Abstract
The evolution of an information society is accompanied by the growth of digital materials and transactions. It is in some cases necessary to use these digital materials and transactions as evidence in legal processes. The value of digital evidence is, however, hard to determine. In this paper some basic requirements and suggestions for a trusted third party model that can be used to secure digital evidence is given. A first sketch of a general typology of digital evidence is offered and discussed.
Chapter PDF
Similar content being viewed by others
References
Brands, Stefan A Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy (MIT Press 2000)
Camp, L Jean Trust and Risk in Internet Commerce (MIT Press 2000)
Denning, Dorothy E and Baugh, William E “Hiding Crimes in Cyberspace” in Cybercrime: Law Enforcement, Security and Surveillance in the Information Age (Routledge: New York 2000)
Eoghan, Casey Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet (Academic Press, 2000)
Pfleeger, Carles P. Security in Computing 2nded (Prentice Hall 1997)
Stephenson, Peter Investigating Computer-Related Crime (CRC Press 1999)
Westland, J. Christopher and Clark, Theodore H.K. Global Electronic Commerce: Theory and Case Studies (MIT Press 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Lundblad, N. (2001). Digital Evidence. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds) Towards the E-Society. IFIP International Federation for Information Processing, vol 74. Springer, Boston, MA. https://doi.org/10.1007/0-306-47009-8_5
Download citation
DOI: https://doi.org/10.1007/0-306-47009-8_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7529-6
Online ISBN: 978-0-306-47009-7
eBook Packages: Springer Book Archive