Have a personal or library account? Click to login
Role of Digital Forensics in Combating Financial Crimes in the Computer Era Cover

Role of Digital Forensics in Combating Financial Crimes in the Computer Era

By: Atonbara Ombu  
Open Access
|Jul 2023

References

  1. Anderson, R. C., Barton, R., Böhme, M. J., van Eeten, M., Levi, T. M. & Savage, S. (2013). Measuring the Cost of Cybercrime. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. Springer.
  2. Al Fahdi, M., Clarke, N. L., & Furnell, S. M. (2013). Challenges to digital forensics: A survey of researchers and practitioners attitudes and opinions. 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, pp. 1–8. http://doi.org/10.1109/ISSA.2013.6641058
  3. Adams, R. B. (2012). The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice. Journal of Digital Forensics, Security and Law, 8(4), pp. 25–48.
  4. Adams, R. B. (2013). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice. [Doctoral dissertation, Murdoch Unversity]. Retrieved from: http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf
  5. Bouveret, A. (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment. International Monetary Fund (IMF) Working Paper 2018/143, pp. 1-29.
  6. Casciani, D. (2017, January 19). Cybercrime and fraud scale revealed in annual figures. BBC News. Retrieved from: http://www.bbc.co.uk/news/uk-38675683
  7. Casey, E. (2007) What Does “Forensically Sound” Really Mean? Digital Investigation, 4(2), pp. 49–50. doi: 10.1016/j.diin.2007.05.001.
  8. Constantiou, I., & Kallinikos, J. (2015). New Games, New Rules: Big Data and the Changing Context of Strategy. Journal of Information Technology 30(1), pp. 1-32.
  9. Choo, K. R. (2011). The Cyber Threat Landscape: Challenges and Future Research Directions. Computers & Security 30(8), pp. 719-731.
  10. Cebula, J. J. & Young, L. R. (2010). A taxonomy of Operational Cyber Security Risks, (CMU/SEI-2010-TN-028). Software Engineering Institute, Carnegie Mellon University.
  11. Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security Privacy, 15(6), pp. 12–17. http://doi.org/10.1109/MSP.2017.4251117
  12. Dorrell, D. D., & Gadawski, G. A. (2012). Financial forensics body of knowledge. John Wiley & Sons.
  13. Du, X., Le-Khac, N., & Scanlon, M. (2017). Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. ArXiv, abs/1708.01730.
  14. Eling, M. & Wirfs, J. H. (2016). Cyber Risk: Too Big to Insure? Risk Transfer Options for a Mercurial Risk Class. I.VW HSG Schriftenreihe 59(59), University of St.Gallen, Institute of Insurance Economics (I.VW-HSG).
  15. European Central Bank. (2018, February 23). A Euro Cyber Resilience Board for pan-European Financial Infrastructures. Retrieved from: https://www.ecb.europa.eu/press/key/date/2018/html/ecb.sp180309_1.en.html
  16. Homem, I. (2018). Advancing Automation in Digital Forensic Investigations [Doctoral Dissertation, Stockholm University, Department of Computer and Systems Sciences].
  17. Horsman, G. (2018). Framework for Reliable Experimental Design (FRED): A Research Framework To Ensure The Dependable Interpretation Of Digital Data For Digital Forensics. Computers and Security 73, pp. 294–306. http://doi.org/10.1016/j.cose.2017.11.009
  18. Hewling, M. (2010). Digital Forensics: The UK Legal Framework [Masters dissertation, University of Liverpool].
  19. Harbawi, M., & Varol, A. (2016). The role of digital forensics in combating cybercrimes. 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 138-142.
  20. Hassan, A., Lass, F., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, Effects and the way out. ARPNJ Science and Technology 2(7), pp. 626-631.
  21. United Nations. International Telecommunication Unit (ITU). (2017). Global Cybersecurity Index (GCI) 2017.
  22. James, J., & Gladyshev, P. (2013). Challenges with Automation in Digital Forensic Investigations. ArXiv, abs/1303.4498.
  23. Jaleshgari, R. (1999). Document Trading Online. Information Week 755(136).
  24. Kuchta K. J., (2000). Computer Forensics Today’s Law, Investigations and Ethics Available from: http://www.liv.ac.uk/library/ohecampus/
  25. Lavorgna, A., & Sergi, A. (2014). Types of organized crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of Internet technologies. International Journal of Law, Crime and Justice 42(1), pp. 16-32.
  26. Mugisha, D. (2019). Role and Impact of Digital Forensics in Cybercrime Investigations. International Journal of Cyber Criminology 47(3). Retrieved from: https://www.researchgate.net/publication/331991596_role_and_impact_of_digital_forensics_in_cyber_crime_investigations.
  27. Mimoso, M. (2017). Maersk Shipping Reports $300M Loss Stemming from Not Petya Attack. Threat Post - The Kaspersky Lab Security News Service. Retrieved from: https://threatpost.com/maersk-shipping-reports-300m-lossstemming-from-notpetya-attack/127477/
  28. Macdermott, Á., Baker, T., & Shi, Q. (2018). IoT Forensics: Challenges For The IoT Era. In 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) (pp. 1–5). Paris, France. http://doi.org/10.1109/NTMS.2018.8328748
  29. McAfee, A., & Brynjolfsson, E. (2012). Big Data: The Management Revolution. Harvard Business Review 90(10), pp. 1-9.
  30. McAfee & CSIS (2018). The Economic Impact of Cybercrime - No Slowing Down.
  31. Mac Dermott, A. M., Baker, T., Buck, P., Iqbal, F., & Shi, Q. (2019). The Internet of Things: Challenges and Considerations For Cybercrime Investigations And Digital Forensics. International Journal of Digital Crime and Forensics (IJDCF) 12(1), pp. 1-13.
  32. Mocas, S. (2004). Building Theoretical Underpinnings for Digital Forensics Research. Digital Investigation 1(1), pp. 61–68. http://doi.org/10.1016/j.diin.2003.12.004
  33. Okutan, A., & Cebi, Y. (2019). A framework for Cyber Crime Investigation. Procedia Computer Science 158, pp. 287–294.
  34. Oruc, E., & Tatar, C. (2017). An investigation of factors that affect internet banking usage based on structural equation modelling. Computational Human Behavior 66, pp. 232–235.
  35. Reith, M., Carr, C., & Gunsch, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence 1(3), pp. 1–12.
  36. Rogers, M. (2006). DCSA: A Practical Approach to Digital Crime Scene Analysis. In Tipton, H. F. & Krause, M. (Eds.), Information Security Management Handbook. Auerbach Publications.
  37. Schatz, B. (2007). Bodysnatcher: Towards Reliable Volatile Memory Acquisition By Software. Digital Investigation 4, pp. 126-134.
  38. Selamat, S. R., Yusof, R., & Sahib, S. (2008). Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security 8(10), pp. 163–169.
  39. Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Review 26(3), pp. 304–308. http://doi.org/10.1016/j.clsr.2010.03.002
  40. Vrancianu, M., & Popa, L. A. (2010). Considerations Regarding the Security and Protection of E-Banking Services Consumers Interests. The Amfiteatru Economic Journal, 1228: pp. 388-403.
  41. Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Press.
Language: English
Page range: 57 - 75
Submitted on: Mar 2, 2023
|
Accepted on: Jun 12, 2023
|
Published on: Jul 16, 2023
Published by: University of Sarajevo
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2023 Atonbara Ombu, published by University of Sarajevo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.