Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3560107.3560114acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article
Open access

Ethical and Legal Aspects of Digital Forensics Algorithms: The Case of Digital Evidence Acquisition

Published: 18 November 2022 Publication History

Abstract

The first step that forensic examiners perform is identifying and acquiring data. Both are among the most critical segments in the forensic process since they are sine qua non for completing the examination and analysis phases. The evidence acquisition must be managed in a deliberate, ethical and legal manner. On many occasions, the outcome of the investigation depends mainly on the relevance and precision of the evidence acquired. The goal of this research is to identify both legal and ethical issues that forensic investigators face during evidence acquisition and to design a framework using design science, which recognises and resolves the problems identified. The framework must preserve the forensic soundness of the investigation, overall integrity, effectiveness, and efficiency. The elicitation of the requirements for the framework is based on a literature review and ex-ante expert interviews, while the validation and evaluation of the framework stem from ex-post expert interviews. The designed framework aims to minimise hazardous practices that lead to negative consequences and to effectively align the new technologies in digital forensics with human expertise for improved results during the phase of digital evidence acquisition.

References

[1]
What is cybercrime? Definition from SearchSecurity. Retrieved September 10, 2019, from https://www.techtarget.com/searchsecurity/definition/cybercrime
[2]
World Economic Forum. 2019. The Global Risks Report 2018. [online] Retrieved from https://www.weforum.org/reports/the-global-risks-report-2018 [Accessed 10 Feb. 2019]
[3]
The National Institute of Standards & Technology. 2016. Guide to Integrating Forensic Techniques into Incident Response, Computer Security Division Information Technology Laboratory, NIST, Gaithersburg, MD 20899-8930
[4]
The California Association of Criminalists. 2009. A Model for a National Code of Ethics in the Forensic Sciences, Recommendation 7, NAS Report
[5]
The Northwest Association of Forensic Scientists (NWAFS). 2007. The Code of Ethics of the Northwest Association of Forensic Scientists, Salt Lake City, UT.
[6]
Expert, T. 2019. The Daubert Standard: A Guide to Motions, Hearings, and Rulings. [online] The Expert Institute. Retrieved from: https://www.theexpertinstitute.com/the-daubert-standard-a-guide-to-motions-hearings-and-rulings/ [Accessed 12 Feb. 2019].
[7]
Ward, T., Syversen, K. 2008. Human Dignity & Vulnerable Agency: An Ethical Framework for Forensic Practice, 1359-1789 © 2008 Elsevier Ltd.
[8]
Bush, S. S., Connell, M. A., & Denney, R. L. 2006. Ethical practice in forensic psychology: A systematic model for decision making (pp. ix-196). Washington, DC: American Psychological Association.
[9]
Tony Ward, Gwenda Willis. 2010. Ethical issues in forensic and correctional research, Aggression and Violent Behavior, Volume 15, Issue 6, Pages 399-409, ISSN 1359-1789, https://doi.org/10.1016/j.avb.2010.07.002.
[10]
Floridi, L. 1999., Information Ethics: On the Philosophical Foundation of Computer Ethics, © 1999 Kluwer Academic Publishers
[11]
Turilli, M., Floridi, L. 2009. The Ethics of Information Transparency, Springer Science+Business Media B.V. 2009
[12]
Floridi, L. 2010. The Cambridge Handbook of Information and Computer Ethics, © Cambridge University Press 2010
[13]
Moor, James. 2009. "Four kinds of ethical robots." Philosophy Now 72: 12-14.
[14]
Otterlo, Martijn. 2018. Gatekeeping Algorithms with Human Ethical Bias: The ethics of algorithms in archives, libraries and society.
[15]
Johannesson, P., Perjons, E. 2014. An Introduction to Design Science, DOI 10.1007/978-3-319-10632-8_13
[16]
Denscombe, M. 2010. The Good Research Guide. Maidenhead, England: McGraw-Hill/Open University Press.
[17]
Wilenet.org. 2017. “Evidence Integrity”, [online] Retrieved from: https://wilenet.org/html/crime-lab/physevbook/chapter1-evidence-integrity-2017.pdf [Accessed 30 April 2019].
[18]
McKemmish, R. 2008. in IFIP International Federation for Information Processing, Volume 285; Advances in Digital Forensics IV; Indrajit Ray, Sujeet Shenoi; (Boston: Springer), pp. 3–15
[19]
Experian.co.uk. 2019. “What is data minimization” [online] Retrieved from: https://www.experian.co.uk/business/glossary/data-minimisation/ [Accessed 30 April 2019].
[20]
Techtarget.com. 2005. “Crawlers” [online] Retrieved from: https://searchmicroservices.techtarget.com/definition/crawler [Accessed 30 April, 2019].
[21]
Saleem, S., Popov, O., Bagilli, I. 2014. Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles, Procedia Computer Science, vol. 35, pp. 812-821
[22]
U.S. Department of Justice, Office of Justice Programs. 1994. Forensic Examination of Digital Evidence: A Guide for Law Enforcement [online] Retrieved from: http://www.ojp.usdoj.gov/nij [Accessed 2 May 2019].
[23]
Saleem, S., Popov, O. 2011., Protecting Digital Evidence Integrity by Using Smart Cards, Digital Forensics and Cyber Crime; Lecture Notes Institute of Computer Science Social Informatics and Telecommunications Engineering, vol. 53, pp. 110-119
[24]
Jones, R. 2007. Safer Live Forensic Acquisition, Computer Science Laboratory University of Kent at Canterbury.
[25]
Grobler, M., von Solms, S. 2007. Modelling Live Forensic Acquisition, Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009).
[26]
Aditya, K. 2018. Enabling Trust in Deep Learning Models: A Digital Forensics Case Study, School of Computer Science University College
[27]
March, S., Smith, G. 1995. Design and Natural Science Research on Information Technology, Information and Decision Sciences Department, Carlson School of Management University of Minnesota
[28]
Barger, R. 2008. Computer Ethics: A Case-Based Approach, Cambridge University Press
[29]
Bostrom, N. & Yudkowsky, E. 2009. “The Ethics of Artificial Intelligence.” Cambridge Handbook of Artificial Intelligence, edited by Keith Frankish and William Ramsey. New York: Cambridge University Press

Cited By

View all
  • (2024)ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic ReadinessInformation10.3390/info1506036315:6(363)Online publication date: 20-Jun-2024
  • (2024)Cybercrime Intention Recognition: A Systematic Literature ReviewInformation10.3390/info1505026315:5(263)Online publication date: 5-May-2024
  • (2024)Impact of Artificial Intelligence in Digital Forensics: A Review StudySSRN Electronic Journal10.2139/ssrn.4492420Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEGOV '22: Proceedings of the 15th International Conference on Theory and Practice of Electronic Governance
October 2022
623 pages
ISBN:9781450396356
DOI:10.1145/3560107
This work is licensed under a Creative Commons Attribution-ShareAlike International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 November 2022

Check for updates

Author Tags

  1. Digital forensics
  2. artificial intelligence
  3. cyber forensics
  4. cybersecurity
  5. data acquisition
  6. design science
  7. digital evidence
  8. ethical aspects
  9. framework
  10. legal aspects
  11. privacy
  12. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICEGOV 2022

Acceptance Rates

Overall Acceptance Rate 350 of 865 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6,527
  • Downloads (Last 6 weeks)765
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic ReadinessInformation10.3390/info1506036315:6(363)Online publication date: 20-Jun-2024
  • (2024)Cybercrime Intention Recognition: A Systematic Literature ReviewInformation10.3390/info1505026315:5(263)Online publication date: 5-May-2024
  • (2024)Impact of Artificial Intelligence in Digital Forensics: A Review StudySSRN Electronic Journal10.2139/ssrn.4492420Online publication date: 2024
  • (2024)XSS-Unearth: A Tool for Forensics Analysis of XSS AttacksAdvanced Information Networking and Applications10.1007/978-3-031-57931-8_31(317-326)Online publication date: 9-Apr-2024
  • (2023)Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449(0084-0088)Online publication date: 14-Nov-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media