Preview

Research Essay

Powerful Essays
Open Document
Open Document
3719 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Essay
Table of Contents

Introduction
The purpose of the essay is to find and present quality research with regards to the following trending issues in the computer forensics world.
Deductive, inductive and abductive reasoning in the context of cyber forensics analysis.
Processes that assist in developing a case hypothesis and alternative hypothesis.
Validation processes that check and test the correctness of the digital evidence exhibits and their relationships with corroborating evidence relied on in legal cases.
Processes that would enhance the communication of and presentation of case analysis to the legal practitioner and courts.

Deductive, inductive and abductive reasoning in the context of cyber forensics analysis.

Deductive Reasoning
Hurley mentioned (2000, p. 33), deductive reasoning is “an argument in which the premises are claimed to support the conclusion in such a way that it is impossible for the premises to be true and the conclusion false”. This equates to say that if all the premises are firm and accurate, the conclusion is most definitely firm and correct (Walton, 2005).
Conclusion drawn from deductive reasoning is derived from the given premises. The reasoning moves from general principles to a specific conclusion when utilized by the criminal justice profession (Turvey, 2001).
One of the most well-known deductive reasoning is the Locard exchange principle; Kirk (1953) defined this principle as
"Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him. Not only his fingerprints or his footprints, but his hair, the fibers from his clothes, the glass he breaks, the tool mark he leaves, the paint he scratches, the blood or semen he deposits or collects. All of these and more, bear mute witness against him. This is evidence that does not forget. It is not confused by the excitement of the moment. It is not absent because human witnesses are. It is factual



References: Craiger, P., Swauger, J., Marberry, C., & Hendricks, C. (2006). “Validation of Digital Forensics Tools” Retrieved 15th July 2014 from www.irma-international.org/viewtitle/8351/ Carrier, B., & Spafford, E Carrier, B., & Spafford, E. (2004). “An Event-Based Digital Forensic Investigation Framework” Retrieved 11th July 2014 from www.digital-evidence.org/papers/dfrws_event.pdf Castiglione, A., Cattaneo, G., Maio, G., & Santis, A Ciardhuáin, Ó. (2004). “An Extended Model of Cybercrime Investigations” Retrieved 11th July 2014 from https://utica.edu/academic/institutes/ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf Dardick, G Daubert v. Merrell Dow Pharmaceuticals, Inc. (92-102), 509 U.S. 579 (1993). Retrieved 13th July 2014 from http://www.law.cornell.edu/supct/html/92-102.ZO.html Eoghan, C Jindani, A., Poovathingal, A., & Rawat, A. (2011). ”Abductive Reasoning”. Retreieved 10th July 2014 from http://www.cse.iitb.ac.in/~cs621-2011/2011-seminars/abduction-slide.ppt Kerr, D., Gammack, J., & Bryant, K Kirk, P.L. (1953). “Crime investigation: physical evidence and the police laboratory”. Interscience Publishers, Inc. McKemmish, R New South Wales Consolidated Regulations. (2005). “UNIFORM CIVIL PROCEDURE RULES 2005 - SCHEDULE 7” Retrieved 13th July 2014 from http://www.austlii.edu.au/au/legis/nsw/consol_reg/ucpr2005305/sch7.html Peirce, Charles, S Saad, S., & Traore, I. (2010, August). Method ontology for intelligent network forensics analysis. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on (pp. 7-14). IEEE. Sagepub. (n.d.). ”Chapter 8: Introduction to Hypothesis Testing” Retrieved 11th July 2014 from www.sagepub.com/upm-data/40007_Chapter8.pdf Sherman, S.(2006) Stephenson, P. (2000). “Investigating computer-related crime”. Boca Raton, Florida: CRC Press Thagard, P Tecuci, G., Schum, D., Boicu, M., Marcu, D., & Russell, K. (2001). “Toward a Computational Theory of Evidence-based Reasoning”. Retrieved 10th July 2014 from http://lac.gmu.edu/publications/2011/tecuci_et_al_ebr-2011.pdf Trochim, W Turvey, B. (2001). Criminal profiling. San Diego, CA: Elsevier Academic Press Walton, D Willassen, S. (2008). “Hypothesis-based investigation of digital timestamps.” Retrieved 11th July 2014 from www.willassen.no/svein/pub/ifip08.pdf

You May Also Find These Documents Helpful

  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Dahake, S. & Daware, S. (2012). A Study of Digital Forensic: Process and Tools. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012), (10).…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Digital Forensics Paper

    • 1687 Words
    • 7 Pages

    Computer forensics is the process of gathering, evaluating and retrieving data, mainly to stop or prevent fraud, to gather and preserve data information for a criminal investigation, or it can be used to recover data that has been deleted or accidentally lost. Most forensic investigators should be required to have knowledge of a computer, the operating system, and hardware and software. Data recovery can be done on CD, DVD, USB, PDA, hard drives, and mobile phones, and many other devices. (Hopkins, n.d.)…

    • 1687 Words
    • 7 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 1

    • 1347 Words
    • 4 Pages

    K-Mart Corp. v. Trotti, 677 S.W.2d 632 (Court of Appeals of Texas, Houston First District 1984).…

    • 1347 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Digital evidence is not readable; however a printout is can be submitted as evidence under the "best evidence rule". The best evidence rule applies when a person wants to submit a copy of a document because the original document is unavailable (Nolo Dictionary, 2011).…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Good Essays

    According to our text, Deductive reasoning takes all of the given essentials and uses them and nothing else to structure a conclusion. Deduction is a form of argument that purports to be conclusive. The theory is what concludes to the…

    • 743 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This paper features information, articles and links about the career of a Computer Forensics Investigator.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Digital Forensics

    • 1977 Words
    • 8 Pages

    This is only the tip of the iceberg and we are starting to realize that digital forensics plays a very important part in areas such as Corporations, law enforcement, network security, and information assurance. As digital forensics starts to encompass our daily lives, we should pay close attention in how certain techniques such as Network Forensics, Anti-forensics Techniques, Mobile Device Forensics, and File Carving are being adopted. I will explore the benefits of these four techniques and if they have added value to Information Assurance as it relates to Forensic Support. Or is there a real problem with the standardization of how data is collected and stored.…

    • 1977 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Darrow, J, Mary, JD, Pope, Matt, CPP, & Avery, Tom. (2006). Technology Crimes & Forensics. San Clemente, CA. Law Tech Custom Publishing.…

    • 1644 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Digital Forensics

    • 672 Words
    • 3 Pages

    Digital forensics is a branch of forensic science involving the recovery and investigation of material found in digital devices used in crimes or by criminals. In the past 15 years it has expanded greatly with all the advances in technology but much of the new technology has not been studied yet. The research I am doing is important because if the study is successful in the future many forensic departments could use my research to solve crimes.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sometimes there can be a sudden requirement to perform hard drive forensic examination. The goals of your forensic examination can be related to virtually any subject, since any type of case/action can take place. Sometimes many instances you may not always perform a full-scale investigation or “fishing expedition” when reviewing the contents of media; in other words, your forensic examination of media may include criteria that focuses and narrows your examination.…

    • 140 Words
    • 1 Page
    Satisfactory Essays