Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.

Saved in:
Bibliographic Details
Title: Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.
Authors: Drobotov, Serhii, Pertsev, Roman, Hrab, Mariia, Fedytnyk, Vasyl, Moroz, Svitlana, Kikalishvili, Mariia
Source: Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p
Subject Terms: INTERNET security, COMPUTER engineering, COMPUTER systems, COMPUTER crimes, DATABASES, DIGITAL forensics, INFORMATION networks, ELECTRONIC evidence, INFORMATION storage & retrieval systems
Abstract (English): The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime. [ABSTRACT FROM AUTHOR]
Abstract (Arabic): المقالة تستعرض الأبحاث الجنائية المتعلقة بالأدوات والأنظمة الحاسوبية المستخدمة في مكافحة الجرائم الإلكترونية، مشددة على التعقيد المتزايد وحجم الهجمات الإلكترونية. كما تؤكد على أهمية الطب الشرعي الرقمي في الحفاظ على نزاهة الأدلة الرقمية لأغراض قانونية، وتصنف أنواعًا مختلفة من الطب الشرعي، مثل الطب الشرعي لقواعد البيانات، والطب الشرعي الإلكتروني، والطب الشرعي للهواتف المحمولة. تتناول المقالة أيضًا غياب الأطر التنظيمية للأمن السيبراني وتدعو إلى تعزيز التعاون الدولي والتدابير التشريعية لمكافحة الجرائم الإلكترونية بشكل فعال. بشكل عام، تدعو إلى توسيع استخدام الأساليب الجنائية لمواجهة الارتفاع المتزايد في معدلات الجرائم الإلكترونية وتحسين الدعم لجهود إنفاذ القانون ومبادرات الأمن السيبراني. [Extracted from the article]
Copyright of Journal of Information Technology Management (JITM) is the property of University of Tehran, Faculty of Management and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Drobotov%20S
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 173422253
RelevancyScore: 944
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 943.755004882813
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Drobotov%2C+Serhii%22">Drobotov, Serhii</searchLink><br /><searchLink fieldCode="AR" term="%22Pertsev%2C+Roman%22">Pertsev, Roman</searchLink><br /><searchLink fieldCode="AR" term="%22Hrab%2C+Mariia%22">Hrab, Mariia</searchLink><br /><searchLink fieldCode="AR" term="%22Fedytnyk%2C+Vasyl%22">Fedytnyk, Vasyl</searchLink><br /><searchLink fieldCode="AR" term="%22Moroz%2C+Svitlana%22">Moroz, Svitlana</searchLink><br /><searchLink fieldCode="AR" term="%22Kikalishvili%2C+Mariia%22">Kikalishvili, Mariia</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22INTERNET+security%22">INTERNET security</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+engineering%22">COMPUTER engineering</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+systems%22">COMPUTER systems</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+crimes%22">COMPUTER crimes</searchLink><br /><searchLink fieldCode="DE" term="%22DATABASES%22">DATABASES</searchLink><br /><searchLink fieldCode="DE" term="%22DIGITAL+forensics%22">DIGITAL forensics</searchLink><br /><searchLink fieldCode="DE" term="%22INFORMATION+networks%22">INFORMATION networks</searchLink><br /><searchLink fieldCode="DE" term="%22ELECTRONIC+evidence%22">ELECTRONIC evidence</searchLink><br /><searchLink fieldCode="DE" term="%22INFORMATION+storage+%26+retrieval+systems%22">INFORMATION storage & retrieval systems</searchLink>
– Name: AbstractNonEng
  Label: Abstract (English)
  Group: Ab
  Data: The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime. [ABSTRACT FROM AUTHOR]
– Name: AbstractNonEng
  Label: Abstract (Arabic)
  Group: Ab
  Data: المقالة تستعرض الأبحاث الجنائية المتعلقة بالأدوات والأنظمة الحاسوبية المستخدمة في مكافحة الجرائم الإلكترونية، مشددة على التعقيد المتزايد وحجم الهجمات الإلكترونية. كما تؤكد على أهمية الطب الشرعي الرقمي في الحفاظ على نزاهة الأدلة الرقمية لأغراض قانونية، وتصنف أنواعًا مختلفة من الطب الشرعي، مثل الطب الشرعي لقواعد البيانات، والطب الشرعي الإلكتروني، والطب الشرعي للهواتف المحمولة. تتناول المقالة أيضًا غياب الأطر التنظيمية للأمن السيبراني وتدعو إلى تعزيز التعاون الدولي والتدابير التشريعية لمكافحة الجرائم الإلكترونية بشكل فعال. بشكل عام، تدعو إلى توسيع استخدام الأساليب الجنائية لمواجهة الارتفاع المتزايد في معدلات الجرائم الإلكترونية وتحسين الدعم لجهود إنفاذ القانون ومبادرات الأمن السيبراني. [Extracted from the article]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of Journal of Information Technology Management (JITM) is the property of University of Tehran, Faculty of Management and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=173422253
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.22059/jitm.2023.90741
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 28
        StartPage: 135
    Subjects:
      – SubjectFull: INTERNET security
        Type: general
      – SubjectFull: COMPUTER engineering
        Type: general
      – SubjectFull: COMPUTER systems
        Type: general
      – SubjectFull: COMPUTER crimes
        Type: general
      – SubjectFull: DATABASES
        Type: general
      – SubjectFull: DIGITAL forensics
        Type: general
      – SubjectFull: INFORMATION networks
        Type: general
      – SubjectFull: ELECTRONIC evidence
        Type: general
      – SubjectFull: INFORMATION storage & retrieval systems
        Type: general
    Titles:
      – TitleFull: Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Drobotov, Serhii
      – PersonEntity:
          Name:
            NameFull: Pertsev, Roman
      – PersonEntity:
          Name:
            NameFull: Hrab, Mariia
      – PersonEntity:
          Name:
            NameFull: Fedytnyk, Vasyl
      – PersonEntity:
          Name:
            NameFull: Moroz, Svitlana
      – PersonEntity:
          Name:
            NameFull: Kikalishvili, Mariia
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Text: 2023
              Type: published
              Y: 2023
          Identifiers:
            – Type: issn-print
              Value: 20085893
          Numbering:
            – Type: volume
              Value: 15
            – Type: issue
              Value: 1
          Titles:
            – TitleFull: Journal of Information Technology Management (JITM)
              Type: main
ResultId 1