ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic Readiness
Abstract
:1. Introduction
2. Research Methodology
3. Current State of Play: Review of Current Digital Forensics Models and Frameworks
4. Navigating Technical and Ethical Complexities in Digital Forensics
- a.
- Technical Issues and Challenges
- Data Volume and Complexity
- Rapid Technological Evolution
- Data Integrity and Chain of Custody
- Encryption and Anti-Forensic Techniques
- Resource Constraints
- b.
- Ethical Issues and Challenges
- Privacy Concerns
- Bias and Objectivity
- Legal and Jurisdictional Challenges
- Ethical Use of Technology
- Accountability and Transparency
5. Focus Group Discussions and Feedback on Technical Aspects and Ethical Principles: Results and Analysis
- a.
- Data Examination Layer
- b.
- Data Acquisition Layer
- c.
- Forensic Preparation Layer
- d.
- Identification Layer
- e.
- Motivation Layer
- f.
- Legal Advisory Layer
- g.
- Security Layer
6. Report of Findings
- a.
- Ethical Principle Implementation of the ETHICore
- b.
- A Thematic Roadmap of the Feasible Forensic Framework
7. Discussion
- Reconnaissance—A digital forensics researcher must, comparable to what must be completed before ethical hacking, deplete all methodologies, practices, and tools established for a specific operating condition to obtain, recoup, decipher, explore, retrieve, analyse, and transform data stored on various storage devices into legible proof. Digital forensics researchers ought to uncover and be focused on retrieving the reality underlying the data regardless of how and where they are kept.
- Reliability—Data extraction is not the same as replicating data with Windows Explorer or storing information on a disc. During the extraction, analysis, storage, and transportation of data, the line of proof must be maintained. In summary, the nonrepudiation element of digital forensics can be defined as the collection of evidence, chronology, and information quality, as well as the user’s connection with the proof. The digital evidence should be credible and acceptable for court scrutiny if it cannot be disputed or refuted.
- Relevance—Even if the evidence is admissible, relevant paradigms of the information must be connected with the case to enhance its usefulness and weight. Both the aspects of time and expenditures can be managed more effectively if the legal professional suggests which data must be gathered and which would be most effective.
- a.
- The Bond That Binds Them All Together
- Case handler.
- Owner of the system.
- Legal advisors.
- Auditors, architects, and security professionals of the system.
- Digital forensics specialists.
- Investigator and system administrator.
- Analyst.
- Legal prosecutor.
- b.
- Legal-Side Focus
- i.
- Legal goals (Why)
- (a)
- What is the ultimate resolution of this issue?
- (b)
- What is the law regarding this issue?
- (c)
- Does the case fall under the category of criminal or civil?
- ii.
- Legal backgrounds and primary disputes (What)
- What is/are the applicable law(s) or ordinance(s)?
- To which parts of the ordinance should one refer?
- What were the ordinance’s main points?
- What documentation is required and related?
- What information should be gathered?
- What is the difference between legal and factual issues?
- iii.
- Legal processes for subsequent inquiries (How)
- Is an order (such as the Anton Piller Injunction) necessary?
- Is a background check or any kind of warrant required?
- Is there anything that needs to be done to preserve the proof?
- iv.
- Legal location (Where)
- Is it under the legislative authorities of the country?
- v.
- Legal individuals and members (Who)
- Who is the claimant or the participants?
- Who holds the responsibility of being the legal councillor, prosecutor, legal staff, or other relevant legal staff?
- vi.
- Legal timeline (When)
- What exactly is the deadline for the case?
- Is it under the ultimate timeframe limit?
- How much time is it expected to take?
- What are the durations of similar cases and expenses?
- vii.
- Goals of legal presentation (Why)
- Should the case be continued or dismissed?
- Has enough evidence been gathered?
- What type of legal action should be pursued?
- viii.
- Characteristics of legal representation (What)
- Should a penalty be approved?
- What data should have been included and what should be left out?
- How should the information be proffered?
- What evidence is important and acceptable in this case?
- ix.
- Methods for presenting legal arguments (How)
- What kind of legal strategy should be used? (Is it better to use international arbitration or local civil lawsuits?)
- What strategy should be used during the legal process?
- Where should the lawsuit take place in terms of legal authority?
- Where should the regulation take place?
- Where does the hearing take place?
- x.
- Entities involved in legal proceedings (Who)
- Who should be called as a witness?
- Is it necessary to summon any expert testimony?
- Who are the judges, cabinets, and arbitrators?
- xi.
- For the presentation, a timeline of the full event is provided (When)
- Is the complete storyboard being rebuilt?
- Is there a timeframe lacking from the evidence?
- When do you think the case must be introduced?
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Pollitt, M. Six Blind Men from Indostan. In Digital Forensics Research Workshop (DFRWS). 2004. Available online: https://dfrws.org/wp-content/uploads/2019/06/2004_USA_pres-a_framework_for_digital_forensic_science.pdf (accessed on 27 November 2023).
- Brill, A.E.; Pollitt, M.; Morgan Whitcomb, C. The Evolution of Computer Forensic Best Practices: An Update on Programs and Publications. J. Digit. Forensic Pract. 2006, 1, 3–11. [Google Scholar] [CrossRef]
- Prasanthi, B.V. Cyber Forensic Science to Diagnose Digital Crimes—A study. Int. J. Comput. Trends Technol. (IJCTT) 2017, 50, 107–113. [Google Scholar] [CrossRef]
- Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes. Available online: https://uobrep.openrepository.com/handle/10547/326231 (accessed on 9 June 2024).
- Karie, N.M.; Venter, H.S. Taxonomy of Challenges for Digital Forensics. J. Forensic Sci. 2015, 60, 885–893. [Google Scholar] [CrossRef] [PubMed]
- Luciano, L.; Baggili, I.; Topor, M.; Casey, P.; Breitinger, F. Digital Forensics in the Next Five Years. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1–14. [Google Scholar]
- Simon, M.; Choo, K.-K.R. Digital Forensics: Challenges and Future Research Directions’. Rochester, NY, USA, 7 April 2014. Available online: https://papers.ssrn.com/abstract=2421339 (accessed on 9 June 2024).
- Watson, S.; Dehghantanha, A. Digital forensics: The missing piece of the Internet of Things promise. Comput. Fraud Secur. 2016, 2016, 5–8. [Google Scholar] [CrossRef]
- Ferguson, R.I.; Renaud, K.; Wilford, S.; Irons, A. PRECEPT: A framework for ethical digital forensics investigations. J. Intellect. Cap. 2020, 21, 257–290. [Google Scholar] [CrossRef]
- Gruber, J.; Voigt, L.L.; Benenson, Z.; Freiling, F.C. Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. Forensic Sci. Int. Digit. Investig. 2022, 43, 301438. [Google Scholar] [CrossRef]
- Losavio, M.; Adams, J.; Rogers, M. Gap Analysis: Judicial Experience and Perception of Electronic Evidence. J. Digit. Forensic Pract. 2006, 1, 13–17. [Google Scholar] [CrossRef]
- Kebande, V.R.; Venter, H.S. A comparative analysis of digital forensic readiness models using CFRaaS as a baseline. WIREs Forensic Sci. 2019, 1, e1350. [Google Scholar] [CrossRef]
- Adel, A. A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach. Forensic Sci. 2022, 2, 111–129. [Google Scholar] [CrossRef]
- Ab Rahman, N.H.; Cahyani, N.D.W.; Choo, K.-K.R. Cloud incident handling and forensic-by-design: Cloud storage as a case study. Concurr. Comput. Pract. Exp. 2017, 29, e3868. [Google Scholar] [CrossRef]
- Ab Rahman, N.H.; Glisson, W.B.; Yang, Y.; Choo, K.-K.R. Forensic-by-Design Framework for Cyber-Physical Cloud Systems. IEEE Cloud Comput. 2016, 3, 50–59. [Google Scholar] [CrossRef]
- Cusack, B.; Maeakafa, G. Establishing effective and economical traffic surveillance in Tonga. In Proceedings of the 14th Australian Digital Forensics Conference, Perth, Australia, 5–6 December 2016; pp. 50–56. [Google Scholar] [CrossRef]
- Adel, A. Developing a Digital Forensic Capability for Critical Infrastructures: An Investigation Framework’, Auckland University of Technology. 2020. Available online: https://hdl.handle.net/10292/13317 (accessed on 9 June 2024).
- Bankole, F.; Taiwo, A.; Claims, I. An extended digital forensic readiness and maturity model. Forensic Sci. Int. Digit. Investig. 2022, 40, 301348. [Google Scholar] [CrossRef]
- Li, M.; Lal, C.; Conti, M.; Hu, D. LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener. Comput. Syst. 2021, 115, 406–420. [Google Scholar] [CrossRef]
- Singh, K.S.; Irfan, A.; Dayal, N. Cyber Forensics and Comparative Analysis of Digital Forensic Investigation Frameworks. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019; pp. 584–590. [Google Scholar]
- Singh, A.; Ikuesan, A.R.; Venter, H.S. Digital Forensic Readiness Framework for Ransomware Investigation. In Proceedings of the Digital Forensics and Cyber Crime; Breitinger, F., Baggili, I., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 91–105. [Google Scholar]
- Kumar, G.; Saha, R.; Lal, C.; Conti, M. Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 2021, 120, 13–25. [Google Scholar] [CrossRef]
- Dimitriadis, A.; Ivezic, N.; Kulvatunyou, B.; Mavridis, I. D4I-Digital forensics framework for reviewing and investigating cyber attacks. Array 2020, 5, 100015. [Google Scholar] [CrossRef]
- Al-Masri, E.; Bai, Y.; Li, J. A Fog-Based Digital Forensics Investigation Framework for IoT Systems. In Proceedings of the 2018 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, 21–23 September 2018; pp. 196–201. [Google Scholar]
- Horsman, G. Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics. Comput. Secur. 2018, 73, 294–306. [Google Scholar] [CrossRef]
- Sathwara, S.; Dutta, N.; Pricop, E. IoT Forensic A digital investigation framework for IoT systems. In Proceedings of the 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 28–30 June 2018; pp. 1–4. [Google Scholar]
- Horsman, G. Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework. Digit. Investig. 2019, 28, 146–151. [Google Scholar] [CrossRef]
- Kebande, V.R.; Ray, I. A Generic Digital Forensic Investigation Framework for Internet of Things (IoT). In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016; pp. 356–362. [Google Scholar]
- Lutta, P.; Sedky, M.; Hassan, M.; Jayawickrama, U.; Bakhtiari Bastaki, B. The complexity of internet of things forensics: A state-of-the-art review. Forensic Sci. Int. Digit. Investig. 2021, 38, 301210. [Google Scholar] [CrossRef]
- Bakhshi, T. Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things. In Proceedings of the 2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST), Karachi, Pakistan, 10–11 December 2019; pp. 1–8. [Google Scholar]
- Lillis, D.; Becker, B.; O’Sullivan, T.; Scanlon, M. Current Challenges and Future Research Areas for Digital Forensic Investigation. arXiv 2016, arXiv:1604.03850. [Google Scholar] [CrossRef]
- Vincze, E.A. Challenges in digital forensics. Police Pract. Res. 2016, 17, 183–194. [Google Scholar] [CrossRef]
- Montasari, R.; Hill, R. Next-Generation Digital Forensics: Challenges and Future Paradigms. In Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, 16–18 January 2019; pp. 205–212. [Google Scholar]
- Quick, D.; Choo, K.-K.R. Big forensic data reduction: Digital forensic images and electronic evidence. Clust. Comput 2016, 19, 723–740. [Google Scholar] [CrossRef]
- Scanlon, M. Battling the digital forensic backlog through data deduplication. In Proceedings of the 2016 Sixth International Conference on Innovative Computing Technology (INTECH), Dublin, Ireland, 24–26 August 2016; pp. 10–14. [Google Scholar]
- Quick, D.; Choo, K.-K.R. Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix. Future Gener. Comput. Syst. 2018, 78, 558–567. [Google Scholar] [CrossRef]
- Conti, M.; Dehghantanha, A.; Franke, K.; Watson, S. Internet of Things security and forensics: Challenges and opportunities. Future Gener. Comput. Syst. 2018, 78, 544–546. [Google Scholar] [CrossRef]
- Haefner, N.; Wincent, J.; Parida, V.; Gassmann, O. Artificial intelligence and innovation management: A review, framework, and research agenda✩. Technol. Forecast. Soc. Change 2021, 162, 120392. [Google Scholar] [CrossRef]
- Torous, J.; Bucci, S.; Bell, I.H.; Kessing, L.V.; Faurholt-Jepsen, M.; Whelan, P.; Carvalho, A.F.; Keshavan, M.; Linardon, J.; Firth, J. The growing field of digital psychiatry: Current evidence and the future of apps, social media, chatbots, and virtual reality. World Psychiatry 2021, 20, 318–335. [Google Scholar] [CrossRef] [PubMed]
- Al-Khateeb, H.; Epiphaniou, G.; Daly, H. Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger. In Blockchain and Clinical Trial: Securing Patient Data; Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G., Al-Khateeb, H., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 149–168. ISBN 978-3-030-11289-9. [Google Scholar]
- D’Anna, T.; Puntarello, M.; Cannella, G.; Scalzo, G.; Buscemi, R.; Zerbo, S.; Argo, A. The Chain of Custody in the Era of Modern Forensics: From the Classic Procedures for Gathering Evidence to the New Challenges Related to Digital Data. Healthcare 2023, 11, 634. [Google Scholar] [CrossRef] [PubMed]
- Lone, A.H.; Mir, R.N. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer. Digit. Investig. 2019, 28, 44–55. [Google Scholar] [CrossRef]
- Ali, M.; Ismail, A.; Elgohary, H.; Darwish, S.; Mesbah, S. A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain. Symmetry 2022, 14, 334. [Google Scholar] [CrossRef]
- Elgohary, H.M.; Darwish, S.M.; Elkaffas, S.M. Improving Uncertainty in Chain of Custody for Image Forensics Investigation Applications. IEEE Access 2022, 10, 14669–14679. [Google Scholar] [CrossRef]
- Sarishma; Gupta, A.; Mishra, P. Blockchain Based Framework to Maintain Chain of Custody (CoC) in a Forensic Investigation. In Proceedings of the Advances in Computing and Data Sciences; Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T., Sonawane, V.R., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 37–46. [Google Scholar]
- Khan, A.A.; Shaikh, A.A.; Laghari, A.A.; Dootio, M.A.; Rind, M.M.; Awan, S.A. Digital forensics and cyber forensics investigation: Security challenges, limitations, open issues, and future direction. Int. J. Electron. Secur. Digit. Forensics 2022, 14, 124–150. [Google Scholar] [CrossRef]
- Khan, A.A.; Shaikh, A.A.; Laghari, A.A. IoT with Multimedia Investigation: A Secure Process of Digital Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth. Arab. J. Sci. Eng. 2023, 48, 10173–10188. [Google Scholar] [CrossRef]
- Isaac Abiodun, O.; Alawida, M.; Esther Omolara, A.; Alabdulatif, A. Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 10217–10245. [Google Scholar] [CrossRef]
- Conlan, K.; Baggili, I.; Breitinger, F. Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digit. Investig. 2016, 18, S66–S75. [Google Scholar] [CrossRef]
- Choi, D.-H. Digital Forensic: Challenges and Solution in the Protection of Corporate Crime. J. Ind. Distrib. Bus. 2021, 12, 47–55. [Google Scholar] [CrossRef]
- Kumar, A.; Chauhan, M.; Jain, A.K.; Johri, P. Analysis on Digital Forensics Challenges and Anti-forensics Techniques in Cloud Computing. In Proceedings of the 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 16–17 December 2022; pp. 699–702. [Google Scholar]
- Gashi, H.; Zargari, S.; Jalali Ghazaani, S. Data Hiding in Anti-forensics—Exploit Delivery Through Digital Steganography. In Proceedings of the Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs; Jahankhani, H., Ed.; Springer Nature Switzerland: Cham, Switzerland, 2024; pp. 65–76. [Google Scholar]
- Javed, A.R.; Ahmed, W.; Alazab, M.; Jalil, Z.; Kifayat, K.; Gadekallu, T.R. A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions. IEEE Access 2022, 10, 11065–11089. [Google Scholar] [CrossRef]
- Singh, A.; Ikuesan, R.A.; Venter, H. Secure Storage Model for Digital Forensic Readiness. IEEE Access 2022, 10, 19469–19480. [Google Scholar] [CrossRef]
- Horsman, G.; Sunde, N. Unboxing the digital forensic investigation process. Sci. Justice 2022, 62, 171–180. [Google Scholar] [CrossRef] [PubMed]
- Prakash, V.; Williams, A.; Garg, L.; Barik, P.; Dhanaraj, R.K. Cloud-Based Framework for Performing Digital Forensic Investigations. Int. J. Wirel. Inf. Netw. 2022, 29, 419–441. [Google Scholar] [CrossRef]
- Yaacoub, J.-P.A.; Noura, H.N.; Salman, O.; Chehab, A. Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet Things 2022, 19, 100544. [Google Scholar] [CrossRef]
- Neale, C.; Kennedy, I.; Price, B.; Yu, Y.; Nuseibeh, B. The case for Zero Trust Digital Forensics. Forensic Sci. Int. Digit. Investig. 2022, 40, 301352. [Google Scholar] [CrossRef]
- Casino, F.; Dasaklis, T.K.; Spathoulas, G.P.; Anagnostopoulos, M.; Ghosal, A.; Borocz, I.; Solanas, A.; Conti, M.; Patsakis, C. Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 2022, 10, 25464–25493. [Google Scholar] [CrossRef]
- Horsman, G. Defining principles for preserving privacy in digital forensic examinations. Forensic Sci. Int. Digit. Investig. 2022, 40, 301350. [Google Scholar] [CrossRef]
- Stoykova, R. The right to a fair trial as a conceptual framework for digital evidence rules in criminal investigations. Comput. Law Secur. Rev. 2023, 49, 105801. [Google Scholar] [CrossRef]
- Maratsi, M.I.; Popov, O.; Alexopoulos, C.; Charalabidis, Y. Ethical and Legal Aspects of Digital Forensics Algorithms: The Case of Digital Evidence Acquisition. In Proceedings of the 15th International Conference on Theory and Practice of Electronic Governance; Association for Computing Machinery: New York, NY, USA, 2022; pp. 32–40. [Google Scholar]
- Samdani, S.; Kumar, D.D. A Holistic Examination Of Investigative And Prosecutorial Practices In Addressing Cyber And Physical Offenses Within India. Educ. Adm. Theory Pract. 2023, 29, 525–532. [Google Scholar] [CrossRef]
- Ogunseyi, T.B.; Adedayo, O.M. Cryptographic Techniques for Data Privacy in Digital Forensics. IEEE Access 2023, 11, 142392–142410. [Google Scholar] [CrossRef]
- Firdonsyah, A.; Purwanto, P.; Riadi, I. Framework for Digital Forensic Ethical Violations: A Systematic Literature Review. E3S Web Conf. 2023, 448, 01003. [Google Scholar] [CrossRef]
- Di Nuzzo, V. Search and Seizure of Digital Evidence: Human Rights Concerns and New Safeguards. In Investigating and Preventing Crime in the Digital Era: New Safeguards, New Rights; Bachmaier Winter, L., Ruggeri, S., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 119–149. ISBN 978-3-031-13952-9. [Google Scholar]
- Renaud, K.; Bongiovanni, I.; Wilford, S.; Irons, A. PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations. Sci. Justice 2021, 61, 477–492. [Google Scholar] [CrossRef] [PubMed]
- Horsman, G.; Sunde, N. Part 1: The need for peer review in digital forensics. Forensic Sci. Int. Digit. Investig. 2020, 35, 301062. [Google Scholar] [CrossRef]
- Solanke, A.A. Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models. Forensic Sci. Int. Digit. Investig. 2022, 42, 301403. [Google Scholar] [CrossRef]
- Karagiannis, C.; Vergidis, K. Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information 2021, 12, 181. [Google Scholar] [CrossRef]
- Wilson-Kovacs, D. Digital media investigators: Challenges and opportunities in the use of digital forensics in police investigations in England and Wales. Polic. Int. J. 2021, 44, 669–682. [Google Scholar] [CrossRef]
- Tully, G.; Cohen, N.; Compton, D.; Davies, G.; Isbell, R.; Watson, T. Quality standards for digital forensics: Learning from experience in England & Wales. Forensic Sci. Int. Digit. Investig. 2020, 32, 200905. [Google Scholar] [CrossRef]
- Chen, C.; Dong, B. Digital forensics analysis based on cybercrime and the study of the rule of law in space governance. Open Comput. Sci. 2023, 13. [Google Scholar] [CrossRef]
- Marshall, K.; Rea, A. Legal Challenges in Cloud Forensics’. In AMCIS. 2021. Available online: https://web.archive.org/web/20220803140614id_/https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1341&context=amcis2021 (accessed on 18 February 2024).
- Sarfraz, M. Cybersecurity Threats with New Perspectives; BoD–Books on Demand: London, UK, 2021; ISBN 978-1-83968-852-2. [Google Scholar]
- Sharma, B.K.; Hachem, M.; Mishra, V.P.; Kaur, M.J. Internet of Things in Forensics Investigation in Comparison to Digital Forensics. In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario’s; Singh, P.K., Bhargava, B.K., Paprzycki, M., Kaushal, N.C., Hong, W.-C., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 672–684. ISBN 978-3-030-40305-8. [Google Scholar]
- Gogolin, G. (Ed.) Digital Forensics Explained, 2nd ed.; CRC Press: Boca Raton, FL, USA, 2021; ISBN 978-1-00-304935-7. [Google Scholar]
- Mohammmed, S.; Sridevi, R. A Survey on Digital Forensics Phases, Tools and Challenges. In Proceedings of the Third International Conference on Computational Intelligence and Informatics; Raju, K.S., Govardhan, A., Rani, B.P., Sridevi, R., Murty, M.R., Eds.; Springer: Singapore, 2020; pp. 237–248. [Google Scholar]
- Yeboah-Ofori, A.; Brown, A.D. Digital forensics investigation jurisprudence: Issues of admissibility of digital evidence. J. Forensic Leg. Investig. Sci. 2020, 6, 1–8. [Google Scholar] [CrossRef] [PubMed]
- Stigall, M.; Choo, K.-K.R. Digital Forensics Education: Challenges and Future Opportunities. In Proceedings of the National Cyber Summit (NCS) Research Track 2021; Choo, K.-K.R., Morris, T., Peterson, G., Imsand, E., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 28–46. [Google Scholar]
- Muthye, S.S. Challenges in Digital Forensics and Future Aspects. In Unleashing the Art of Digital Forensics; Chapman and Hall/CRC: Boca Raton, FL, USA, 2022; ISBN 978-1-00-320486-2. [Google Scholar]
- Bas Seyyar, M.; Geradts, Z.J.M.H. Privacy impact assessment in large-scale digital forensic investigations. Forensic Sci. Int. Digit. Investig. 2020, 33, 200906. [Google Scholar] [CrossRef]
- Casey, E.; Souvignet, T.R. Digital transformation risk management in forensic science laboratories. Forensic Sci. Int. 2020, 316, 110486. [Google Scholar] [CrossRef]
- Stoykova, R. Digital evidence: Unaddressed threats to fairness and the presumption of innocence. Comput. Law Secur. Rev. 2021, 42, 105575. [Google Scholar] [CrossRef]
Criteria | Score |
---|---|
Master’s degree in digital forensics or related fields | 04 |
PhD degree in digital forensics or related fields | 06 |
Minimum of 5 years of experience | 04 |
Minimum of 10 years of experience | 06 |
Proven track record of high-quality research published in peer-reviewed journals | 03 |
Professional certificates in forensics or related fields | 02 |
Technical experience in digital investigative tools | 03 |
Strong industry portfolio—proven resolved cases | 03 |
Criterion | Digital Forensic Readiness [18] | LEChain [19] | Advanced DFIFs [20] | Ransomware DFR [21] | Internet-of-Forensics [22] | D4I Framework [23] | FoBI Framework [24] | FRED [25] | IoT Forensic Framework [26] | DERDS Framework [27] | Our Proposed Framework: ETHICore |
---|---|---|---|---|---|---|---|---|---|---|---|
Proactive Preparedness | ✓✫ | x | ✓ | ✓✫ | x | ✓ | ✓ | x | x | x | ✓✫ |
Evidence Integrity | ✓✫ | ✓✫ | ✓✫ | ✓ | ✓✫ | ✓✫ | ✓ | ✓✫ | ✓✫ | ✓ | ✓✫ |
Privacy and Security | x | ✓✫ | x | x | ✓✫ | x | x | x | x | ✓ | ✓✫ |
Scalability and Efficiency | ✓ | ✓ | ✓ | ✓ | ✓✫ | ✓ | ✓ | x | x | x | ✓✫ |
Advanced Analytical Tools | x | x | ✓ | ✓ | ✓ | ✓ | ✓ | ✓✫ | x | x | ✓✫ |
Empirical Validation | ✓ | ✓ | x | x | ✓ | ✓ | x | ✓✫ | x | x | ✓✫ |
Legal and Ethical Considerations | x | ✓ | x | x | ✓ | ✓ | x | x | ✓ | ✓✫ | ✓✫ |
Comprehensive Documentation | ✓ | ✓ | ✓ | x | ✓ | ✓ | x | ✓✫ | x | ✓✫ | ✓✫ |
Ethical Principle | Ethical Principle | Description |
---|---|---|
E1 | Define concern | Begin with meticulously outlining the concern of the case investigation. |
E2 | Confidentiality preservation | The confidentiality of information must be ensured only by investigation parties classified as being of interest to the case. |
E3 | Investigation scope | If it is proven that other parties have been involved, the investigation will be extended to include them. Investigation procedures of third parties must be conducted only by investigative units classified as being of interest to the case. |
E4 | Data relevancy | Any private information obtained through the investigation that is considered irrelevant to the investigation must be excluded in reports. |
E5 | Data storage | A reliable and secured data storage platform must be established to preserve the obtained data for the examination process. |
E6 | Examination process | Qualified people with proven experiences must lead the investigation and oversee the entire process. |
E7 | Documentation of investigation’s procedures | All actions must be recorded and the analysed and judged confidential and relevant information to the investigation must be documented in detail. |
E8 | Auditing process | Outline the auditing strategy and plans to inspect, observe, and confirm the correctness of the findings of all forensic teams. |
E9 | Report writing | After concluding the report and identifying all the findings, the report must be structured to include all details of the investigation including what evidence was examined, how data were classified, and who was involved in the investigation. |
E10 | Transparency of the investigation | In case the investigation has been extended to a further range, the reason and clarifications must be submitted to justify why the investigation was extended. |
E11 | Professional training | Regular training must be provided to the forensic investigators to ensure the accuracy and quality of work presented. |
E12 | Confidentiality, integrity, and availability of the investigation | The work must be performed lawfully with a high level of confidentiality and integrity to make sure the evidence is valid and available upon request. |
E13 | Investigators’ well-being | The well-being of the investigators must be taken as a highest priority so they can continue the work professionally with accurate results. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Adel, A.; Ahsan, A.; Davison, C. ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic Readiness. Information 2024, 15, 363. https://doi.org/10.3390/info15060363
Adel A, Ahsan A, Davison C. ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic Readiness. Information. 2024; 15(6):363. https://doi.org/10.3390/info15060363
Chicago/Turabian StyleAdel, Amr, Ali Ahsan, and Claire Davison. 2024. "ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic Readiness" Information 15, no. 6: 363. https://doi.org/10.3390/info15060363
APA StyleAdel, A., Ahsan, A., & Davison, C. (2024). ETHICore: Ethical Compliance and Oversight Framework for Digital Forensic Readiness. Information, 15(6), 363. https://doi.org/10.3390/info15060363