A Digital Forensic Investigation and Verification Model for Industrial Espionage

Jieun Dokko, Michael Shin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper describes a digital forensic investigation and verification model for industrial espionage (DEIV-IE) focusing on insider data thefts at the company level. This model aims to advance the state-of practice in forensic investigation and to verify evidence sufficiency of industrial espionage cases by incorporating the crime specific features and analysis techniques of digital evidence. The model is structured with six phases: file reduction, file classification, crime feature identification, evidence mapping, evidence sufficiency verification, and documentations. In particular, we focus on characterizing crime features that have multiple aspects of commonalities in crime patterns in industrial espionage; and the evidence sufficiency verification that is a verification procedure for digital evidence sufficiency for court decision using these crime features. This model has been developed based on analysis of five industrial espionage cases and the literature review, being validated with three additional cases in terms of the effectiveness of the model.

Original languageEnglish
Title of host publicationDigital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, Proceedings
EditorsFrank Breitinger, Ibrahim Baggili
PublisherSpringer-Verlag
Pages128-146
Number of pages19
ISBN (Print)9783030054861
DOIs
StatePublished - 2019
Event10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018 - New Orleans, United States
Duration: Sep 10 2018Sep 12 2018

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume259
ISSN (Print)1867-8211

Conference

Conference10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018
CountryUnited States
CityNew Orleans
Period09/10/1809/12/18

Keywords

  • Behavioral evidence analysis
  • Digital evidence verification
  • Digital forensic investigation
  • Digital forensics triage
  • Evidence prioritization
  • Industrial espionage

Fingerprint Dive into the research topics of 'A Digital Forensic Investigation and Verification Model for Industrial Espionage'. Together they form a unique fingerprint.

Cite this