Abstract
Crime is a major social and legal problem in the world we live in. Crime changes with time and circumstances. Criminals use new technologies to facilitate and maximize criminal activities. With increased use of Computers and Internet, there has been an explosion of new crime called the Cybercrime which is also known as ‘Internet crimes’ or ‘e-crime’. Cybercrime is the most complicated problem and it has become the major concern for the global community. It is hard to detect. The nature of cybercrime shows that investigations are often technically complex, requiring access to specialist skill. For detection of cybercrime many investigation techniques and methods are there in the system. Also many investigation models have been proposed. Till date the investigation models proposed by various researchers have some or the other shortfalls. An improvised cybercrime investigation model with detail phases has been proposed in this paper.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Poonia, A.S.: Managing digital evidences for cyber crime investigation. Int. J. Adv. Stud. Comput. Sci. Eng. (IJASCSE) 3(11), 22–26 (2014). ISSN: 2278 7917
Poonia, A.S.: Investigation and Prevention of Cyber Crime in Indian Perspective, Ph.D Thesis, MNIT, Jaipur (2013)
Casey, E.: Error, uncertainty, and loss in digital evidence. Int. J. Digital Evid. 1(2), 1–45 (2002)
Lee, H.C., Palmbach, T., Miller, M.T.: Henry Lee’s Crime Scene. Academic Press (2001)
Palmer, G. (ed.): A Road Map for Digital Forensic Research: Report from the First Digital Forensic Workshop, 7–8 Aug 2001. DFRWS Technical Report DTR-T001-01, 6 Nov 2001
Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. Int. J. Digital Evid. 1(3) (2002)
Ciardhuáin, S.O.: An extended model of cybercrime investigation. Int. J. Digital Evid. 3(1) (2004)
Carrier, B., Spafford, E.H.: Getting Physical with the investigative process. Int. J. Digital Evid. 2(2) (2004)
Ceresini, T.: Maintaining the forensic viability of log files. http://www.giac.org/practical/gsec/Tom_Ceresini_GSEC.pdf (2001)
Pollitt, M.: An ad-hoc review of digital forensics models. In: Higgins, G. (ed.) Cybercrime: An Introduction to an Emerging Phenomenon. McGraw Hill
Selamat, S.: Mapping process of digital forensic investigation framework. Int. J. Comput. Sci. Netw. Secur. 8(10) (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Poonia, A.S., Banerjee, C., Arpita Banerjee (2016). Improvised Cyber Crime Investigation Model. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 437. Springer, Singapore. https://doi.org/10.1007/978-981-10-0451-3_66
Download citation
DOI: https://doi.org/10.1007/978-981-10-0451-3_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0450-6
Online ISBN: 978-981-10-0451-3
eBook Packages: EngineeringEngineering (R0)