We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Standard Model for Mobile Forensic Image Development.
- Authors
Sojung Oh; Eunjin Kim; Eunji Lee; Yeongseong Kim; Gibum Kim
- Abstract
As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pannational trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.
- Subjects
SOUTH Korea; TRUST; INSTITUTIONAL environment; NATIONAL security; LABOR supply; ELECTRONIC evidence; INFORMATION technology security; MOBILE learning
- Publication
KSII Transactions on Internet & Information Systems, 2023, Vol 17, Issue 2, p626
- ISSN
1976-7277
- Publication type
Article
- DOI
10.3837/tiis.2023.02.019