic expert commission during 2011-2012
Background and aims: Complaints of obstetrics and gynecology specialist are on the top of complaint from doctors and these have been increasing with increased population and births. In this regard, parallel to industrialization of life, tendency to cesarean against vaginal delivery has been increased in patients. All the cases of complaint increased from 1995 until 2010. In mul...
متن کاملBuilding FBI computer forensics capacity: one lab at a time
The Federal Bureau of Investigation (FBI) is on a mission: to strengthen law enforcement’s computer forensic capabilities throughout the United States. How are we fulfilling such a sweeping and ambitious mandate? Through an innovative initiative entitled the Regional Computer Forensic Laboratory (RCFL) Program. RCFLs provide much needed computer forensic expertise and training to thousands of l...
متن کاملOn Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. ...
متن کاملApplication of Backward Chaining Method to Computer Forensic
This paper proposes the exploration of the use of Backward Chaining as one of the many methods utilized in the automated approach to events’ analysis in the area of computer forensics. In addition, steps to be taken are outlined in developing an expert system that implements such a method. The new method compliments other methods that traditionally focus on searching files and performing patter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JDFSL
دوره 5 شماره
صفحات -
تاریخ انتشار 2010