바로가기메뉴

본문 바로가기 주메뉴 바로가기

logo

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

The Journal of Industrial Distribution & Business / The Journal of Industrial Distribution & Business, (E)2233-5382
2021, v.12 no.6, pp.47-55
https://doi.org/https://doi.org/10.13106/jidb.2021.vol12.no6.47
CHOI, Do-Hee
  • Downloaded
  • Viewed

Abstract

Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

keywords
Digital Forensic, Corporate Crime, Theoretical Literature Analysis

Reference

1.

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

2.

Al-Saleh, M. I., & Al-Shamaileh, M. J. (2017). Forensic artefacts associated with intentionally deleted user accounts. International Journal of Electronic Security and Digital Forensics, 9(2), 167-179.

3.

Arewa, A. (2018). Borderless crimes and digital forensic: Nigerian perspectives. Journal of Financial Crime, 25(1), 619-631.

4.

Å rnes, A. (2017). Digital forensics. John Wiley & Sons.

5.

Caviglione, L. (2021). Trends and Challenges in Network Covert Channels Countermeasures. Applied Sciences, 11(4), 1641.

6.

Chin, J. M., Ribeiro, G., & Rairden, A. (2019). Open forensic science. Journal of Law and the Biosciences, 6(1), 255-288.

7.

Choi, J., Yu, J., Hyun, S., & Kim, H. (2019). Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger. Digital Investigation, 28(April), S50-S59.

8.

Dhote, C. A. (2016). Homomorphic encryption for security of cloud data. Procedia Computer Science, 79, 175-181.

9.

Drèze, J., & Khera, R. (2017). Recent social security initiatives in India. World Development, 98(October), 555-572.

10.

Elsadig, M. A., & Fadlalla, Y. A. (2016). Survey on covert storage channel in computer network protocols: detection and mitigation techniques. International Journal of Advances in Computer Networks and Its Security, 6(3), 11-17.

11.

Fürsich, E. (2009). In defense of textual analysis: Restoring a challenged method for journalism and media studies. Journalism studies, 10(2), 238-252.

12.

Gaggioli, G. (2018). International Humanitarian Law: The legal framework for humanitarian forensic action. Forensic science international, 282(January), 184-194.

13.

Harshany, E., Benton, R., Bourrie, D., & Glisson, W. (2020). Big Data Forensics: Hadoop 3.2. 0 Reconstruction. Forensic Science International: Digital Investigation, 32(April), 300909.

14.

Han, S. (2020). Theoretical Interdisciplinarity between Psychological Marketing Practice and Woman's Narcissism in Distribution Channels. Journal of Distribution Science, 18(12), 101-109.

15.

Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277-1288.

16.

Kang, E. (2020). The Relationship between Reinforcement of Employee’s Customer-Centric Behavior and Employee Motivation Factors. Advances in Social Sciences Research Journal, 7(7), 338-347.

17.

Karie, N. M., & Karume, S. M. (2017). Digital forensic readiness in organizations: Issues and challenges. The Journal of Digital Forensics, Security and Law: JDFSL, 12(4), 43-53.

18.

Karabiyik, U., Mousas, C., Sirota, D., Iwai, T., & Akdere, M. (2019). A virtual reality framework for training incident first responders and digital forensic investigators. In International Symposium on Visual Computing (pp. 469-480), New York, USA: Springer.

19.

Kebande, V. R., & Venter, H. S. (2018). Novel digital forensic readiness technique in the cloud environment. Australian Journal of Forensic Sciences, 50(5), 552-591.

20.

Kumar, A., Kansal, A., & Singh, K. (2019). An improved antiforensic technique for JPEG compression. Multimedia Tools and Applications, 78(18), 25427-25453.

21.

Li, J. X. (2017). Cyber crime and legal countermeasures: A historical analysis. International Journal of Criminal Justice Sciences, 12(2), 196-207.

22.

Madah Marzuki, M., Nik Abdul Majid, W. Z., Azis, N. K., Rosman, R., & Haji Abdulatiff, N. K. (2020). Fraud Risk Management Model: A Content Analysis Approach. The Journal of Asian Finance, Economics, and Business, 7(10), 717-728.

23.

Matallah, H., Belalem, G., & Bouamrane, K. (2017). Towards a new model of storage and access to data in big data and cloud computing. International Journal of Ambient Computing and Intelligence, 8(4), 31-44.

24.

Miranda Lopez, E., Moon, S. Y., & Park, J. H. (2016). Scenariobased digital forensics challenges in cloud computing. Symmetry, 8(10), 107.

25.

Mir, S. S., Shoaib, U., & Sarfraz, M. S. (2016). Analysis of digital forensic investigation models. International Journal of Computer Science and Information Security, 14(11), 292-301.

26.

Nantharath, P., Laochankham, S., Kamnuasilpa, P., & Kang, E. (2020). Fiscal Decentralization and Economic Growth in Thailand: A Cross-Region Analysis. International Journal of Financial Research, 11(1), 147-156.

27.

Ojha, V., & Singh, R. (2019). Pretty Good Privacy: An e-mail Security Protocol. International Journal on Future Revolution in Computer Science & Communication Engineering, 5(5), 80-83.

28.

Omolaye-Ajileye, A. (2016). Admissibility of Electronic Evidence in Civil and Criminal Proceedings. In 2016 Refresher Course for Judicial Officers on Current Trends in Law and Administration of Justice (pp. 1–32). Abuja, Nigeria: National Judicial Insitute (NJI).

29.

Park, K. J., Park, J. M., Kim, E. J., Cheon, C. G., & James, J. I. (2017). Anti-forensic trace detection in digital forensic triage investigations. Journal of Digital Forensics, Security and Law, 12(1), 31-40.

30.

Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction:digital forensic images and electronic evidence. Cluster Computing, 19(2), 723-740.

31.

Richard, J., & Kang, E. (2018). Culture, Competencies and Compensation: A Framework for Pay for Performance Incentives. American Journal of Management, 18(4), 33-48.

32.

Roux, C., Ribaux, O., & Crispino, F. (2018). Forensic science 2020–the end of the crossroads? Australian Journal of Forensic Sciences, 50(6), 607-618.

33.

Schell‐Busey, N., Simpson, S. S., Rorie, M., & Alper, M. (2016). What works? A systematic review of corporate crime deterrence. Criminology & Public Policy, 15(2), 387-416.

34.

Sung, I. (2021). Interdisciplinary Literature Analysis between Cosmetic Container Design and Customer Purchasing Intention. The Journal of Industrial Distribution & Business, 12(3), 21-29.

35.

Towler, A., White, D., Ballantyne, K., Searston, R. A., Martire, K. A., & Kemp, R. I. (2018). Are forensic scientists’ experts? Journal of Applied Research in Memory and Cognition, 7(2), 199-208.

36.

Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, 79(Part 3) 849-861.

37.

Vincze, E. A. (2016). Challenges in digital forensics. Police Practice and Research, 17(2), 183-194.

38.

Wani, M. A., AlZahrani, A., & Bhat, W. A. (2020). File system anti-forensics–types, techniques and tools. Computer Fraud &Security, 2020(3), 14-19.

39.

Wani, M. A. (2021). Privacy Preserving Anti-Forensic Techniques. In Multimedia Security (pp. 89-108), Singapore: Springer.

40.

Warren, C., El-Sheikh, E., & Le-Khac, N. A. (2018). Privacy preserving Internet browsers: Forensic analysis of Browzar. In Computer and network security essentials (pp. 369-388). New York, USA: Springer.

41.

Woo, E. J. (2021). The Relationship between Green Marketing and Firm Reputation: Evidence from Content Analysis. The Journal of Asian Finance, Economics and Business, 8(4), 455-463.

42.

Woo, E. J., & Kang, E. (2020). Environmental Issues As an Indispensable Aspect of Sustainable Leadership. Sustainability, 12(17), 7014.

43.

Yan, H., Li, X., Wang, Y., & Jia, C. (2018). Centralized duplicate removal video storage system with privacy preservation in iot. Sensors, 18(6), 1814.

44.

Yan, Z., Wang, M., Li, Y., & Vasilakos, A. V. (2016). Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing, 3(2), 28-35.

45.

Yu, Y., Xue, L., Au, M. H., Susilo, W., Ni, J., Zhang, Y., & Shen, J. (2016). Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Generation Computer Systems, 62(September), 85-91.

46.

Zhang, X., & Choo, K. K. R. (2019). Digital Forensic Education:An Experiential Learning Approach (Vol. 61), New York, USA:Springer.

47.

Zubańska, M. (2018). Old Forensic Evidence, Contemporary Resources of Forensic Science and the Police X-Files—Crime Is Not an Abstract and Theoretical Entity Out of Touch with Reality. Internal Security, 10(1), 107-124.

The Journal of Industrial Distribution & Business