Skip to main content

Introduction

  • Chapter
  • First Online:
Big Digital Forensic Data

Part of the book series: SpringerBriefs on Cyber Security Systems and Networks ((BRIEFSCSSN))

  • 852 Accesses

Abstract

As outlined in Volume 1(ISBN 978-981-10-7762-3), the significant growth in the size of storage media, combined with the increasing popularity of digital devices, accompanied with a decrease in prices of devices and storage media, has contributed to a major issue affecting the timely process of justice. The ever growing volume of data seized for analysis has been raised as a major issue since 1999 (McKemmish 1999). Lengthy backlogs of work has been one result of this (Justice and UDo 2016; Parsonage 2009) which the growing size of devices contributes (Garfinkel 2010), often now consisting of many terabytes of data for each investigation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • All URLs were last accessed (and correct) on 5 November 2016

    Google Scholar 

  • Beebe, N., & Clark, J. (2005). Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, 3–16.

    Google Scholar 

  • Brown, R., Pham, B., & de Vel, O. (2005). Design of a digital forensics image mining system. In Knowledge-based intelligent information and engineering systems, pp. 395–404.

    Google Scholar 

  • Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, Supplement, no. 0, S64–S73.

    Google Scholar 

  • Justice UDo (2016). Office of the Inspector General. Audit of the Federal Bureau of Investigation’s New Jersey Regional Computer Forensic Laboratory. https://oig.justice.gov/reports/2016/a1611.pdf.

  • McKemmish, R. (1999). What is forensic computing?

    Google Scholar 

  • Parsonage, H. (2009). Computer forensics case assessment and triage—Some ideas for discussion. Retrieved August 4, 2009, from http://computerforensics.parsonage.co.uk/triage/triage.htm.

  • Sheldon, A. (2005). The future of forensic computing. Digital Investigation, 2(1), 31–35.

    Google Scholar 

  • UNODC 2011, United Nations Office on Drugs and Crime—Criminal Intelligence Manual for Analysts, United Nations, New York, Vienna, Austria.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Quick, D., Choo, KK.R. (2018). Introduction. In: Big Digital Forensic Data. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-0263-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0263-3_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0262-6

  • Online ISBN: 978-981-13-0263-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics