Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all
aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately,
based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the
organizations if
... [Show full abstract] they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth
of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable
of devastating the company’s intangible assets silently. Vandalism of intellectual property or conducting industrial espionage
for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in
the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic
diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the
causes for the associate computer crimes and prevents the related information security incidents from occurring. At last,
a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.
KeywordsUbiquitous computing-Digital forensics-Computer crime-Information security-Ontology-driven model