This module is a resource for lecturers
References
Materials with this icon can be found in the E4J Library of Resources.
Publications and online portals
- Antwi-Boasiako, Albert and Hein Venter. (2017). A Model for Digital Evidence Admissibility Assessment. G. Peterson and S. Shenoi. (eds.). Advances in Digital Forensics (pp. 23-38).
- Barbara, John. (2012). ISO/IEC 17025:2005 Accreditation of the Digital Forensics Discipline in Perspective. Forensic Magazine, 23 February 2012.
- Boddington, Richard. (2016). A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial. Annual ADFSL Conference on Digital Forensics, Security and Law.
- Brezinski, D. and T. Killalea. (2002). Guidelines for Evidence Collection and Archiving . Request for Comments: 3227.
- Carrier, Brain. (2005). File System Forensic Analysis . Pearson.
- Casey, Eoghan. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 3rd Edition. Academic Press.
- Casey, Eoghan. (2010). Handbook of digital forensics and investigation . Elsevier.
- Cloud Security Alliance. (2013). Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing.
- Conlan, Kevin, Ibrahim Baggili, and Frank Breitinger. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation Vol. 18, 66-75.
- Data Security Council of India. (2011). Cyber Crime Investigation Manual.
- European Network of Forensic Science Institute. (2015). Best practice manual for the forensic examination of digital technology . ENFSI-BPM-FIT-01.
- Finklea, Kristin. (2017). Law Enforcement Using and Disclosing Technology Vulnerabilities Specialist in Domestic Security . Congressional Research Service, R44827.
- Forensic Access. (2017). Forensic Services. United Kingdom.
- Grance, Tim, Suzanne Chevalier, Karen Kent, and Hung Dang. (2005). Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response. Recommendations of the National Institute of Standards and Technology . National Institute of Standards and Technology, Special Publication 800-86.
- ISFCE. (n.d.). Code of Ethics and Professional Responsibility .
- ISO/IEC 17025. (2017). Testing and calibration laboratories.
- ISO/IEC 27037. (2012). Guidelines for Identification, Collection, Acquisition, and Preservation of Digital Evidence .
- Kao, Da-Yu. (2016). Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments. The Journal of Supercomputing, Vol. 72(1), 141-160.
- Kassin, Saul M., Itiel E. Dror, and Jeff Kukucka. (2012). The forensic confirmation bias: Problems, perspectives, and proposed solutions. Journal of Applied Research in Memory and Cognition, Vol. 2(1), 42-52.
- Kizza, Joseph Migga. (2013). Computer Crime Investigations and Ethics. In: Ethical and Social Issues in the Information Age, fifth edition. Springer; Chapter 15.
- Lawton, D., R. Stacey, and G. Dodd. (2014). eDiscovery in digital forensic investigations. UK Home Office. CAST Publication Number 32/14.
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett.
- Merriott, Robert. (2018). ISO 17025 For Digital Forensics - Yay or Nay. Forensic Focus, 24 January 2018.
- Nelson, Bill, Amelia Phillips, and Christopher Steuart. (2016). Guide to Computer Forensics and Investigations , 5th Edition. Cengage Learning.
- NIST. (n.d.). Computer Forensics Tool Testing Program (CFTT).
- Police Service of Scotland. (2018). Digitally Stored Evidence Standard Operating Procedure , Version 2.
- Quick, Darren, Ben Martini, and Raymond Choo. (2014). Cloud Storage Forensics . Elsevier.
- Roux, Brian and Michael Falgoust. (2012). Ethical issues raised by data acquisition methods in digital forensics research. Journal of Information Ethics, Vol. 21(1), 40-60.
- Sammons, John. (2012). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics . Syngress.
- SANAS. (2016). Criteria For Laboratory Accreditation in the Field of Forensics. TG 01-02.
- Seigfried-Spellar, Kathryn C., Marcus Rogers, and Danielle M. Crimmins. (2017). Development of A Professional Code of Ethics in Digital Forensics. Annual ADFSL Conference on Digital Forensics, Security and Law, 135-144.
- Sharevski, Filipeo. (2015). Rules of professional responsibility in digital forensics: A comparative analysis. Journal of Digital Forensics, Security and Law, Vol. 10(2), 39-54.
- SWGDE. (2018). SWGDE Best Practices for Computer Forensic Acquisitions.
- SWGDE. (2018). SWGDE Best Practices for Computer Forensic Examination.
- SWGDE. (2018). SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Cloud Storage.
- SWGDE. (2018). SWGDE Best Practices for Image Authentication.
- SWGDE. (2017). SWGDE Best Practices for Image Content Analysis.
- SWGDE. (2018). SWGDE Best Practices for Mobile Device Evidence Collection and Preservation, Handling and Acquisition (Draft).
- SWGDE. (2013). SWGDE Best Practices for Mobile Phone Forensics.
- SWGDE. (2018). SWGDE Best Practices for the Acquisition of Data from Novel Digital Devices.
- SWGDE. (2014). SWGDE Capture of Live Systems.
- SWGDE. (n.d.). SWDGE Drafts For Public Comment.
- SWGDE. (2017). SWGDE Guidelines for Forensic Image Analysis.
- SWGDE. (2017). SWGDE Overview of the Accreditation Process for Digital and Multimedia Forensic Labs.
- SWGDE. (2014). SWGDE Recommended Guidelines for Validation Testing.
- UNODC. (2010). Policing. Crime Investigation Criminal Justice Assessment Toolkit
- UNODC. (2013).
Draft Comprehensive Study on Cybercrime.
- US National Institute of Justice. (2004a).
Digital Evidence in the Courtroom: A Guide For Law Enforcement and Prosecutors.
- US National Institute of Justice. (2008). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition.
- US National Institute of Justice. (2004b).
Forensic Examination of Digital Evidence: A Guide for Law Enforcement.
- US National Institute of Justice. (2007b).
Investigative Uses of Technology: Devices, Tools, and Techniques.
- US National Institute of Justice. (2007a). Investigations Involving the Internet and Computer Networks.
Cases
- Daubert v. Merrell Dow Pharmaceuticals Inc., 509 U.S. 579 (1993).
Legislation
- South Africa. Accreditation for Conformity Assessment, Calibration and Good Laboratory Practice Act. 2006.
- United Nations. Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography. 2000.
Next: Exercises
Back to top