Accesso libero

Role of Digital Forensics in Combating Financial Crimes in the Computer Era

   | 16 lug 2023
INFORMAZIONI SU QUESTO ARTICOLO

Cita

Anderson, R. C., Barton, R., Böhme, M. J., van Eeten, M., Levi, T. M. & Savage, S. (2013). Measuring the Cost of Cybercrime. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. Springer. Search in Google Scholar

Al Fahdi, M., Clarke, N. L., & Furnell, S. M. (2013). Challenges to digital forensics: A survey of researchers and practitioners attitudes and opinions. 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, pp. 1–8. http://doi.org/10.1109/ISSA.2013.6641058 Search in Google Scholar

Adams, R. B. (2012). The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice. Journal of Digital Forensics, Security and Law, 8(4), pp. 25–48. Search in Google Scholar

Adams, R. B. (2013). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice. [Doctoral dissertation, Murdoch Unversity]. Retrieved from: http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf Search in Google Scholar

Bouveret, A. (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment. International Monetary Fund (IMF) Working Paper 2018/143, pp. 1-29. Search in Google Scholar

Casciani, D. (2017, January 19). Cybercrime and fraud scale revealed in annual figures. BBC News. Retrieved from: http://www.bbc.co.uk/news/uk-38675683 Search in Google Scholar

Casey, E. (2007) What Does “Forensically Sound” Really Mean? Digital Investigation, 4(2), pp. 49–50. doi: 10.1016/j.diin.2007.05.001. Search in Google Scholar

Constantiou, I., & Kallinikos, J. (2015). New Games, New Rules: Big Data and the Changing Context of Strategy. Journal of Information Technology 30(1), pp. 1-32. Search in Google Scholar

Choo, K. R. (2011). The Cyber Threat Landscape: Challenges and Future Research Directions. Computers & Security 30(8), pp. 719-731. Search in Google Scholar

Cebula, J. J. & Young, L. R. (2010). A taxonomy of Operational Cyber Security Risks, (CMU/SEI-2010-TN-028). Software Engineering Institute, Carnegie Mellon University. Search in Google Scholar

Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security Privacy, 15(6), pp. 12–17. http://doi.org/10.1109/MSP.2017.4251117 Search in Google Scholar

Dorrell, D. D., & Gadawski, G. A. (2012). Financial forensics body of knowledge. John Wiley & Sons. Search in Google Scholar

Du, X., Le-Khac, N., & Scanlon, M. (2017). Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. ArXiv, abs/1708.01730. Search in Google Scholar

Eling, M. & Wirfs, J. H. (2016). Cyber Risk: Too Big to Insure? Risk Transfer Options for a Mercurial Risk Class. I.VW HSG Schriftenreihe 59(59), University of St.Gallen, Institute of Insurance Economics (I.VW-HSG). Search in Google Scholar

European Central Bank. (2018, February 23). A Euro Cyber Resilience Board for pan-European Financial Infrastructures. Retrieved from: https://www.ecb.europa.eu/press/key/date/2018/html/ecb.sp180309_1.en.html Search in Google Scholar

Homem, I. (2018). Advancing Automation in Digital Forensic Investigations [Doctoral Dissertation, Stockholm University, Department of Computer and Systems Sciences]. Search in Google Scholar

Horsman, G. (2018). Framework for Reliable Experimental Design (FRED): A Research Framework To Ensure The Dependable Interpretation Of Digital Data For Digital Forensics. Computers and Security 73, pp. 294–306. http://doi.org/10.1016/j.cose.2017.11.009 Search in Google Scholar

Hewling, M. (2010). Digital Forensics: The UK Legal Framework [Masters dissertation, University of Liverpool]. Search in Google Scholar

Harbawi, M., & Varol, A. (2016). The role of digital forensics in combating cybercrimes. 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 138-142. Search in Google Scholar

Hassan, A., Lass, F., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, Effects and the way out. ARPNJ Science and Technology 2(7), pp. 626-631. Search in Google Scholar

United Nations. International Telecommunication Unit (ITU). (2017). Global Cybersecurity Index (GCI) 2017. Search in Google Scholar

James, J., & Gladyshev, P. (2013). Challenges with Automation in Digital Forensic Investigations. ArXiv, abs/1303.4498. Search in Google Scholar

Jaleshgari, R. (1999). Document Trading Online. Information Week 755(136). Search in Google Scholar

Kuchta K. J., (2000). Computer Forensics Today’s Law, Investigations and Ethics Available from: http://www.liv.ac.uk/library/ohecampus/ Search in Google Scholar

Lavorgna, A., & Sergi, A. (2014). Types of organized crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of Internet technologies. International Journal of Law, Crime and Justice 42(1), pp. 16-32. Search in Google Scholar

Mugisha, D. (2019). Role and Impact of Digital Forensics in Cybercrime Investigations. International Journal of Cyber Criminology 47(3). Retrieved from: https://www.researchgate.net/publication/331991596_role_and_impact_of_digital_forensics_in_cyber_crime_investigations. Search in Google Scholar

Mimoso, M. (2017). Maersk Shipping Reports $300M Loss Stemming from Not Petya Attack. Threat Post - The Kaspersky Lab Security News Service. Retrieved from: https://threatpost.com/maersk-shipping-reports-300m-lossstemming-from-notpetya-attack/127477/ Search in Google Scholar

Macdermott, Á., Baker, T., & Shi, Q. (2018). IoT Forensics: Challenges For The IoT Era. In 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) (pp. 1–5). Paris, France. http://doi.org/10.1109/NTMS.2018.8328748 Search in Google Scholar

McAfee, A., & Brynjolfsson, E. (2012). Big Data: The Management Revolution. Harvard Business Review 90(10), pp. 1-9. Search in Google Scholar

McAfee & CSIS (2018). The Economic Impact of Cybercrime - No Slowing Down. Search in Google Scholar

Mac Dermott, A. M., Baker, T., Buck, P., Iqbal, F., & Shi, Q. (2019). The Internet of Things: Challenges and Considerations For Cybercrime Investigations And Digital Forensics. International Journal of Digital Crime and Forensics (IJDCF) 12(1), pp. 1-13. Search in Google Scholar

Mocas, S. (2004). Building Theoretical Underpinnings for Digital Forensics Research. Digital Investigation 1(1), pp. 61–68. http://doi.org/10.1016/j.diin.2003.12.004 Search in Google Scholar

Okutan, A., & Cebi, Y. (2019). A framework for Cyber Crime Investigation. Procedia Computer Science 158, pp. 287–294. Search in Google Scholar

Oruc, E., & Tatar, C. (2017). An investigation of factors that affect internet banking usage based on structural equation modelling. Computational Human Behavior 66, pp. 232–235. Search in Google Scholar

Reith, M., Carr, C., & Gunsch, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence 1(3), pp. 1–12. Search in Google Scholar

Rogers, M. (2006). DCSA: A Practical Approach to Digital Crime Scene Analysis. In Tipton, H. F. & Krause, M. (Eds.), Information Security Management Handbook. Auerbach Publications. Search in Google Scholar

Schatz, B. (2007). Bodysnatcher: Towards Reliable Volatile Memory Acquisition By Software. Digital Investigation 4, pp. 126-134. Search in Google Scholar

Selamat, S. R., Yusof, R., & Sahib, S. (2008). Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security 8(10), pp. 163–169. Search in Google Scholar

Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Review 26(3), pp. 304–308. http://doi.org/10.1016/j.clsr.2010.03.002 Search in Google Scholar

Vrancianu, M., & Popa, L. A. (2010). Considerations Regarding the Security and Protection of E-Banking Services Consumers Interests. The Amfiteatru Economic Journal, 1228: pp. 388-403. Search in Google Scholar

Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Press. Search in Google Scholar