Preview

Research Essay

Powerful Essays
Open Document
Open Document
3719 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Essay
Table of Contents

Introduction
The purpose of the essay is to find and present quality research with regards to the following trending issues in the computer forensics world.
Deductive, inductive and abductive reasoning in the context of cyber forensics analysis.
Processes that assist in developing a case hypothesis and alternative hypothesis.
Validation processes that check and test the correctness of the digital evidence exhibits and their relationships with corroborating evidence relied on in legal cases.
Processes that would enhance the communication of and presentation of case analysis to the legal practitioner and courts.

Deductive, inductive and abductive reasoning in the context of cyber forensics analysis.

Deductive Reasoning
Hurley mentioned (2000, p. 33), deductive reasoning is “an argument in which the premises are claimed to support the conclusion in such a way that it is impossible for the premises to be true and the conclusion false”. This equates to say that if all the premises are firm and accurate, the conclusion is most definitely firm and correct (Walton, 2005).
Conclusion drawn from deductive reasoning is derived from the given premises. The reasoning moves from general principles to a specific conclusion when utilized by the criminal justice profession (Turvey, 2001).
One of the most well-known deductive reasoning is the Locard exchange principle; Kirk (1953) defined this principle as
"Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him. Not only his fingerprints or his footprints, but his hair, the fibers from his clothes, the glass he breaks, the tool mark he leaves, the paint he scratches, the blood or semen he deposits or collects. All of these and more, bear mute witness against him. This is evidence that does not forget. It is not confused by the excitement of the moment. It is not absent because human witnesses are. It is factual



References: Craiger, P., Swauger, J., Marberry, C., & Hendricks, C. (2006). “Validation of Digital Forensics Tools” Retrieved 15th July 2014 from www.irma-international.org/viewtitle/8351/ Carrier, B., & Spafford, E Carrier, B., & Spafford, E. (2004). “An Event-Based Digital Forensic Investigation Framework” Retrieved 11th July 2014 from www.digital-evidence.org/papers/dfrws_event.pdf Castiglione, A., Cattaneo, G., Maio, G., & Santis, A Ciardhuáin, Ó. (2004). “An Extended Model of Cybercrime Investigations” Retrieved 11th July 2014 from https://utica.edu/academic/institutes/ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf Dardick, G Daubert v. Merrell Dow Pharmaceuticals, Inc. (92-102), 509 U.S. 579 (1993). Retrieved 13th July 2014 from http://www.law.cornell.edu/supct/html/92-102.ZO.html Eoghan, C Jindani, A., Poovathingal, A., & Rawat, A. (2011). ”Abductive Reasoning”. Retreieved 10th July 2014 from http://www.cse.iitb.ac.in/~cs621-2011/2011-seminars/abduction-slide.ppt Kerr, D., Gammack, J., & Bryant, K Kirk, P.L. (1953). “Crime investigation: physical evidence and the police laboratory”. Interscience Publishers, Inc. McKemmish, R New South Wales Consolidated Regulations. (2005). “UNIFORM CIVIL PROCEDURE RULES 2005 - SCHEDULE 7” Retrieved 13th July 2014 from http://www.austlii.edu.au/au/legis/nsw/consol_reg/ucpr2005305/sch7.html Peirce, Charles, S Saad, S., & Traore, I. (2010, August). Method ontology for intelligent network forensics analysis. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on (pp. 7-14). IEEE. Sagepub. (n.d.). ”Chapter 8: Introduction to Hypothesis Testing” Retrieved 11th July 2014 from www.sagepub.com/upm-data/40007_Chapter8.pdf Sherman, S.(2006) Stephenson, P. (2000). “Investigating computer-related crime”. Boca Raton, Florida: CRC Press Thagard, P Tecuci, G., Schum, D., Boicu, M., Marcu, D., & Russell, K. (2001). “Toward a Computational Theory of Evidence-based Reasoning”. Retrieved 10th July 2014 from http://lac.gmu.edu/publications/2011/tecuci_et_al_ebr-2011.pdf Trochim, W Turvey, B. (2001). Criminal profiling. San Diego, CA: Elsevier Academic Press Walton, D Willassen, S. (2008). “Hypothesis-based investigation of digital timestamps.” Retrieved 11th July 2014 from www.willassen.no/svein/pub/ifip08.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 1

    • 1347 Words
    • 4 Pages

    K-Mart Corp. v. Trotti, 677 S.W.2d 632 (Court of Appeals of Texas, Houston First District 1984).…

    • 1347 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Sometimes there can be a sudden requirement to perform hard drive forensic examination. The goals of your forensic examination can be related to virtually any subject, since any type of case/action can take place. Sometimes many instances you may not always perform a full-scale investigation or “fishing expedition” when reviewing the contents of media; in other words, your forensic examination of media may include criteria that focuses and narrows your examination.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This paper features information, articles and links about the career of a Computer Forensics Investigator.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital evidence is not readable; however a printout is can be submitted as evidence under the "best evidence rule". The best evidence rule applies when a person wants to submit a copy of a document because the original document is unavailable (Nolo Dictionary, 2011).…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    References: Dahake, S. & Daware, S. (2012). A Study of Digital Forensic: Process and Tools. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), (10).…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Through Tom Goodwins portrayal of the setting and atmosphere in The Cold Equations, the reader undoubtedly experiences the lonesome and cold feeling occurring in the story. The authors brilliant use of figurative language and imagery illustrating Bartons occupation produces a character deficient of personality and feeling. This genius utilization of words forces the reader to experience a sense of urgency amidst the bitter conditions within the story. The Cold Equations is a fictional tale consumed with chilling imagery expertly depicted by the author, vividly generating a cold atmosphere lacking personality and emotion.…

    • 713 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Digital Forensics

    • 672 Words
    • 3 Pages

    Digital forensics is a branch of forensic science involving the recovery and investigation of material found in digital devices used in crimes or by criminals. In the past 15 years it has expanded greatly with all the advances in technology but much of the new technology has not been studied yet. The research I am doing is important because if the study is successful in the future many forensic departments could use my research to solve crimes.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Darrow, J, Mary, JD, Pope, Matt, CPP, & Avery, Tom. (2006). Technology Crimes & Forensics. San Clemente, CA. Law Tech Custom Publishing.…

    • 1644 Words
    • 7 Pages
    Better Essays