2015
DOI: 10.5815/ijcnis.2015.11.01
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia

Abstract: Digital forensics will always include at least human as the one who performs activities, digital evidence as the main object, and process as a reference for the activities followed. The existing framework has not provided a description of the interaction between human, interaction between human and digital evidence, as well as interaction between human and the process itself. A business model approach can be done to provide the idea regarding the interaction in question. In this case, what has been generated b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 20 publications
0
5
0
2
Order By: Relevance
“…Menurut data dari PwC dan RSA sebagaimana dikutip oleh [3], cybercrime telah berubah menjadi ancaman serius bahwa nilai kerugian secara global dapat mencapai pendapatan nasional suatu negara. Ini sejalan dengan laporan dari [4] yang mengungkapkan bahwa kejahatan dunia maya adalah industri yang tumbuh dari tahun ke tahun dengan tingkat pengembalian yang tinggi tetapi dengan risiko yang kecil.…”
Section: Pendahuluanunclassified
“…Menurut data dari PwC dan RSA sebagaimana dikutip oleh [3], cybercrime telah berubah menjadi ancaman serius bahwa nilai kerugian secara global dapat mencapai pendapatan nasional suatu negara. Ini sejalan dengan laporan dari [4] yang mengungkapkan bahwa kejahatan dunia maya adalah industri yang tumbuh dari tahun ke tahun dengan tingkat pengembalian yang tinggi tetapi dengan risiko yang kecil.…”
Section: Pendahuluanunclassified
“…Digital evidence has different form so in order to document it and preserve its integrity is very hard using register book or forms unlike the physical evidence. Although they have different characteristic but they have the same information and concept to be documented in chain of custody [7] , [8] . Therefore, for the importance of chain of custody in investigation process, a Digital chain of custody application has been design using SQL and XML approach.…”
Section: Iraqi Journal Of Information and Communications Technology(imentioning
confidence: 99%
“…Chain of custody is very important in digital forensic filed for keeping the integrity of an evidence as well as to document the evidence. But, there are few solutions provided by other researchers the keep the integrity and document the digital evidence such as proposed framework for handling digital chain of custody with the digital cabinet concept [13] , creating the business model of digital evidence handling and cybercrime investigation [7] , build a framework of the to improve a chain of custody of digital evidence investigation [14] , the ontology approach using in managing the information needed in chain of custody [15] , [16] , using an XML document type for digital evidence documentation like the concept of plastic bag of evidence [17] and imply XML approach to document a digital evidence in chain of custody application [18].…”
Section: Related Workmentioning
confidence: 99%
“…SCADA security systems connected to the internet are closely related to cybersecurity, and thus require special attention in critical industries. The development of cyberinfrastructure can improve the interconnection and security of smart networks [5]; indeed, several designs have sought to increase their investigative abilities [6]. Cyberattacks have damaged critical facilities, including nuclear facilities [7].…”
Section: Introductionmentioning
confidence: 99%