This module is a resource for lecturers
References
Materials with this icon can be found in the E4J Library of Resources.
Publications and online portals
- Antwi-Boasiako, Albert and Hein Venter. (2017).
A Model for Digital Evidence Admissibility Assessment. G. Peterson and S. Shenoi. (eds.).
Advances in Digital Forensics (pp. 23-38).
- Barbara, John. (2012). ISO/IEC 17025:2005
Accreditation of the Digital Forensics Discipline in Perspective.
Forensic Magazine, 23 February 2012.
- Boddington, Richard. (2016).
A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial.
Annual ADFSL Conference on Digital Forensics, Security and Law.
- Brezinski, D. and T. Killalea. (2002).
Guidelines for Evidence Collection and Archiving . Request for Comments: 3227.
- Carrier, Brain. (2005).
File System Forensic Analysis . Pearson.
- Casey, Eoghan. (2011).
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 3rd Edition. Academic Press.
- Casey, Eoghan. (2010).
Handbook of digital forensics and investigation . Elsevier.
- Cloud Security Alliance. (2013). Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing.
- Conlan, Kevin, Ibrahim Baggili, and Frank Breitinger. (2016).
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy.
Digital Investigation Vol. 18, 66-75.
- Data Security Council of India. (2011).
Cyber Crime Investigation Manual.
- European Network of Forensic Science Institute. (2015).
Best practice manual for the forensic examination of digital technology . ENFSI-BPM-FIT-01.
- Finklea, Kristin. (2017).
Law Enforcement Using and Disclosing Technology Vulnerabilities Specialist in Domestic Security . Congressional Research Service, R44827.
- Forensic Access. (2017). Forensic Services. United Kingdom.
- Grance, Tim, Suzanne Chevalier, Karen Kent, and Hung Dang. (2005).
Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response. Recommendations of the National Institute of Standards and Technology . National Institute of Standards and Technology, Special Publication 800-86.
- ISFCE. (n.d.).
Code of Ethics and Professional Responsibility .
- ISO/IEC 17025. (2017). Testing and calibration laboratories.
- ISO/IEC 27037. (2012).
Guidelines for Identification, Collection, Acquisition, and Preservation of Digital Evidence .
- Kao, Da-Yu. (2016).
Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments.
The Journal of Supercomputing, Vol. 72(1), 141-160.
- Kassin, Saul M., Itiel E. Dror, and Jeff Kukucka. (2012).
The forensic confirmation bias: Problems, perspectives, and proposed solutions.
Journal of Applied Research in Memory and Cognition, Vol. 2(1), 42-52.
- Kizza, Joseph Migga. (2013). Computer Crime Investigations and Ethics. In:
Ethical and Social Issues in the Information Age, fifth edition. Springer; Chapter 15.
- Lawton, D., R. Stacey, and G. Dodd. (2014).
eDiscovery in digital forensic investigations. UK Home Office. CAST Publication Number 32/14.
- Maras, Marie-Helen. (2014).
Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett.
- Merriott, Robert. (2018).
ISO 17025 For Digital Forensics - Yay or Nay.
Forensic Focus, 24 January 2018.
- Nelson, Bill, Amelia Phillips, and Christopher Steuart. (2016).
Guide to Computer Forensics and Investigations , 5th Edition. Cengage Learning.
- NIST. (n.d.).
Computer Forensics Tool Testing Program (CFTT).
- Police Service of Scotland. (2018).
Digitally Stored Evidence Standard Operating Procedure , Version 2.
- Quick, Darren, Ben Martini, and Raymond Choo. (2014).
Cloud Storage Forensics . Elsevier.
- Roux, Brian and Michael Falgoust. (2012).
Ethical issues raised by data acquisition methods in digital forensics research.
Journal of Information Ethics, Vol. 21(1), 40-60.
- Sammons, John. (2012).
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics . Syngress.
- SANAS. (2016). Criteria For Laboratory Accreditation in the Field of Forensics. TG 01-02.
- Seigfried-Spellar, Kathryn C., Marcus Rogers, and Danielle M. Crimmins. (2017).
Development of A Professional Code of Ethics in Digital Forensics.
Annual ADFSL Conference on Digital Forensics, Security and Law, 135-144.
- Sharevski, Filipeo. (2015).
Rules of professional responsibility in digital forensics: A comparative analysis.
Journal of Digital Forensics, Security and Law, Vol. 10(2), 39-54.
- SWGDE. (2018). SWGDE Best Practices for Computer Forensic Acquisitions.
- SWGDE. (2018). SWGDE Best Practices for Computer Forensic Examination.
- SWGDE. (2018). SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Cloud Storage.
- SWGDE. (2018). SWGDE Best Practices for Image Authentication.
- SWGDE. (2017). SWGDE Best Practices for Image Content Analysis.
- SWGDE. (2018). SWGDE Best Practices for Mobile Device Evidence Collection and Preservation, Handling and Acquisition (Draft).
- SWGDE. (2013). SWGDE Best Practices for Mobile Phone Forensics.
- SWGDE. (2018). SWGDE Best Practices for the Acquisition of Data from Novel Digital Devices.
- SWGDE. (2014). SWGDE Capture of Live Systems.
- SWGDE. (n.d.). SWDGE Drafts For Public Comment.
- SWGDE. (2017). SWGDE Guidelines for Forensic Image Analysis.
- SWGDE. (2017). SWGDE Overview of the Accreditation Process for Digital and Multimedia Forensic Labs.
- SWGDE. (2014). SWGDE Recommended Guidelines for Validation Testing.
- UNODC. (2010). Policing. Crime Investigation Criminal Justice Assessment Toolkit
- UNODC. (2013).
Draft Comprehensive Study on Cybercrime.
- US National Institute of Justice. (2004a).
Digital Evidence in the Courtroom: A Guide For Law Enforcement and Prosecutors.
- US National Institute of Justice. (2008).
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition.
- US National Institute of Justice. (2004b).
Forensic Examination of Digital Evidence: A Guide for Law Enforcement.
- US National Institute of Justice. (2007b).
Investigative Uses of Technology: Devices, Tools, and Techniques.
- US National Institute of Justice. (2007a).
Investigations Involving the Internet and Computer Networks.
Cases
- Daubert v. Merrell Dow Pharmaceuticals Inc., 509 U.S. 579 (1993).
Legislation
- South Africa. Accreditation for Conformity Assessment, Calibration and Good Laboratory Practice Act. 2006.
- United Nations. Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography. 2000.
Next:
Exercises
Back to top