This module is a resource for lecturers
Advanced reading
The following readings are recommended for those interested in exploring the topics covered in this Module in more detail:
- Alavrez, Karolina and Masooda Bashir. (2015). Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita. In: Joshua I. James and Frank Breitinger, eds. 7th International Conference on Digital forensics and Cyber Crime, Selected Conference Papers (Seoul, South Korea, 6-8 October 2015).
- Antwi-Boasiako, Albert and Hein Venter. (2017). A Model for Digital Evidence Admissibility Assessment. In: G. Peterson and S. Shenoi. (eds.). Advances in Digital Forensics (pp. 23-38). Springer.
- Barmpatsalou, Konstantia, Dimitrios Damopoulos, Georgios Kambourakis, and Vasilios Katos. (2013). A critical review of 7 years of Mobile Device Forensics. Digital Investigation, Vol. 10(4), 323-349.
- Burke, Paul and Philip Craiger. (2007). Forensic Analysis of Xbox Consoles. Advances in Digital Forensics III: IFIP International Conference on Digital Forensics (pp. 269-280).
- Eden, Peter, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, High Soulsby, and Kristin Stoddart. (2015). A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. 10th International Conference, Critical Information Infrastructure Security (CRITIS), Berlin, Germany (pp. 27-39).
- Joshi, R. C. and Pilli, Emmanuel S. (2016). Fundamentals of Network Forensics: A Research Perspective. Springer.
- Pieterse, Heloise and Martin Olivier. (2014). Smartphones as Distributed Witnesses for Digital Forensics. Advances in Digital Forensics X: IFIP International Conference on Digital Forensics (pp. 237-251).
- Quick, Darren and Kim-Kwang Raymond Choo. (2017). Pervasive social networking forensics: Intelligence and evidence from mobile device extracts. Journal of Network and Computer Applications, Vol. 86, 24-33.
- Sommer, Peter. (2018). Accrediting digital forensics. Digital Investigation, Vol. 25, 116-120.
- Suleman, Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, and Iftikhar Ahmad. (2016). Network forensics: Review, taxonomy, and open challenges. Journal of Network and Computer Applications 66, 214-235.
- UK Crown Prosecution Service. (n.d.). Cybercrime - prosecution guidance .