Digital forensic readiness: Expert perspectives on a theoretical framework

被引:41
作者
Elyas, Mohamed [1 ]
Ahmad, Atif [1 ]
Maynard, Sean B. [1 ]
Lonie, Andrew [2 ]
机构
[1] Univ Melbourne, Melbourne Sch Engn, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[2] Univ Melbourne, Victorian Life Sci Inst VLSI, Melbourne, Vic 3010, Australia
关键词
Digital forensics; Digital forensic readiness; Information security management; Focus group;
D O I
10.1016/j.cose.2015.04.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern organizations need to develop 'digital forensic readiness' to comply with their legal, contractual, regulatory, security and operational obligations. A review of academic and practitioner literature revealed a lack of comprehensive and coherent guidance on how forensic readiness can be achieved. This is compounded by the lack of maturity in the discourse of digital forensics rooted in the informal definitions of key terms and concepts. In this paper we validate and refine a digital forensic readiness framework through a series of expert focus groups. Drawing on the deliberations of experts in the focus groups, we discuss the critical issues facing practitioners in achieving digital forensic readiness. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:70 / 89
页数:20
相关论文
共 34 条
[1]   Information security strategies: towards an organizational multi-strategy perspective [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Park, Sangseo .
JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) :357-370
[2]   Incident response teams - Challenges in supporting the organisational security function [J].
Ahmad, Atif ;
Hadgkiss, Justin ;
Ruighaver, A. B. .
COMPUTERS & SECURITY, 2012, 31 (05) :643-652
[3]  
AIC, 2009, AUSTR BUS ASS COMP U
[4]  
[Anonymous], 2011, Communications of the Association for Information Systems
[5]  
[Anonymous], 2007, BEST DAMN CYBERCRIME
[6]  
[Anonymous], 2001, Forensic readiness
[7]  
Beebe N, 2009, IFIP ADV INF COMM TE, V306, P17
[8]   Using an expert panel to validate a requirements process improvement model [J].
Beecham, S ;
Hall, T ;
Britton, C ;
Cottee, M ;
Rainer, A .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :251-275
[9]  
Belanger France, 2012, Australasian Journal of Information Systems, V17, P109
[10]  
Biggs S., 2009, INT TECHN SEC T 2009