INTRODUCTION
Quality is the most important trait that I struggle to achieve when engaging in academic research. Quality research is achieved through: identifying academically and practically relevant research questions; thorough theoretical development; methodological rigor; and good writing. When successful in these areas, publication in high quality journals results. This benefits the author, their academic institution, and the journal.
BODY
Managing and publishing high quality research is a time-consuming endeavor. As a result, synergistic relationships between researchers, with granting agencies, and amid research projects/interests is sigbificant. Synergistic relationships between researchers are those that stimulate broader and
…show more content…
To produce quality research, depth of knowledge in the field is needed. This takes time, though, and it is advisable to ensure one’s research interests are intellectually complementary. For example, my primary research interest areas include digital forensics and information security. Digital forensics complements information security nicely, as the former involves the preservation, collection, and analysis of digital data, often pertaining to breaches in security. Information security involves the technical and managerial safeguards needed to protect information and digital data from compromise. Both are fast growing fields with a great deal of interest within the academic community, granting agencies, and organizations. Both also often involve large data sets, wherein text mining and data mining can prove very useful. As a result, data mining is my third area of research interest. Not only are data mining and text mining fast growing fields of research, they are both highly extensible to solving research questions in digital forensics and information security. Largely because of these intellectual synergies, digital forensics, information security, data mining, and text mining are my primary research interest areas. Finally, research must be intriguing and enjoyable to the researcher. One must have a thirst for learning and intellectual stimulation. One must have a passion for the research questions being explored and a tenacity in answering them. One must be open minded to new solutions and ways of thinking, yet persistent in communicating their perspectives and conclusions. One must love to research, and if it is going to mean anything to anyone, one must love to write. This describes me as a researcher and my philosophy toward conducting academic
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
Technologies are advancing in today's world where more information is being generated, stored and distributed through digital gadgets. This requires investigators and forensic expert to increase the use of digital evidence gathering as a tool to fight against cyber-crime (International competition network, n.d.).
Solomon, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics Jumpstart (2nd ed.). Indianapolis, IN: Wiley Publishing Inc..
Please describe, in detail, any scientific research projects or other relevant scholarly work in which you have been involved. Include the names and affiliations of your research mentor and others with whom you have worked. List any publications, abstracts, or presentations that resulted from your work.
Scholar-practitioners in their professional activities and the knowledge they develop results which are based on concerted and relational learning through active exchange within society and reality testing. The interaction of research, practice, and education creates the concept of scholar-practitioner. Their aim is to sustain, enhance, and produce new knowledge relevant to the transfer between and integration among research, practice, and education. They mediate between
How to secure the chain of custody in a digital forensics investigation. Impartiality of an investigation is becoming a new standard in digital forensics, one that service providers are well-suited to deliver. Outsourcing almost guarantees that any investigation is impartial. It also saves organizations money since they don't have to keep a digital forensic investigator on the payroll. Service providers who offer digital forensic services can ease customer's minds by remaining impartial and taking the necessary steps to ensure that collected evidence is not tampered with and can be relied upon when called upon.
Digital Forensics: Potential for Miscarriages of Justice Madhavi Chandra Saladi 706630 ISYS90051 msaladi@student.unimelb.edu.au Introduction Forensic Science plays a key role in the collection, preservation and examination of evidences for an investigation and digitisation has substantially transformed traditional forensic procedures including the way evidences are collected, stored and produced in the court of Law. Paper records have almost been replaced with electronic records from various digital devices like computers, mobile phones and network drives. Digital evidences are being accepted in courts as proofs during trials and several digital forensic tools are employed for use by forensic practitioners on a day to day basis within military,
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
The field of digital forensics has become more important as both computer and cellular markets continue
Darawsheh and Stanley (2014) stated that in order to enhance the quality of services and promote evidence-based practice, good-quality research is a necessity. Good-quality research was reported to meet criteria of rigour to increase confidence, congruency, credibility, and add value. Nobel and Smith (2015) added to the conversation of rigour stating that qualitative research is criticized for a lack of scientific rigour due to poor justification of methodology, lack of transparency, and researcher bias. Nobel and Smith (2015) reported that this is primarily due to the inability to use the same measurement tools to measure reliability and validity as are used with quantitative studies. Determining truth value, consistency, and applicability
At the same time, the scholar-practitioner must participate at the level of
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
When choosing sources for a research topic, the most important factor of a quality source is depth and reliability. That is the key to a strong, well-written, argument. Many times, one can find themselves fishing through an array of sources, not knowing which ones to use. A student may find a passage in a book or article that perfectly fits the idea of their research, and they think they have struck gold.
Being a researcher takes so much time and patience with and requires great attention to detail. When researching for a script or documentary, it is the small details that have the biggest impact. Small details can have drastic effects on a character and how they are performed and received by an audience. In order to be a researcher, you have to be passionate about it, it’s tedious and usually thankless work, but the end result is dramatically affected by the work of the researcher.
In most crimes committed today criminals’ leave behind digital evidence that can be recovered by digital forensic experts and digital forensic tools.