This module is a resource for lecturers
References
(Materials with * will be soon available at the Sherloc Bibliography Database)
Publications and online portals
- Antwi-Boasiako, Albert and Hein Venter. (2017). A Model for Digital Evidence Admissibility Assessment. G. Peterson and S. Shenoi. (eds.). Advances in Digital Forensics (pp. 23-38).*
- Barbara, John. (2012). ISO/IEC 17025:2005 Accreditation of the Digital Forensics Discipline in Perspective. Forensic Magazine, 23 February 2012.*
- Boddington, Richard. (2016). A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial. Annual ADFSL Conference on Digital Forensics, Security and Law.*
- Brezinski, D. and T. Killalea. (2002). Guidelines for Evidence Collection and Archiving . Request for Comments: 3227.
- Carrier, Brain. (2005). File System Forensic Analysis . Pearson.*
- Casey, Eoghan. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 3rd Edition. Academic Press.*
- Casey, Eoghan. (2010). Handbook of digital forensics and investigation . Elsevier.*
- Cloud Security Alliance. (2013). Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing.
- Conlan, Kevin, Ibrahim Baggili, and Frank Breitinger. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation Vol. 18, 66-75.*
- Data Security Council of India. (2011). Cyber Crime Investigation Manual.*
- European Network of Forensic Science Institute. (2015). Best practice manual for the forensic examination of digital technology . ENFSI-BPM-FIT-01.*
- Finklea, Kristin. (2017). Law Enforcement Using and Disclosing Technology Vulnerabilities Specialist in Domestic Security . Congressional Research Service, R44827.*
- Forensic Access. (2017). Forensic Services. United Kingdom.
- Grance, Tim, Suzanne Chevalier, Karen Kent, and Hung Dang. (2005). Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response. Recommendations of the National Institute of Standards and Technology . National Institute of Standards and Technology, Special Publication 800-86.*
- ISFCE. (n.d.). Code of Ethics and Professional Responsibility .*
- ISO/IEC 17025. (2017). Testing and calibration laboratories.
- ISO/IEC 27037. (2012). Guidelines for Identification, Collection, Acquisition, and Preservation of Digital Evidence .*
- Kao, Da-Yu. (2016). Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments. The Journal of Supercomputing, Vol. 72(1), 141-160.*
- Kassin, Saul M., Itiel E. Dror, and Jeff Kukucka. (2012). The forensic confirmation bias: Problems, perspectives, and proposed solutions. Journal of Applied Research in Memory and Cognition, Vol. 2(1), 42-52.*
- Kizza, Joseph Migga. (2013). Computer Crime Investigations and Ethics. In: Ethical and Social Issues in the Information Age, fifth edition. Springer; Chapter 15.*
- Lawton, D., R. Stacey, and G. Dodd. (2014). eDiscovery in digital forensic investigations. UK Home Office. CAST Publication Number 32/14.*
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett.*
- Merriott, Robert. (2018). ISO 17025 For Digital Forensics - Yay or Nay. Forensic Focus, 24 January 2018.*
- Nelson, Bill, Amelia Phillips, and Christopher Steuart. (2016). Guide to Computer Forensics and Investigations , 5th Edition. Cengage Learning.*
- NIST. (n.d.). Computer Forensics Tool Testing Program (CFTT).*
- Police Service of Scotland. (2018). Digitally Stored Evidence Standard Operating Procedure , Version 2.*
- Quick, Darren, Ben Martini, and Raymond Choo. (2014). Cloud Storage Forensics . Elsevier.*
- Roux, Brian and Michael Falgoust. (2012). Ethical issues raised by data acquisition methods in digital forensics research. Journal of Information Ethics, Vol. 21(1), 40-60.*
- Sammons, John. (2012). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics . Syngress.*
- SANAS. (2016). Criteria For Laboratory Accreditation in the Field of Forensics. TG 01-02.
- Seigfried-Spellar, Kathryn C., Marcus Rogers, and Danielle M. Crimmins. (2017). Development of A Professional Code of Ethics in Digital Forensics. Annual ADFSL Conference on Digital Forensics, Security and Law, 135-144.*
- Sharevski, Filipeo. (2015). Rules of professional responsibility in digital forensics: A comparative analysis. Journal of Digital Forensics, Security and Law, Vol. 10(2), 39-54.*
- SWGDE. (2018). SWGDE Best Practices for Computer Forensic Acquisitions.
Cases
- Daubert v. Merrell Dow Pharmaceuticals Inc., 509 U.S. 579 (1993).
Legislation