INTRODUCTION
Quality is the most important trait that I struggle to achieve when engaging in academic research. Quality research is achieved through: identifying academically and practically relevant research questions; thorough theoretical development; methodological rigor; and good writing. When successful in these areas, publication in high quality journals results. This benefits the author, their academic institution, and the journal.
BODY
Managing and publishing high quality research is a time-consuming endeavor. As a result, synergistic relationships between researchers, with granting agencies, and amid research projects/interests is sigbificant. Synergistic relationships between researchers are those that stimulate broader and
…show more content…
To produce quality research, depth of knowledge in the field is needed. This takes time, though, and it is advisable to ensure one’s research interests are intellectually complementary. For example, my primary research interest areas include digital forensics and information security. Digital forensics complements information security nicely, as the former involves the preservation, collection, and analysis of digital data, often pertaining to breaches in security. Information security involves the technical and managerial safeguards needed to protect information and digital data from compromise. Both are fast growing fields with a great deal of interest within the academic community, granting agencies, and organizations. Both also often involve large data sets, wherein text mining and data mining can prove very useful. As a result, data mining is my third area of research interest. Not only are data mining and text mining fast growing fields of research, they are both highly extensible to solving research questions in digital forensics and information security. Largely because of these intellectual synergies, digital forensics, information security, data mining, and text mining are my primary research interest areas. Finally, research must be intriguing and enjoyable to the researcher. One must have a thirst for learning and intellectual stimulation. One must have a passion for the research questions being explored and a tenacity in answering them. One must be open minded to new solutions and ways of thinking, yet persistent in communicating their perspectives and conclusions. One must love to research, and if it is going to mean anything to anyone, one must love to write. This describes me as a researcher and my philosophy toward conducting academic
Technologies are advancing in today's world where more information is being generated, stored and distributed through digital gadgets. This requires investigators and forensic expert to increase the use of digital evidence gathering as a tool to fight against cyber-crime (International competition network, n.d.).
Solomon, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics Jumpstart (2nd ed.). Indianapolis, IN: Wiley Publishing Inc..
In the reality, everyone is in contact with research either conducting a research or consuming a research. However, only scholar-practitioner meet the criteria of developing certain research problematical awkward such as “How do you know you doing good?” when the scholar practitioners bring the skepticism attitude to the arena, they assert the evidence not only claims. The mind set of scholar-practitioner, is the inquiry to distinguish the bad from the wrong. Additionally, research about the study of the world as a result failure is excluded from the concept of research to prove that your methods are wrong means that you proved something and this knowledge, moreover this the task of
How to secure the chain of custody in a digital forensics investigation. Impartiality of an investigation is becoming a new standard in digital forensics, one that service providers are well-suited to deliver. Outsourcing almost guarantees that any investigation is impartial. It also saves organizations money since they don't have to keep a digital forensic investigator on the payroll. Service providers who offer digital forensic services can ease customer's minds by remaining impartial and taking the necessary steps to ensure that collected evidence is not tampered with and can be relied upon when called upon.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
In most crimes committed today criminals’ leave behind digital evidence that can be recovered by digital forensic experts and digital forensic tools.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
This chapter aims to place the field of digital forensics as a science within the broader spectrum of disciplines. A few definitions of digital forensics are given. These definitions are critically discussed in addition to comments found in the literature. The main elements are identified from which digital forensics is defined for the purposes of this dissertation. Digital forensic investigation as used in this dissertation is discussed by investigating definitions found in the literature.
Digital Forensics: Potential for Miscarriages of Justice Madhavi Chandra Saladi 706630 ISYS90051 msaladi@student.unimelb.edu.au Introduction Forensic Science plays a key role in the collection, preservation and examination of evidences for an investigation and digitisation has substantially transformed traditional forensic procedures including the way evidences are collected, stored and produced in the court of Law. Paper records have almost been replaced with electronic records from various digital devices like computers, mobile phones and network drives. Digital evidences are being accepted in courts as proofs during trials and several digital forensic tools are employed for use by forensic practitioners on a day to day basis within military,
Darawsheh and Stanley (2014) stated that in order to enhance the quality of services and promote evidence-based practice, good-quality research is a necessity. Good-quality research was reported to meet criteria of rigour to increase confidence, congruency, credibility, and add value. Nobel and Smith (2015) added to the conversation of rigour stating that qualitative research is criticized for a lack of scientific rigour due to poor justification of methodology, lack of transparency, and researcher bias. Nobel and Smith (2015) reported that this is primarily due to the inability to use the same measurement tools to measure reliability and validity as are used with quantitative studies. Determining truth value, consistency, and applicability
Digital evidence Digital data stored in computers or digital systems or transmitted by them can be Use in proving or denying a crime may be digital or non-digital. The main aim of digital criminal analysis is to address digital crimes, which are committed using computer hardware or those located on digital systems or networks. Digital criminal analysis is the use of technology techniques in the criminal investigation of illegal cases, including the examination of the device or the target system, analysis of operations and retrieval of data and files in order to obtain a digital evidence used in legal
In a day and age where technology is the best known way to spread information that would otherwise be kept on the down low, a computer becomes a quiet man's public mind. When police go to search a suspect’s home to find what might have caused them to take a gun into an elementary school and kill innocent children and people, the seizure of a computer can become the biggest insight to investigators as to what leads to such an event. Computer forensics is defined as “the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT, “Forensics”). Computer forensics is a
At the same time, the scholar-practitioner must participate at the level of
When choosing sources for a research topic, the most important factor of a quality source is depth and reliability. That is the key to a strong, well-written, argument. Many times, one can find themselves fishing through an array of sources, not knowing which ones to use. A student may find a passage in a book or article that perfectly fits the idea of their research, and they think they have struck gold.
Being a researcher takes so much time and patience with and requires great attention to detail. When researching for a script or documentary, it is the small details that have the biggest impact. Small details can have drastic effects on a character and how they are performed and received by an audience. In order to be a researcher, you have to be passionate about it, it’s tedious and usually thankless work, but the end result is dramatically affected by the work of the researcher.