Abstract
E-Crime in e-business is rising at an ever increasing rate with nations positioning themselves through alliances to fight this threat — evidenced by thirty countries recently signing a new cyber crime treaty. In order to combat this threat, law enforcement and other government and private organisations are turning to computer forensics, which is a new field that deals with investigating computer-related crimes. This paper describes the identification of research issues for methodology development via a Delphi study and the development of a standard methodology for computer forensics to assist in the investigation of e-Crime by use of semi-structured questionnaires and interviews.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35692-1_36
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ACPR (2000), The Virtual Horizon: Meeting the Law Enforcement Challenges - Developing an Australasian law enforcement strategy for dealing with electronic crime, Report Series No: 134. 1, Police Commissioners’ Conference Electronic Crime Working Party, Australasian Centre for Policing Research, Adelaide.
ACPO, (2000), Memorandum by the Association of Chief Police Officers Computer Crime Working Group URL=www.parliament.the-stationery-office.co.uk/pa/ld199900 /Idselect/Ideucom/95/0031502.htm
AIC (1999), What is Forensic Computing, Australian Institute of Criminology — Trends and Issues No. 118, June, URL—www.aic.gov.au/publications/tandi/tandi118.html
Blaike, N. (2000), Designing Social Research, Polity.
CFRG (2001), Meeting minutes for the CFRG meeting, Australian Computer Crime Managers Group — Computer Forensics Research Group, 15 October 2001
CST/FBI (2001), 2001 CSI/FBI Computer Crime and Security Survey, Computer Security Issues and Trends, 7 (1), Spring, 1–18.
Cerpa, N. & R. Jamieson (2001), A Security Trust and Assurance Research Framework for Electronic Commerce, Proceedings of the IFIP TC8 Working Conference on Electronic Commerce, Salzburg, Austria, 22–23 June.
Denzin, N.K. & Y. S. Lincoln, (1994), Handbook of Qualitative Research, Sage Publications.
FBI (2000a), Three-Level Hierarchical Model for Developing Guidelines for Computer Forensic Evidence, Forensic Science Communications, October 2000, 2 (4), URL = http://www.fbi.gov/hq/lab/fsc/backissu/oct2000/cmptrfl.htm
FBI (2000b), Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, October, 2 (4), URL = www.fbi.gov/hq/lab/fsc/backissu/oct2000/computer.htm
IDG News Service (2001), Update: Thirty countries sign cybercrime treaty, IDG News Service, 23 Nov 2001.
Lek, M., Anandarajah, B., Cerpa, N. & R. Jamieson (2001), Data Mining Prototype for Detecting e-Commerce Fraud, Proceedings of the ECIS’2001, Bled Slovenia, 27–29 June.
McKemmish, R. (1998), Report from the 1998 Donald Mackay Churchill Fellowship to Study Overseas Development in Forensic Computing, The Winston Churchill Memorial Trust of Australia, Brisbane.
McKeown, M. & R. Jamieson, (2001). Computer Forensics — Intrusion Detection, SEAR Working Paper, UNSW, Sydney, November, No 20013.
Myers M. D. (2001), Qualitative Research in Information Systems, URL = www2.auckland.ac.nz/msis/isworld, October.
Rehman Technology Services. (2000), Computer Forensics, Electronic Discovery, Electronic Evidence Discovery, Digital Discovery, Computer Analysis, Computer Examination, Computer Expert, URL = electronic-discovery.com ( 2000, October 26 )
Rao, V., Cerpa, N. & R. Jamieson, (2001), A Comparison of Online Electronic Commerce Assurance Service Providers in Australia, Proceedings of the Fourteen Bled Electronic Commerce Conference, Slovenia, 24–26 June, 2001.
Rude, T. (2000), Evidence Seizure Methodology for Computer Forensics, September 2000, URL = http://www.crazytrain.com/seizure.html
Saferstein, R. (1998), Criminalistics: An Introduction to Forensic Science, 6th ed., Prentice Hall, Upper Saddle River, New Jersey.
Sarantakos, S, (1998). Social Research, MacMillan.
SC Magazine (2000), Computer Forensics April 2001, SC Magazine URL = http://www.scmagazine.com/scmagazine/2000_04/cover/cover.html
Stephenson, P. (1999), Investigating Computer-Related Crime, CRC Press.
Tennyenhuis A. & Jamieson R (2001), Computer Forensics Methodologies, SEAR Working Paper, UNSW, Sydney, September, No 2001.
Wieszyk, M. (1998a), Computer Evidence Search, Seizure: Results of National Surveys Interviews — A report for the national police research unit, ACPR, Adelaide.
Wieszyk, M. (1998b), Computer Evidence search,Seizure, Research Masters thesis.
Wong, K., Ng, B., Cerpa, N. & R. Jamieson (2000), An Online Audit Review System for Electronic Commerce, Proceedings of the Thirteen Bled Electronic Commerce Conference, Slovenia, 19–21.
Wright, T. (2000), The Field Guide for Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics Part 2, URL = http://www.securityfocus.com/focus/ih/articles/crimeguide2.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Tennyenhuis, A., Jamieson, R. (2003). Multidisciplinary E-Forensics Methodology Development to Assist in the Investigation of E-Crime. In: Andersen, K.V., Elliot, S., Swatman, P., Trauth, E., Bjørn-Andersen, N. (eds) Seeking Success in E-Business. IFIP — The International Federation for Information Processing, vol 123. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35692-1_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-35692-1_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6493-2
Online ISBN: 978-0-387-35692-1
eBook Packages: Springer Book Archive