IJCNIS Vol. 7, No. 11, 8 Oct. 2015
Cover page and Table of Contents: PDF (size: 655KB)
Full Text (PDF, 655KB), PP.1-8
Views: 0 Downloads: 0
Digital Forensics, Business Model, Investigation, cybercrime, digital evidence
Digital forensics will always include at least human as the one who performs activities, digital evidence as the main object, and process as a reference for the activities followed. The existing framework has not provided a description of the interaction between human, interaction between human and digital evidence, as well as interaction between human and the process itself. A business model approach can be done to provide the idea regarding the interaction in question. In this case, what has been generated by the author in the previous study through a business model of the digital chain of custody becomes the first step in constructing a business model of a digital forensics. In principle, the proposed business model already accommodates major components of digital forensics (human, digital evidence, process) and also considers the interactions among the components. The business model suggested has contained several basic principles as described in The Regulation of Chief of Indonesian National Police (Perkap) No 10/2010. This will give support to law enforcement to deal with cybercrime cases that are more frequent and more sophisticated, and can be a reference for each institution and organization to implement digital forensics activities.
Yudi Prayudi, Ahmad Ashari, Tri K Priyambodo, "A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.11, pp.1-8, 2015. DOI:10.5815/ijcnis.2015.11.01
[1]Y. Prayudi, A. Ashari, and T. K. Priyambodo, “Digital Evidence Cabinets?: A Proposed Frameworks for Handling Digital Chain of Custody,” Int. J. Comput. Appl., vol. 109, no. 9, pp. 30–36, 2014.
[2]CSIC, “Net Losses?: Estimating the Global Cost of Cybercrime,” Washington DC, 2014.
[3]N. Kshetri, The Global Cybercrime Industry. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
[4]M. R. Clint, M. Reith, C. Carr, and G. Gunsch, “An Examination of Digital Forensic Models,” Int. J. Digit. Evid., vol. 1, no. 3, pp. 1–12, 2002.
[5]L. Ablon, M. C. Libicki, and A. A. Golay, “Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar,” Santa Monica USA, 2014.
[6]F. N. Dezfoli, A. Dehghantanha, R. Mahmoud, N. F. B. M. Sani, and F. Daryabar, “Digital Forensic Trends and Future,” Int. J. Cyber-Security Digit. Forensics, vol. 2, no. 2, pp. 48–76, 2013.
[7]N. L. Beebe and J. G. Clark, “A hierarchical, objectives-based framework for the digital investigations process,” Digit. Investig., vol. 2, no. 2, pp. 147–167, 2005.
[8]E. K. Mabuto and H. S. Venter, “State of the art of Digital Forensic Techniques,” in Information Security for South Africa (ISSA), 2011.
[9]?. Petar and S. Maravi, “Methodological Frameworks of Digital Forensics,” in 9th International Symposium on Intelligent Systems and Informatics, 2011, pp. 343–347.
[10]S. L. Garfinkel, “Digital forensics research: The next 10 years,” Digit. Investig., vol. 7, pp. S64–S73, Aug. 2010.
[11]J. Cosic and G. Cosic, “Chain of Custody and Life Cycle of Digital Evidence,” Computer Technology and Aplications, vol. 3, pp. 126–129, Feb-2012.
[12]S. Raghavan and S. Raghavan, “The Digital Forensic Landscape,” SecureCybers, pp. 1–9, 2012.
[13]Y. Prayudi, A. Luthfi, and A. M. R. Pratama, “Pendekatan Model Ontologi Untuk Merepresentasikan Body of Knowledge Digital Chain of Custody,” Cybermatika ITB, vol. 2, no. 2, pp. 36–43, 2014.
[14]C. P. Grobler, C. P. Louwrens, and S. H. Von Solms, “A framework to guide the implementation of Proactive Digital Forensics in organizations,” in International Conference on Availability, Reliability and Security, 2010, pp. 677–682.
[15]I. O. Ademu, C. O. Imafidon, and D. S. Preston, “A New Approach of Digital Forensic Model for Digital Forensic Investigation,” Int. J. Adv. Comput. Sci. Appl., vol. 2, no. 12, pp. 175–178, 2011.
[16]J. J. Shah and L. G. Malik, “An Approach Towards Digital Forensic Framework for Cloud,” in IEEE International Advance Computing Conference (IACC), 2014, pp. 798–801.
[17]Y. Yusoff, R. Ismail, and Z. Hassan, “Common Phases of Computer Forensics,” Int. J. Comput. Sci. Inf. Technol., vol. 3, no. 3, pp. 17–31, 2011.
[18]M. D. Kohn, “Integrated Digital Forensic Process Model,” no. November, 2012.
[19]Y. D. Rahayu and Y. Prayudi, “Membangun Integrated Digital Forensics Investigation Frameworks ( IDFIF ) Menggunakan Metode Sequential Logic,” in Seminar Nasional SENTIKA, 2014.
[20]J. Forrester and H. Building, “A Digital Forensics Investigative Model for Business Organizations,” in Proceedings of the ISSA 2006, Insight to Foresight Conference, 2006, pp. 1–12.
[21]Y. Prayudi and Azhari, “Digital Chain of Custody?: State Of The Art,” Int. J. Comput. Appl., vol. 114, no. 5, pp. 1–9, 2015.
[22]P. B. Turner, “Digital Evidence Bags,” Oxford Brookes University, 2008.
[23]A. Valjarevic, H. S. Venter, and M. Ingles, “Towards a Prototype for Guidence and Implementation of a Standardized Digital Forensic Investigation Process,” in Information Security for South Africa (ISSA), 2014, pp. 1–8.
[24]K. Nance, B. Hay, and M. Bishop, “Digital Forensics:Defining a Research Agenda,” in Proceedings of the 42nd Hawaii International Conference on System Sciences, 2009, pp. 1–6.
[25]R. S. Satti and F. Jafari, “Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes,” Int. J. Comput. Netw. Inf. Secur., vol. 7, no. 5, pp. 16–24, 2015.
[26]A. Lazzez and T. Slimani, “Forensics Investigation of Web Application Security Attacks,” Int. J. Comput. Netw. Inf. Secur., vol. 7, no. 3, pp. 10–17, 2015.
[27]I. L. Lin, Y. S. Yen, and A. Chang, “A study on digital forensics standard operation procedure for wireless cybercrime,” Proc. - 2011 5th Int. Conf. Innov. Mob. Internet Serv. Ubiquitous Comput. IMIS 2011, vol. 2, no. 3, pp. 543–548, 2011.
[28]A. Valjarevic and H. S. Venter, “Harmonised digital forensic investigation process model,” 2012 Inf. Secur. South Africa, pp. 1–10, 2012.
[29]M. M. Al-Debei, R. H. El-Haddadeh, and D. Avison, “Defining the business model in the new world of digital business,” in Proceedings of the Americas Conference on Information Systems (AMCIS), 2008, no. 2000, pp. 1–11.
[30]A. Bock and G. George, “The Business Model in Practice and Its Implications for Entrepreneurship Research,” Entrep. Theory Pract., vol. 35, no. 1, pp. 83–111, 2011.
[31]Kepolisian Negara RI, “Perkap Tata Cara Pengelolaan Barang Bukti,” Jakarta, 2011.
[32]UNODC, “Comprehensive Study on Cybercrime,” New York, USA., 2013.
[33]B. Carrier and E. Spafford, “Getting physical with the digital investigation process,” Int. J. Digit. Evid., vol. 2, no. 2, pp. 1–20, 2003.
[34]S. Perumal, “Digital Forensic Model Based On Malaysian Investigation Process,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 9, no. 8, pp. 38–44, 2009.
[35]M. Kohn, “Framework for a Digital Forensic Investigation,” in ISSA Computer Security, 2006, pp. 1–7.
[36]S. R. Selamat, R. Yusof, and S. Sahib, “Mapping Process of Digital Forensic Investigation Framework,” J. Comput. Sci., vol. 8, no. 10, pp. 163–169, 2008.