On User Interaction Behavior as Evidence for Computer Forensic Analysis

Author(s):  
Chao Shen ◽  
Zhongmin Cai ◽  
Roy A. Maxion ◽  
Xiaohong Guan
2012 ◽  
pp. 1221-1236
Author(s):  
Gregory H. Carlton ◽  
Hill Zhou

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.


2012 ◽  
Vol 4 (4) ◽  
pp. 15-30 ◽  
Author(s):  
John Haggerty ◽  
Mark C. Casson ◽  
Sheryllynne Haggerty ◽  
Mark J. Taylor

The increasing use of social media, applications or platforms that allow users to interact online, ensures that this environment will provide a useful source of evidence for the forensics examiner. Current tools for the examination of digital evidence find this data problematic as they are not designed for the collection and analysis of online data. Therefore, this paper presents a framework for the forensic analysis of user interaction with social media. In particular, it presents an inter-disciplinary approach for the quantitative analysis of user engagement to identify relational and temporal dimensions of evidence relevant to an investigation. This framework enables the analysis of large data sets from which a (much smaller) group of individuals of interest can be identified. In this way, it may be used to support the identification of individuals who might be ‘instigators’ of a criminal event orchestrated via social media, or a means of potentially identifying those who might be involved in the ‘peaks’ of activity. In order to demonstrate the applicability of the framework, this paper applies it to a case study of actors posting to a social media Web site.


2015 ◽  
Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.


Author(s):  
Firmansyah Gustav Hikmatyar ◽  
Bambang Sugiantoro

As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Longshan Chen ◽  
Leping Yuan ◽  
Zhangxiang Zhu

PurposeThis study aims to explore the value co-creation for developing cultural and creative virtual brand communities (CCVBCs) by developing a conceptual framework based on the stimulus-organism-response framework, social cognition theory (SCT) and social exchange theory (SET).Design/methodology/approachThe proposed conceptual framework was developed from a comprehensive review of the related literature. This study tested and validated the proposed framework using partial least square structural equation model based on the data collected through a survey.FindingsFirst, perceived hedonic benefit was positively affected by content personalization, user interaction design and technological innovation. Perceived social benefit and perceived self-achievement benefit were positively affected by user interaction design and technological innovation. Second, user content creation behavior was affected by perceived social benefit and perceived self-achievement benefit; user browsing behavior was significantly affected only by perceived hedonic benefit, and interaction behavior was significantly affected by perceived hedonic benefit, perceived social benefit and perceived self-achievement benefit. Third, perceived social benefit and perceived self-achievement benefit partially mediated the relationship between user interaction design and interaction behavior. As for the influence of technological innovation on interaction behavior, however, and the influence of user interaction design and technological innovation on content creation behavior, both perceived social benefit and perceived self-achievement benefit had complete mediation.Originality/valueThis study found that the characteristics of developing CCVBCs affected perceived benefit in participating in the value co-creation process. The results contributed to the value creation research by enriching the understanding of user value co-creation in developing CCVBCs.


Sign in / Sign up

Export Citation Format

Share Document