Mapping Digital Forensics and Crime: A Scholarly Overview
Pemetaan Digital Forensik dan Kejahatan: Gambaran Akademis
Abstract
This data article offers a comprehensive scholarly overview of the digital forensics and crime research landscape from 2002 to 2012, as captured from Lens.org. Employing the search terms "Digital Forensic" and "Crime," we identified a corpus of 2,078 documents. The research's primary objectives were to provide insights into the abundance of research articles in this intersection and to facilitate future explorations in digital forensics and crime. Data filtering encompassed document type, date range, and subject matter (Law), yielding a final dataset of 41 journal articles. The results revealed trends in institutional contributions, active authors, leading fields of study, prominent publications, and the most prolific publishers. This dataset will empower researchers, students, and practitioners embarking on digital forensic investigations and studies of cybercrimes.
Highlight:
- Comprehensive Dataset: A robust dataset comprising 2,078 scholarly publications related to digital forensics and crime was assembled from 2002 to 2012.
- Research Insights: The data analysis sheds light on active institutions, prolific authors, dominant research fields, significant publications, and prominent publishers in this domain.
- Valuable Resource: This dataset serves as a valuable resource for researchers, students, and practitioners interested in exploring the intersection of digital forensics and crime, providing insights into research trends and key contributors.
Keywords: Digital Forensic, Crime, Scholarly Publications, Data Analysis, Research Trends.
Downloads
References
B. Fei, J. H. P. Eloff, M. S. Olivier, and H. S. Venter, "The use of self-organising maps for anomalous behaviour detection in a digital investigation," Forensic Science International, vol. 162, pp. 33-37, Jul. 2006.
H. Jahankhani, "Evaluation of cyber legislations: trading in the global cyber village," Int. J. Electron. Secur. Digital Forensics, vol. 1, pp. 1-11, 2007.
O. Olga Angelopoulou, P. Thomas, K. Xynos, and T. Tryfonas, "Online ID theft techniques, investigation and response," Int. J. Electron. Secur. Digital Forensics, vol. 1, pp. 76-88, 2007.
M. Losavio, D. G. Wilson, and A. Elmaghraby, "Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices," J. Digital Forensic Practice, vol. 1, pp. 291-296, Jun. 2007.
L. Batten and L. Pan, "Teaching Digital Forensics to Undergraduate Students," Security & Privacy Mag, vol. 6, pp. 54-56, May 2008.
H. Jahankhani, "Criminal investigation and forensic tools for smartphones," Int. J. Electron. Secur. Digital Forensics, vol. 2, pp. 387-406, 2009.
D. Kahvedić and T. Kechadi, "DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge," Digital Investigation, vol. 6, pp. 23-33, Sep. 2009.
M. Burdon, J. Reid, and R. Low, "Encryption safe harbours and data breach notification laws," Computer Law & Security Rev, vol. 26, pp. 520-534, Sep. 2010.
J. Oh, S. Lee, and S. Lee, "Advanced evidence collection and analysis of web browser activity," Digital Investigation, vol. 8, pp. 62-70, Aug. 2011.
S. Karayianni, V. Katos, and C. K. Georgiadis, "A framework for password harvesting from volatile memory," Int. J. Electron. Secur. Digital Forensics, vol. 4, pp. 154-163, 2012.
Copyright (c) 2023 Citra Surya Dewi -, Rifqi Ridlo Phahlevy
This work is licensed under a Creative Commons Attribution 4.0 International License.