Article
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The main purpose of this study is to discuss the different comparative studies on digital forensics process models specially in the field of mobile devices. In order to legally pursue digital criminals, investigation should be conducted in a forensically sound manner so that the acquired evidence would be accepted in the court of law. Digital forensic process models define the important steps that should be followed to assure the investigation is performed successfully. There are a number of digital forensic process models developed by various organizations worldwide, but yet, there is no agreement among forensics investigation and legislative delegation which procedures to adhere to; specially in the case of facing mobile devices with latest technologies. This is vital, as mobile phones and other mobile devices such as PDAs or tablets are becoming ever-present as the main technology platform around the world and people are obtaining and using mobile phones more than ever. In this study we will give a review of the proposed digital forensics process models within last 7 years and to discuss the need for a consensus to follow the same underlying approaches while continually updating digital forensics process models to cover new emerging technologies and devices.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Salah satu perkembangan teknologi yang paling cepat berkembang adalah smartphone (Farjamfar, Abdullah, Mahmod, & Udzir, 2014). Smartphone adalah perangkat teknologi komunikasi yang digunakan untuk berkomunikasi secara langsung maupun tidak langsung. ...
... Penggunaan smartphone sudah menjadi kebutuhan gaya hidup dan sangat populer di Indonesia dengan jumlah penduduk 274,9 juta pada tahun 2021 (Farjamfar et al., 2014). Jumlah pengguna yang menggunakan smartphone sebagai koneksi seluler lebih tinggi, yakni sekitar 345,3 juta orang. ...
... Smartphone adalah telepon internet-enabled yang biasanya menyediakan fungsi Personal Digital Assistant (PDA) seperti fungsi kalender, buku agenda, buku alamat, kalkulator dan catatan (Farjamfar et al., 2014). Smartphone mempunyai fungsi yang menyerupai komputer sehingga kedepannya teknologi smartphone akan menyingkirkan teknologi komputer desktop terutama dalam hal pengaksesan data dari internet. ...
Article
Full-text available
Pesatnya perkembangan teknologi informasi telah membawa berbagai dampak positif dan negatif. Efek positif dari teknologi informasi adalah memudahkan orang untuk berkomunikasi dengan orang lain di mana saja di dunia dan efek negatifnya adalah mempekerjakan orang untuk lepas kendali saat menggunakan aplikasi, sehingga mengakibatkan berbagai tindakan kejahatan di dunia maya (cybercrime). Salah satu program perpesanan instan yang banyak digunakan adalah Michat. Aplikasi MiChat menyebabkan cybercrime, pornografi, judi online, penipuan, cyberbullying dan perdagangan narkoba. Penyelidikan barang bukti dilakukan dengan menerapkan salah satu framework Digital Forensics Integrated Investigation Framework (IDFIF), Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. IDFIF merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi di smartphone pada aplikasi Michat. Alat forensik memiliki tingkat keberhasilan 100% dalam menemukan bukti.
... I. PENDAHULUAN Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Kejahatan juga menjadi sebagian dari hasil budaya itu sendiri, ini berarti bahwa semakin tinggi tingkat budaya dan semakin modern suatu bangsa, maka semakin modern pula kejahatan itu dalam bentuk, sifat dan cara pelaksanaannya, hal tersebut dapat dilihat dari aplikasi yang ada pada smartphone [1]. ...
... Smartphone merupakan salah satu bentuk teknologi utama yang digunakan oleh orang untuk berkomunikasi dengan sesamanya dan tidak perlu menghabiskan waktu untuk bertemu secara fisik, salah satu teknologi komunikasi yang murah, mudah dan cepat yang digemari masyarakat sebagai layanan publik adalah Short Message Service (SMS). [1] Maraknya penipuan melalui SMS dapat menyebabkan terjadinya kejahatan berupa spamming SMS, dari berbagai laporan kejadian yang terjadi, baik yang diberitakan media maupun tidak, sudah banyak korban dari spamming SMS. ...
...  [1]. Smartphone mempunyai fungsi yang menyerupai komputer sehingga kedepannya teknologi smartphone akan menyingkirkan teknologi komputer desktop terutama dalam hal pengaksesan data dari internet. ...
Article
Full-text available
Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service (SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone. Kata kunci— Barang Bukti, Framework, IDFIF v2, Smartphone
... It is worth noting that MF faces significant challenges concerning the focus of the overall MF processes. For example, it is not clear whether investigation procedures should be model-specific for each device or should be generic enough to form a standardized set of guidelines applicable to forensics procedures [49]. Another challenge is the need to perform live forensics (mobile device should be powered on) [50]. ...
Article
Full-text available
Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date, researchers have presented many surveys and reviews on the field. However, such articles focused on the advances of each particular domain of digital forensics individually. Therefore, while each of these surveys facilitates researchers and practitioners to keep up with the latest advances in a particular domain of digital forensics, the global perspective is missing. Aiming to fill this gap, we performed a qualitative review of all the relevant reviews in the field of digital forensics, determined the main topics on digital forensics topics and identified their main challenges. Despite the diversity of topics and methods, there are several common problems that are faced by almost all of them, with most of them residing in evidence acquisition and pre-processing due to counter analysis methods and difficulties of collecting data from devices, the cloud etc. Beyond pure technical issues, our study highlights procedural issues in terms of readiness, reporting and presentation, as well as ethics, highlighting the European perspective which is traditionally stricter in terms of privacy. Our extensive analysis paves the way for closer collaboration among researcher and practitioners among different topics of digital forensics.
... It is worth noting that MF faces significant challenges concerning the focus of the overall MF processes. For example, it is not clear whether investigation procedures should be model-specific for each device or should be generic enough to form a standardized set of guidelines applicable to forensics procedures [49]. Another challenge is the need to perform live forensics (mobile device should be powered on) [50]. ...
Preprint
Full-text available
Due to its critical role in cybersecurity, digital forensics has received much focus from researchers and practitioners. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of different technologies. To date, researchers have presented many surveys and reviews in the field. However, such works focused on the advances of each domain of digital forensics individually. Therefore, while each of these surveys facilitates researchers and practitioners to keep up with the latest advances in a particular domain of digital forensics, the overall picture is missing. By following a sound research methodology, we performed a qualitative meta-analysis of the literature in digital forensics. After a thorough analysis of such literature, we identified key issues and challenges that spanned across different domains and allowed us to draw promising research lines, facilitating the adoption of strategies to address them.
... Moreover, we have also outlined the potential use of PII and illustrated the security risks that can be revealed using our novel approach, as reported in Fig. 1. The fact that virtually no data stored locally, about the user, was being encrypted means that law enforcement can use digital forensics tools, including the aforementioned tools for private and public investigations (Cappa et al., 2016;Farjamfar, Abdullah, Mahmod, & Udzir, 2014). Thus, a third contribution of this study is the contention that, in addition to determining the threats to both companies and individuals, data collected by mobile apps can be also used in criminal and civil investigations (Hayes, Cappa, & Cardon, 2018). ...
Article
Full-text available
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the collection and sharing of personal data conducted by mobile apps without the knowledge or consent of the user. The findings of this case study research clearly demonstrate that permissions and privacy policies are not enough to determine how invasive an app is. By analysing six popular mobile apps we demonstrate how extensive amounts of data, which go well beyond the permissions requested of the user, are commonly collected. This study illustrates the effectiveness of our proposed approach, which is based upon a static and dynamic analysis, in addition to a review of privacy policy statements. From a corporate perspective, the outcomes of this study are important to understand how many mobile apps put employees, and intellectual property, at risk. Furthermore, we have highlighted how sensitive information being collected may eventually be used in public or private investigations. Moreover, we have also evidenced how the data being collected is contrary to the developers' privacy policies. The results of this study will assist policymakers who may be concerned with consumer privacy and data collection practices.
... Moreover, we have also outlined the potential use of PII and illustrated the security risks that can be revealed using our novel approach, as reported in Fig. 1. The fact that virtually no data stored locally, about the user, was being encrypted means that law enforcement can use digital forensics tools, including the aforementioned tools for private and public investigations (Cappa et al., 2016;Farjamfar, Abdullah, Mahmod, & Udzir, 2014). Thus, a third contribution of this study is the contention that, in addition to determining the threats to both companies and individuals, data collected by mobile apps can be also used in criminal and civil investigations (Hayes, Cappa, & Cardon, 2018). ...
Conference Paper
Users rely on requested permissions and official privacy policies associated with mobile applications (app) to determine how safe an app is and whether the app producer is acting ethically or not. This research shows that permissions and privacy policies are not enough to determine how invasive an app is in terms of tracking user location and collecting personal information. Big data is tremendously lucrative for companies and therefore companies will collect as much user information as possible. This research clearly illustrates how some company’s claims about location tracking and the collection of personal information goes far beyond what the company states in its privacy policy. Companies should take more notice about data collection methodologies, which clearly put employees and intellectual property at risk.
... The use of scientific technique in finding, removing, evaluating data and presentation of evidence that can be used in the court of law is referred to forensics, [5]. In the case of mobile forensic, it includes the techniques trailed in acquiring, analyzing, preserving mobile data and reporting Subscriber Identity Module (SIM) cards and phone memory [6]. The increasing upgrade rate of mobile apps, hardware and operating systems (OS) has made forensic investigating very complex and highly challenging. ...
Chapter
Full-text available
The rapid rise in the technology today has brought to limelight mobile devices which are now being used as a tool to commit crime. Therefore, proper steps need to be ensured for Confidentiality, Integrity, Authenticity and legal acquisition of any form of digital evidence from the mobile devices. This study evaluates some mobile forensic tools that were developed mainly for mobile devices memory and SIM cards. An experiment was designed with five android phones with different Operating System. Four tools were used to find out the capability and efficiency of the tools when used on the sampled phones. This would help the forensic investigator to know the type of tools that will be suitable for each phone to be investigated for acquiring digital evidence. The evaluation result showed that AccessData FTK imager and Paraben device seizure performs better than Encase and Mobiledit. The experimental result shows that, Encase could detect the unallocated space on the mobile deice but could retrieve an deleted data.
... of dealing with mobile devices with the latest technologies [25]. Recently, several studies have been focused on mobile forensics. ...
Article
Full-text available
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, although a valuable resource, is scattered and widely dispersed. The wide dispersion of mobile forensics knowledge not only makes investigation difficult for new investigators, resulting in substantial waste of time, but also leads to ambiguity in the concepts and terminologies of the mobile forensics domain. This paper developed an approach for mobile forensics domain based on metamodeling. The developed approach contributes to identify common concepts of mobile forensics through a development of the Mobile Forensics Metamodel (MFM). In addion, it contributes to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby supporting the training and knowledge management activities. Furthermore, it reduces the difficulty and ambiguity in the mobile forensics domain. A validation process was performed to ensure the completeness and correctness of the MFM. The validation was conducted using two techniques for improvements and adjustments to the metamodel. The last version of the adjusted metamodel was named MFM 1.2.
... of dealing with mobile devices with the latest technologies [25]. Recently, several studies have been focused on mobile forensics. ...
Article
Full-text available
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, although a valuable resource, is scattered and widely dispersed. The wide dispersion of mobile forensics knowledge not only makes investigation difficult for new investigators, resulting in substantial waste of time, but also leads to ambiguity in the concepts and terminologies of the mobile forensics domain. This paper developed an approach for mobile forensics domain based on metamodeling. The developed approach contributes to identify common concepts of mobile forensics through a development of the Mobile Forensics Metamodel (MFM). In addion, it contributes to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby supporting the training and knowledge management activities. Furthermore, it reduces the difficulty and ambiguity in the mobile forensics domain. A validation process was performed to ensure the completeness and correctness of the MFM. The validation was conducted using two techniques for improvements and adjustments to the metamodel. The last version of the adjusted metamodel was named MFM 1.2.
... Unfortunately, the propensity for criminals to use mobile phones to conduct their nefarious activities has also increased dramatically and, therefore, these devices have become even more valuable sources of evidence due to the incredible amount of information stored internally [50]. In particular, with the integration of highly developed communication features and with the increasing capacity in data storage and functionality, the distinction between mobile phones and personal computers has become blurred. ...
Article
Full-text available
The adoption of open innovation and peer production, powered by 3D printing technology, is transforming traditional manufacturing methods towards a “third industrial revolution”. The purpose of this research is to provide empirical evidence for an integrated approach, based on collaborative product development and peer production, combined with 3D printing, to deliver more sustainable, yet competitive, marketable products. In particular, this experimental study is conducted in the context of mobile forensics, an emerging market where limited expensive products exist and alternative solutions are needed. The technical viability and economic feasibility of the prototype developed in this research validate the proposed integrated approach, which could be a game-changer in the field of mobile forensics, as well as in other sectors. The sustainability improvements with this approach are a reduction of the total cost, thereby making it affordable for lower income users, and a decrease in energy consumption and pollutant emissions. The validated integrated approach offers start-up opportunities to develop and deliver more sustainable, marketable products, towards the paradigm of Open Sustainable Innovation. While the device developed and tested in this research has similar features to existing products, the methodology, implementation, and motivation are original.
... Unfortunately, the propensity for criminals to use mobile phones for their nefarious activities has also increased dramatically. Therefore, these devices have become even more valuable sources of evidence due to the incredible amount of information stored internally (Farjamfar et al. 2014). ...
... In addition, they mentioned that investigators are suffering with MF domain because they do not have sufficient knowledge, training and education related to proper seizure procedures for mobile devices, proper transport procedures and proper forensic examinations and analysis [14]. Furthermore, There are a number of digital forensic process models developed by various organizations worldwide, but yet, there is no agreement among forensic investigations and legislative delegation which procedures to adhere to; specially in the case of facing mobile devices with latest technologies [15]. ...
Conference Paper
Full-text available
Mobile phones have become quite important tools in the modern world. The forensics field heavily relies on knowledge as an important resource. Due to the ongoing changes in digital technology, the power of knowledge enables innovation and assists in establishing proper standards and procedures. As such, it is necessary to establish a relationship between the information derived from knowledge to form new concepts and ideas. Knowledge in mobile forensics is scattered and huge. Hence, this leads to lack of knowledge management in mobile forensics. In addition, lead to complexity of investigation for new investigators, ambiguity in concepts and terminologies of mobile forensics domain and waste time to understand mobile forensics domain. Therefore, mobile forensics investigators are quite suffering with forensics investigation processes in their domain. This paper will develop a new approach for mobile forensics domain which is based on metamodeling. This approach contributes to unify common concepts of mobile forensics. It also provides many benefits which include simplifying the investigation process and guide investigations team, capture and reuse specialized forensic knowledge and support training and knowledge management activities. Furthermore, it reduces complexity and ambiguity in mobile forensic domain.
Article
Modern time largely rely on mobile gadgets as a means of communication, and entertainment. These gadgets now plays a vital role in forensic analysis and criminal investigations as it store a plethora of private and sensitive data. Investigating feasible digital incidents and preserving mobile device security became crucial as the proliferation of mobile devices continues to influence modern society. In this survey; mobile threats, investigative process models for mobile forensics, evidence sources, forensics tools, and field problems are all covered in‐depth. Further, a comprehensive analysis examining the capabilities, features, and efficiency of available distinct mobile forensic tools namely Belkasoft, MOBILedit, and Magnet AXIOM for retrieving, analyzing, and presenting digital evidence is being presented. The objective of the study is to assist forensic investigators in choosing the best tool for specific investigations. The findings of our study reveals the complexity of mobile operating systems, investigative process supported with sources of evidence, and forensic tools which makes it clear that the area of mobile forensics is dynamic and require modern skill adaptation along and innovative development in future. Finally, the study presents current challenges encountered during mobile forensic investigations as researchers can enhance their procedures and tactics for mobile device examination and evidence extraction by fostering a greater knowledge of the difficulties involved in mobile forensics.
Article
Training, tools, and standards are important foundations of mobile forensics. This work focuses on existing curricula and courses in the domain of mobile forensics. In order to identify courses in areas of computing where mobile forensics may be offered, this research utilises open source information gathering, in addition to questionnaire and interviews, to capture additional information and the views and experiences of educators and/or trainers. This research finds that current education and training offerings mainly include topics regarding acquisition of mobile devices and analysis of the acquired data. Current education and training do not cover the areas of a complete mobile forensic investigation, from crime scene to court. In addition, trainer opinions on skills shortages include the lack of basic knowledge, generic skills in forensics and investigation, lack of skilled practitioners, and necessary mindsets to critically think, investigate and avoid dependency on Digital Forensic software.
Book
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
Chapter
Issues relating to cybersecurity and its challenges in Nigeria can be traced as far back as the provision of Internet services to Nigerians in 1996. Nigerians are known for the huge frauds they commit using the Internet. This chapter treats cybersecurity challenges/conflicts history in Nigeria. Furthermore, it looks at the relevant laws guiding against cyber crimes in Nigeria. Lastly, the need for embracing cybersecurity and mobile device forensics is encouraged.
Article
Full-text available
Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukan investigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone.Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yang melibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital.
Article
Full-text available
The main purpose of this study is to discuss the different comparative studies on mobile operating system. From the last few years with the use of mobile, the mobile technology is also increasing at a fast speed. Now a day's different mobile phone companies are competing in the market each having its own hardware and software. Each company mobile phone has its own interface and they are looking to provide new features to their customers. Each company use different operating system like Apple using iOS, Samsung using Android and Nokia using Symbian. In this study we will give, you review of different comparative studies on mobile operating systems done by different authors.
Article
Full-text available
Summary Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfully, there are a number of important steps that have to be taken into consideration. The aim of this paper is to produce the mapping process between the processes/activities and output for each phase in Digital Forensic Investigation Framework (DFIF). Existing digital forensic frameworks will be reviewed and then the mapping is constructed. The result from the mapping process will provide a new framework to optimize the whole investigation process.
Article
Full-text available
Summary With the proliferation of the digital crime around the world, numerous digital forensic investigation models already being develop .In fact many of the digital forensic investigation model focus on technical implementation of the investigation process as most of it develop by traditional forensic expert and technologist. As an outcome of this problem most of the digital forensic practitioners focus on technical aspect and forget the core concept of digital forensic investigation model .In this paper we are introducing a new digital forensic model which will be capture a full scope of an investigation process based on Malaysia Cyber Law .The proposed model is also compared with the existing model which currently available and being apply in the investigation process. This paper present a complete digital forensic investigation model based on Malaysian investigation process. This model identifies most of the missing process formation in the digital forensic model. This newly proposed model also will be compare with the existing model in the next section .This proposed model focus on data acquisition process and also on fundamental stages in conducting a complete forensic analyzation.
Article
Full-text available
Progress in computer forensics research has been limited by the lack of a standardized data sets—corpora—that are available for research purposes. We explain why corpora are needed to further forensic research, present a taxonomy for describing corpora, and announce the availability of several forensic data sets.
Conference Paper
As the Internet has reached every corner of the world as well as every aspect of our life, illegal activities go with it as well. In dealing with this phenomenon, a new professional and academic field, computer forensics, has emerged since the beginning of this century, The growth and advance of the new field has been steady, mainly because it has been following the path of forensic science due to the similarities between the two fields, as well as professionals' experience and understanding of the field. As forensic science has been challenged and asked to have a major overhaul by a congressionally mandated report recently, where should computer forensics go? Based on a comparative study in various facets of both forensic science and computer forensics, some suggestions and considerations have been drawn in this paper, which imply that computer forensics may need to reposition itself to better promote the field over the long run.
Conference Paper
With the continued growth of the mobile device market, the possibility of their use in criminal activity will only continue to increase. While the mobile device market provides a great variety of manufacturers and models causing a strong diversity, it becomes difficult for a professional investigator to choose the proper forensics tools for seizing internal data from mobile devices. Through this paper, we will give a comprehensive perspective of each popular digital forensic tool and initiate discussion towards benchmarking key features and considerations of forensic analysis techniques.