International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 169 - Issue 11 |
Published: Jul 2017 |
Authors: K. O. Peasah, Ebenezer Quayson, Osei Agyei, Ed. Danso Ansong |
![]() |
K. O. Peasah, Ebenezer Quayson, Osei Agyei, Ed. Danso Ansong . Survey of Digital Forensic Models and Proposed Thematic Scheme. International Journal of Computer Applications. 169, 11 (Jul 2017), 41-45. DOI=10.5120/ijca2017914782
@article{ 10.5120/ijca2017914782, author = { K. O. Peasah,Ebenezer Quayson,Osei Agyei,Ed. Danso Ansong }, title = { Survey of Digital Forensic Models and Proposed Thematic Scheme }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 169 }, number = { 11 }, pages = { 41-45 }, doi = { 10.5120/ijca2017914782 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A K. O. Peasah %A Ebenezer Quayson %A Osei Agyei %A Ed. Danso Ansong %T Survey of Digital Forensic Models and Proposed Thematic Scheme%T %J International Journal of Computer Applications %V 169 %N 11 %P 41-45 %R 10.5120/ijca2017914782 %I Foundation of Computer Science (FCS), NY, USA
The internet and advanced technologies has been used as tools by criminals these days to perpetrate all forms of crime and the digital world is exploited to facilitate crimes which are mostly technology driven. The evidence of such crimes which are technologically driven are in digital form hence the need to employ techniques, procedures, and methodologies that are technology inclined to reconstruct events and uncover evidence that are admissible in court. Digital forensics therefore provides the investigative techniques, scientifically derived and proven methods for preserving, collecting, validating, identifying, analyzing, interpreting and presenting admissible digital evidence derived from digital source(s). Methods use to undertake forensic investigation is paramount since inappropriate model choice may result in incomplete or missing evidence. In this paper, we look at some commonly used models, their strength and weakness to inform investigators where to appropriately use those forensic investigation model(s) as well as a proposed scheme to aid the selection of the appropriate investigative model.