Show simple item record

dc.contributor.authorQuinn, K J Spikeen_NZ
dc.date.available2011-04-07T03:09:18Z
dc.date.copyright2004-12-20en_NZ
dc.identifier.citationQuinn, K. J. S. (2004, December 20). Examining the state of preparedness of New Zealand Information Technology management for events that may require forensic analysis (Dissertation, Postgraduate Diploma in Science). Retrieved from http://hdl.handle.net/10523/1151en
dc.identifier.urihttp://hdl.handle.net/10523/1151
dc.description.abstractComputer security is of concern to those in IT (Information Technology) and forensic readiness (being prepared to deal effectively with events that may require forensic investigation) is a growing issue. This study used a survey of IT Managers in New Zealand to examine the state of awareness of IT (Information Technology) management in New Zealand regarding the field of digital forensics in general and their state of preparation for protection of forensic data in the case of an event requiring forensic analysis. With 25% of organisations having no formal information security policy and only 15% requiring staff to keep up to date with its content, the 85% figure for respondents without forensic policy suggests that internal organisations’ policy and procedures are indeed inadequate to ensure admissibility of forensic evidence. Less than a third of respondents’ organisations have any forensic capability at all, with only 8% having any internal forensic capability. These results strongly suggest that IT management does not sufficiently comprehend the admissibility of forensic evidence issue. 14 respondents’ organisations had prepared forensic evidence for use in court. Almost half was prepared by untrained staff. IT management expect operational IT staff to protect forensic data for possible use in court but the majority do not supply forensic training, so the evidence cannot be guaranteed inadmissible in court.en_NZ
dc.format.mimetypeapplication/pdf
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titleExamining the state of preparedness of New Zealand Information Technology management for events that may require forensic analysisen_NZ
dc.typeDissertationen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages56en_NZ
otago.date.accession2010-12-15 19:40:06en_NZ
otago.schoolInformation Scienceen_NZ
thesis.degree.disciplineInformation Scienceen_NZ
thesis.degree.namePostgraduate Diploma in Science
thesis.degree.grantorUniversity of Otagoen_NZ
thesis.degree.levelPostgraduate Dissertationsen_NZ
otago.openaccessOpen
dc.identifier.eprints1019en_NZ
otago.school.eprintsSecurity Research Groupen_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesAdams D. and Lothridge K., (2000). Scientific Working Groups, Forensic Science Communications, July 2000, Vol 2, Number 3 [Electronic version]. Retrieved 10 December, 2004 from U.S. Department of Justice Federal Bureau of Investigations Website: http://www.fbi.gov/hq/lab/fsc/backissu/july2000/swgroups.htm Ahmad A., (2002). The forensic chain-of-evidence model: Improving the process of evidence collecting in event handling procedures, Proceedings of the 6th Pacific Asia Conference on Information Systems, Tokyo, Japan, 2-4 Sept 2002 [Electronic version]; Retrieved 10 December, 2004 from University of Melbourne Website: http://www.dis.unimelb.edu.au/staff/atif/AhmadPACIS.pdf Alcohol, Tobacco and Firearms National Press Office, (1999). The future of ballistics imaging is now. Retrieved 10 December, 2004, from U. S. Department of Justice Bureau of Alcohol, Tobacco, Firearms and Explosives Website: http://www.atf.gov/press/fy99press/pr121499_ballistics.htm AusCERT, (2004). Australian Computer Crime and Security Survey. Retrieved 10 December 2004, from AusCERT Website: http://www.auscert.org.au Barnett T., (2004). Don’t rely on backup tapes for preservation of electronic evidence. A sound document retention policy is a much cheaper and more efficient alternative, 2004. Retrieved 10 December, 2004, from Online Security Website: http://www.onlinesecurity.com/Community_Forum/Community_Forum_detail172.php Becker R. F., (1997). Scientific evidence and expert testimony handbook: A guide for lawyers, criminal investigators and forensic specialists. Springfield Illinois: Charles C Thomas. Bell S., (2004). Blood groups, Encyclopaedia of Forensic Science. New York: Facts on File Inc. Boyes N., (2004, 30 September). Ministry man cracks the computer to steal $2m. New Zealand Herald. Retrieved 10 December 2004, from New Zealand Herald Website: http://www.nzherald.co.nz/index.cfm?ObjectID=3596124 Carnegie Mellon Software Engineering Institute. (2003). Staffing your computer security incident response team – What basic skills are needed? Retrieved 10 December 2004, from Carnegie Mellon Software Engineering Institute Website: http://www.cert.org/csirts/csirt-staffing.html Daniels D. J., (2003). Welcoming remarks of the Honourable Deborah J. Daniels, Assistant Attorney General Office Of Justice Programs at the Summit on DNA evidence: Enhancing law enforcement’s impact from crime scene to courtroom and beyond on Monday, April 7, 2003 Washington, DC. Retrieved 10 December 2004, from U. S. Department of Justice Website: http://www.ojp.usdoj.gov/aag/speeches/dnasummit.htm Daubert v. Merrell Dow Pharmaceuticals, (1993). U.S. Supreme Court, 509 U.S. 579, No. 92-102. Dedrick J. L., Goodman S. E., and Kraemer K. L., Little Engines That Could: Computing in Small Energetic Countries, in The Information Age: An Anthology on Its Impact and Consequences, Eds David S. Alberts and Daniel S. Papp. Retrieved 10 December 2004, from U. S. National Defence University Website: http://www.ndu.edu/inss/books/Books%20-%201998/Information%20Age%20Anthology%20-%20Sept%2098/ch23.html Falconer D.J. and Hodgett A., (1999). Why executives don’t respond to your survey, ACIS Conference Victoria University of Wellington 1999. Retrieved 10 December 2004, from Victoria University of Wellington Website: http://www.vuw.ac.nz/acis99/Papers/PaperHodgett-060.pdf Fingerprint, New Encyclopaedia Britannica, 15th Ed., Vol. 4 p.781. Chicago. Forensic Science Service. (2004). Colin Pitchfork - first murder conviction on DNA evidence also clears the prime suspect. Retrieved 10 December 2004, from Forensic Science Service Website: http://www.forensic.gov.uk/forensic_t/inside/news/list_casefiles.php?case=1 Freesearch Online Dictionary. Retrieved 10 December 2004, from Freesearch.co.uk Website: http://www.freesearch.co.uk/ Frye v. United States, (1923). 54 App.D.C. 46, 293 F. 1013. Gordon L. A., Loeb M. P., Lucyshyn W., and Richardson R., (2004). 2004 CSI/FBI Computer Crime and Security Survey. Retrieved 10 December 2004, from Computer Security Institute Publications Website: http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf Hall A. H., (1998). Computer modelling and computational toxicology in new chemical and pharmaceutical product development., Toxicol Lett. 28;102-103:623-6. Hamby J. E. and Thorpe J. W., (1999). The History Of Firearm And Toolmark Identification Reproduced from Association of firearms and tool mark examiners journal 30 Anniversary Issue Vol. 31 (3) Summer 1999. Retrieved 10 December, 2004 from Firearms ID .com Website: http://www.firearmsid.com/A_historyoffirearmsID.htm IOCE, G8 Proposed Principles For The Procedures Relating To Digital Evidence. Retrieved 10 December 2004, from International Organisation on Computer Evidence Website: www.ioce.org/2002/G8%20Proposed%20principles%20for%20forensic%20evidence.pdf Jeffreys A., (2004). Discovering DNA Fingerprinting. Retrieved 10 December 2004, from The Wellcome Trust Website: http://www.wellcome.ac.uk/en/genome/genesandbody/hg07f005.html Koehler, J. J., Chia, A. and Lindsey, S., (1995). The Random Match Probability in DNA evidence: Irrelevant or Prejudicial, Jurimetrics Journal, Winter 1995, 201-219. Laykin E., (2003). What are the first steps in securing digital evidence? Retrieved 10 December 2004, from Online Security Website: http://www.onlinesecurity.com/Community_Forum/Community_Forum_detail91.php Leedy P.D. and Ormrod J.E., (2001). Practical research: planning and design, 7th Ed, Upper Saddle River, New Jersey, Prentice-Hall. Mathew Dickey v. Steris Corporation (2001). US District Court, Kansas, No. 99-2362-KHV. Quoted in Patzakis J., (2001). Encase Legal Journal. Retrieved 10 December 2004, from Cosgrove Computers Guidance Software Website: http://www.cosgrovecomputer.com/documents/EnCase%20Legal%20Journal.pdf Mocas S., (2004). Building theoretical underpinnings for digital forensics research, Digital Investigation, Vol1 No.1, Feb 2004, pp.61-68 [Electronic version]. Retrieved 10 December 2004, from Elsevier Publishing Website: http://www.sciencedirect.com National Centre for Forensic Science, (2003). Digital evidence in the courtroom: A guide for preparing digital evidence for courtroom presentation. Retrieved 10 December 2004, from the U. S. Department of Justice National Centre for Forensic Science Website: http://www.ncfs.org/DE_courtroomdraft.pdf National Institute of Standards and Technology (NIST), (2001). Disk Imaging Tool Specification 3.1.5. Retrieved 10 December 2004, from National Institute of Standards and Technology Website: http://www.cftt.nist.gov/DI-spec-3-1-5.doc Noblett, M.G., Pollitt, M. M., and Presley, L. A. (2000). Recovering and Examining Computer Forensic Evidence. Forensic Science Communications, 2(4). Retrieved 10 December 2004, from Federal Bureau of Investigations: Forensic Science Communications Website: http://www.fbi.gov/hq/lab/fsc/backissu/oct2000/computer.htm Palmer G L., (2002). Forensic Analysis in the Digital World. International Journal of Digital Evidence Vol1 (Issue 1) [Electronic version]. Retrieved 10 December 2004, from International Journal of Digital Evidence Website: http://www.ijde.org/archives_home.html Palmer G. L., (Ed.). A Road Map for Digital Forensic Research, Report From the First Digital Forensic Research Workshop (DFRWS), p.16. Retrieved 10 December 2004, from Digital Forensics Research Workshop Archive Website: http://www.dfrws.org/ Parr V. and Yamine M. (2003). Who uses the Internet and Government Online? Retrieved 10 December 2004, from New Zealand e-Government Website: http://www.e.govt.nz/docs/go-survey-2003/chapter4.html Pollitt M., (2001). Report on Digital Evidence. 13th INTERPOL Forensic Science Symposium, Lyon, France, October 16-19 2001. Retrieved 10 December 2004, from Interpol Website: http://www.interpol.int/Public/Forensic/IFSS/meeting13/Reviews/Digital.pdf Pollitt M., (2003). Who is SWGDE and what is the history? Retrieved 10 December 2004, from U. S. National Centre for forensic Science Website: http://ncfs.org/swgde/SWGDE_History.pdf Power R., (1998). 1998 CSI/FBI Computer Crime and Security Survey, Computer Security Issues and trends, 4(1). Proctor P. and Byrnes C., (2002). The Secured Enterprise; Protecting your information assets, Upper Saddle River, Prentice Hall. Regina v. Barlow, CA, CA 581/95, Aug 21 1996, Gault Henry and Blanchard JJ. Richardson R., (2003). 2003 CSI/FBI Computer Crime and Security Survey. Retrieved 10 December 2004, from Computer Crime and Security Website: http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2003.pdf Robertson B., and Vignaux C. A., (1995). Evaluating Forensic Science in the Courtroom, Chichester, John Wiley and Sons. Rowlingson R., (2003). Forensic Readiness – Enabling a Corporate Approach to Digital Evidence, White Paper. Retrieved 10 December 2004, from Qinetiq Website: http://www.qinetiq.com/home/core_skills/knowledge_information_and_systems/trusted_information_management/white_paper_index.Par.0005.File.pdf Rowlingson R., (2004). A ten step process for forensic readiness, International Journal of Digital Evidence, Winter 2004 Vol2 Issue 3 [Electronic version]. Retrieved 10 December 2004, from International Journal of Digital Evidence Website: http://www.ijde.org/docs/04_winter_v2i3_art2.pdf Ruane C., (1998). Forensic Evidence, Wellington, NZ Law Society. Scientific Working Group on Digital Evidence and International Organization on Digital Evidence (SWGDE/IODE), (2000). Digital Evidence: Standards and Principles [on-line]. Forensic Science Communications, 2(2). Retrieved 10 December, from U.S. Department of Justice Federal Bureau of Investigation Website: http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm#Introduction Simpson J. A. and Weiner E. S. C. (Eds), (1989). Oxford English Dictionary 2nd Ed., Oxford, Oxford University Press. Statistics NZ (2001). Detailed Industry by Area Information. Retrieved 10 December 2004 from Statistics NZ: NZ Government Website: http://www.stats.govt.nz/default.htm Stephenson P., (2002). The Forensic Investigation Steps, Computer Fraud and Security Volume 2002, September. Pp. 17-19 [Electronic version]. Retrieved 10 December 2004, from Science Direct Website: http://www.sciencedirect.com Stephenson, P., (2000). Investigating computer-Related Crime : A handbook for Corporate Investigators, Boca Raton, Florida, CRC Press. The Use of Computer Forensics in Arbitration, (2004). Retrieved 10 December 2004, from Online Security Website: http://www.onlinesecurity.com/Community_Forum/Community_Forum_detail168.php Toxicology, New Encyclopaedia Britannica, 15th Ed., (2002). Vol. 11 p. 878 Chicago. Trumble W. R., Brown L., Stevenson A., and Siefring J., (Eds) (2002). Shorter Oxford Dictionary, 5th Ed., Vol 2 Issue 3, Oxford, Oxford University Press. US Dept. of Justice (2001). , Electronic Crime Scene Investigation: A Guide for First Responders. Retrieved 10 December 2004, from U. S. Department of Justice, National Institute of Justice Website: http://www.ncjrs.org/pdffiles1/nij/187736.pdf Vijayan J., (2002). Build a Computer Incident Response Team - With money and reputation on the line, a computer incident response team must be speedy and organized. Retrieved 10 December 2004, from Computerworld Knowledge Centre Website: http://www.computerworld.com/securitytopics/security/story/0,10801,72637,00.html Volonino L., (2003). Plan For Electronic Discovery Now — And Avoid "Bet The Company" Mistakes, Communications of the Association for Information Systems Volume 12, Article 27 October 2003. Retrieved 10 December 2004, from http://cais.isworld.org/articles/12-27/article.pdf Washington v. Leavell, (2000). Okanogan County, Washington, Superior Court No. 00-1-0026-8, 20 October 2000. Western Australian Government, (2004). A technical guide to aid in the preservation of digital evidence following a computer security incident. retrieved 10 December 2004, from Western Australian Government Website: http://www.egov.dpc.wa.gov.au/docs/forensic_plan_200407.pdf Whitcomb C., (2002). An Historical Perspective of Digital Evidence: A Forensic Scientist’s View, International Journal of Digital Evidence Spring 2002 Volume 1, Issue 1 [Electronic version]. Retrieved 10 December 2004, from International Journal of Digital Evidence Website: http://www.ijde.org/archives_home.html Wittmeyer J., (2004). Can DNA demand a verdict? Retrieved 10 December 2004, from Genetic Science Learning Centre at the Eccles Institute of Human Genetics University of Utah Website: http://gslc.genetics.utah.edu/features/forensics/ Wolfe H., (2004). The question of organisational forensic policy, Computer Fraud and Security, Vol. 2004, Issue 6, June 2004 [Electronic version]. Retrieved 10 December 2004, from Science Direct Website: http://www.sciencedirect.com Wolfe-Wilson J. and Wolfe H. B., (2003). Management strategies for implementing forensic security measures, Digital Forensics, Vol. 8 No.2, 2003 [Electronic version]. Retrieved 10 December 2004, from Science Direct Website: http://www.sciencedirect.com Yasinsac A. and Manzano Y., (2001). Policies to Enhance Computer and Network Forensics, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June, 2001. Retrieved 10 December 2004, from U. S. Military Academy Website: http://www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/paperW2B3(37).pdfen_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record