2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering 2011
DOI: 10.1109/sadfe.2011.15
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Digital Data Privacy in Computer Forensic Examination

Abstract: Privacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(28 citation statements)
references
References 7 publications
0
28
0
Order By: Relevance
“…Law et al, [39] proposed some cryptographic models to be incorporated into existing digital forensics processes to protect data privacy, Guo et al, [40] defined general privacy policies and rulings for network forensic investigation; Pangalos et al, [41] described the role of forensic readiness in optimizing security and privacy of different organizations; S. Pearson [42] developed a privacy model and a language to incorporate privacy requirements within companies audit and assurance mechanisms while [43] studied forensic policy specification and its usage in forensic readiness. K. Reddy et al, [44] proposed a theoretical forensics readiness framework for enterprise organizations.…”
Section: Privacy Protection Technologies For Digital Investigationmentioning
confidence: 99%
See 1 more Smart Citation
“…Law et al, [39] proposed some cryptographic models to be incorporated into existing digital forensics processes to protect data privacy, Guo et al, [40] defined general privacy policies and rulings for network forensic investigation; Pangalos et al, [41] described the role of forensic readiness in optimizing security and privacy of different organizations; S. Pearson [42] developed a privacy model and a language to incorporate privacy requirements within companies audit and assurance mechanisms while [43] studied forensic policy specification and its usage in forensic readiness. K. Reddy et al, [44] proposed a theoretical forensics readiness framework for enterprise organizations.…”
Section: Privacy Protection Technologies For Digital Investigationmentioning
confidence: 99%
“…Organizational setup to limit private information disclosure during forensics investigation i.e. [39][40][41][42][43][44][45]. 2.…”
Section: Privacy Respecting Digital Investigation Technologiesmentioning
confidence: 99%
“…(p.19). • Law et al (2011): "To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination" (p.1). • Losavio et al (2015): "This highlights the twin challenges of forensic accessibility in these highly mobile devices and the intense privacy concerns which may now accompany the profiles of people in ways never before possible."…”
Section: Forensics Investigations Ethical Guidelinesmentioning
confidence: 99%
“…The privacy of the subject should be protected by only investigating topics identified as being of interest to the investigation (Law et al, 2011;Dehghantanha and Franke, 2014).…”
Section: P2 P3mentioning
confidence: 99%
“…These digital storages devices do not contain only case related data but also store accused personal and professional data. This data might not be relevant to the investigating case but leads to the privacy breach of the accused data as all the data is being handed over to the investigator without any restriction or consent of the accused [4]. Some wrong claims leads to major loss to accused business, social and personal relations.…”
Section: Introductionmentioning
confidence: 99%