Face Validation of Database Forensic Investigation Metamodel

被引:17
作者
Al-Dhaqm, Arafat [1 ,2 ]
Razak, Shukor [1 ]
Ikuesan, Richard A. [3 ]
R. Kebande, Victor [4 ,5 ]
Hajar Othman, Siti [1 ]
机构
[1] Univ Teknol Malaysia UTM, Sch Comp, Dept Comp Sci, Fac Engn, Skudai 81310, Kagawa, Malaysia
[2] Aden Community Coll, Dept Comp Sci, Aden 999101, Yemen
[3] Community Coll Qatar, Sch Informat Technol, Dept Cybersecur & Networking, Doha 7344, Qatar
[4] Malmo Univ, Dept Comp Sci & Media Technol Dept, Nordenskioldsgatan 1, S-21119 Malmo, Sweden
[5] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
关键词
database forensics; digital forensic; face validity; metamodel; validation; SIMULATION;
D O I
10.3390/infrastructures6020013
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation (DBFI) field, where several models were identified, collected, and reviewed to develop DBFIM. However, the developed DBFIM lacked the face validity-based approach that could ensure DBFIM's applicability in the DBFI field. The completeness, usefulness, and logic of the developed DBFIM needed to be validated by experts. Therefore, the objective of this paper is to perform the validation of the developed DBFIM using the qualitative face validity approach. The face validity method is a common way of validating metamodels through subject expert inquiry on the domain application of the metamodel to assess whether the metamodel is reasonable and compatible based on the outcomes. For this purpose, six experts were nominated and selected to validate the developed DBFIM. From the expert review, the developed DBFIM was found to be complete, coherent, logical, scalable, interoperable, and useful for the DBFI field.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 55 条
[1]   Ideal log setting for database forensics reconstruction [J].
Adedayo, Oluwasola Mary ;
Olivier, Martin S. .
DIGITAL INVESTIGATION, 2015, 12 :27-40
[2]  
Al-Dhaqm A., 2018, P 2018 IEEE C APPL
[3]   Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field [J].
Al-Dhaqm, Arafat ;
Abd Razak, Shukor ;
Siddique, Kamran ;
Ikuesan, Richard Adeyemi ;
Kebande, Victor R. .
IEEE ACCESS, 2020, 8 :145018-145032
[4]   Categorization and Organization of Database Forensic Investigation Processes [J].
Al-Dhaqm, Arafat ;
Abd Razak, Shukor ;
Dampier, David A. ;
Choo, Kim-Kwang Raymond ;
Siddique, Kamran ;
Ikuesan, Richard Adeyemi ;
Alqarni, Abdulhadi ;
Kebande, Victor R. .
IEEE ACCESS, 2020, 8 :112846-112858
[5]   Database Forensic Investigation Process Models: A Review [J].
Al-dhaqm, Arafat ;
Abd Razak, Shukor ;
Othman, Siti Hajar ;
Ali, Abdulalem ;
Ghaleb, Fuad A. ;
Rosman, Arieff Salleh ;
Marni, Nurazmallail .
IEEE ACCESS, 2020, 8 :48477-48490
[6]   CDBFIP: Common Database Forensic Investigation Processes for Internet of Things [J].
Al-Dhaqm, Arafat ;
Razak, Shukor ;
Othman, Siti Hajar ;
Choo, Kim-Kwang Raymond ;
Glisson, William Bradley ;
Ali, Abdulalem ;
Abrar, Mohammad .
IEEE ACCESS, 2017, 5 :24401-24416
[7]   Development and validation of a Database Forensic Metamodel (DBFM) [J].
Al-dhaqm, Arafat ;
Razak, Shukor ;
Othman, Siti Hajar ;
Ngadi, Asri ;
Ahmed, Mohammed Nazir ;
Mohammed, Abdulalem Ali .
PLOS ONE, 2017, 12 (02)
[8]  
Al-Dhaqm AMR, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P322, DOI 10.1109/ISBAST.2014.7013142
[9]  
[Anonymous], INTELLIGENTCONTROLAN, DOI DOI 10.4236/ICA.2012.33023
[10]  
[Anonymous], 1998, An introduction to qualitative research