Vol 12 No 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies
Data Articles in Law Science

Mapping Digital Forensics and Crime: A Scholarly Overview
Pemetaan Digital Forensik dan Kejahatan: Gambaran Akademis


Citra Surya Dewi
Universitas Muhammadiyah Sidoarjo, Indonesia
Rifqi Ridlo Phahlevy
Universitas Muhammadiyah Sidoarjo, Indonesia
Irta Fiddina
Universitas Muhammadiyah Sidoarjo, Indonesia
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published October 16, 2023
Keywords
  • Digital Forensic,
  • Crime,
  • Scholarly Publications,
  • Data Analysis,
  • Research Trends
How to Cite
Dewi, C. S., Phahlevy, R. R., & Fiddina, I. (2023). Mapping Digital Forensics and Crime: A Scholarly Overview. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i1.1496

Abstract

This data article offers a comprehensive scholarly overview of the digital forensics and crime research landscape from 2002 to 2012, as captured from Lens.org. Employing the search terms "Digital Forensic" and "Crime," we identified a corpus of 2,078 documents. The research's primary objectives were to provide insights into the abundance of research articles in this intersection and to facilitate future explorations in digital forensics and crime. Data filtering encompassed document type, date range, and subject matter (Law), yielding a final dataset of 41 journal articles. The results revealed trends in institutional contributions, active authors, leading fields of study, prominent publications, and the most prolific publishers. This dataset will empower researchers, students, and practitioners embarking on digital forensic investigations and studies of cybercrimes.

Highlight:

  • Comprehensive Dataset: A robust dataset comprising 2,078 scholarly publications related to digital forensics and crime was assembled from 2002 to 2012.
  • Research Insights: The data analysis sheds light on active institutions, prolific authors, dominant research fields, significant publications, and prominent publishers in this domain.
  • Valuable Resource: This dataset serves as a valuable resource for researchers, students, and practitioners interested in exploring the intersection of digital forensics and crime, providing insights into research trends and key contributors.

Keywords: Digital Forensic, Crime, Scholarly Publications, Data Analysis, Research Trends.

Downloads

Download data is not yet available.

References

  1. B. Fei, J. H. P. Eloff, M. S. Olivier, and H. S. Venter, "The use of self-organising maps for anomalous behaviour detection in a digital investigation," Forensic Science International, vol. 162, pp. 33-37, Jul. 2006.
  2. H. Jahankhani, "Evaluation of cyber legislations: trading in the global cyber village," Int. J. Electron. Secur. Digital Forensics, vol. 1, pp. 1-11, 2007.
  3. O. Olga Angelopoulou, P. Thomas, K. Xynos, and T. Tryfonas, "Online ID theft techniques, investigation and response," Int. J. Electron. Secur. Digital Forensics, vol. 1, pp. 76-88, 2007.
  4. M. Losavio, D. G. Wilson, and A. Elmaghraby, "Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices," J. Digital Forensic Practice, vol. 1, pp. 291-296, Jun. 2007.
  5. L. Batten and L. Pan, "Teaching Digital Forensics to Undergraduate Students," Security & Privacy Mag, vol. 6, pp. 54-56, May 2008.
  6. H. Jahankhani, "Criminal investigation and forensic tools for smartphones," Int. J. Electron. Secur. Digital Forensics, vol. 2, pp. 387-406, 2009.
  7. D. Kahvedić and T. Kechadi, "DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge," Digital Investigation, vol. 6, pp. 23-33, Sep. 2009.
  8. M. Burdon, J. Reid, and R. Low, "Encryption safe harbours and data breach notification laws," Computer Law & Security Rev, vol. 26, pp. 520-534, Sep. 2010.
  9. J. Oh, S. Lee, and S. Lee, "Advanced evidence collection and analysis of web browser activity," Digital Investigation, vol. 8, pp. 62-70, Aug. 2011.
  10. S. Karayianni, V. Katos, and C. K. Georgiadis, "A framework for password harvesting from volatile memory," Int. J. Electron. Secur. Digital Forensics, vol. 4, pp. 154-163, 2012.