Show simple item record

dc.contributor.authorQuinn, K J Spikeen_NZ
dc.date.available2011-04-07T03:11:45Z
dc.date.copyright2005-12-05en_NZ
dc.identifier.citationQuinn, K. J. S. (2005). Examining the state of preparedness of information technology management in New Zealand for events that may require forensic analysis. Digital Investigation, 2(4), 276–280. doi:10.1016/j.diin.2005.10.005en
dc.identifier.issn1742-2876en_NZ
dc.identifier.urihttp://hdl.handle.net/10523/1237
dc.descriptionThis is a post-print of the paper (i.e., draft post-refereeing). There may be small differences between this version and the final published version; please refer to the publisher's web site for the final published version.en_NZ
dc.description.abstractComputer security is of concern to those in IT (Information Technology) and forensic readiness (being prepared to deal effectively with events that may require forensic investigation) is a growing issue. Data held only on magnetic or other transient media require expert knowledge and special procedures to preserve and present it as valid in a criminal or employment court. Staff required to handle possible forensic evidence should be forensically knowledgeable. Having policies and procedures in place is one inexpensive way to protect the forensic data and can mean the difference between a valid case and no case. This paper presents the results of a survey of IT managers in New Zealand (NZ) examining the state of awareness of IT management in NZ regarding the field of digital forensics in general and their state of preparation for protection of forensic data in the case of an event requiring forensic analysis.en_NZ
dc.format.mimetypeapplication/pdf
dc.relation.ispartofDigital Investigationen_NZ
dc.subjectsecurity policyen_NZ
dc.subjectforensic policyen_NZ
dc.subjectIT managementen_NZ
dc.subjectforensic readinessen_NZ
dc.subjectstatisticsen_NZ
dc.subject.lcshQA75 Electronic computers. Computer scienceen_NZ
dc.titleExamining the state of preparedness of information technology management in New Zealand for events that may require forensic analysisen_NZ
dc.typeJournal Articleen_NZ
dc.description.versionPublisheden_NZ
otago.date.accession2006-03-10en_NZ
otago.relation.issue4en_NZ
otago.relation.pages276-280en_NZ
otago.relation.volume2en_NZ
dc.identifier.doi10.1016/j.diin.2005.10.005en_NZ
otago.openaccessOpen
dc.identifier.eprints275en_NZ
dc.description.refereedPeer Revieweden_NZ
otago.school.eprintsSecurity Research Groupen_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesAhmad A. The forensic chain-of-evidence model: improving the process of evidence collecting in event handling procedures. Proceedings of the sixth Pacific Asia conference on information systems, Tokyo, Japan, 2–4, Sept 2002; 2002 [Electronic version]. Retrieved 10 December 2004, from University of Melbourne Website: http://www.dis.unimelb.edu.au/staff/atif/AhmadPACIS.pdf. Gordon LA, Loeb MP, Lucyshyn W, Richardson R. 2004 CSI/FBI computer crime and security survey. Retrieved 10 December 2004, from Computer Security Institute Publications Website: <http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf>; 2004. Mocas S. Building theoretical underpinnings for digital forensics research. Digital Investigation Feb 2004;1(1):61–8 [Electronic version]. Retrieved 10 December 2004, from Elsevier Publishing Website: <http://www.sciencedirect.com>; Feb 2004. National Centre for Forensic Science. Digital evidence in the courtroom: a guide for preparing digital evidence for courtroom presentation. Retrieved 10 December 2004, from the U.S. Department of Justice National Centre for Forensic Science Website: <http://www.ncfs.org/DE_courtroomdraft.pdf>; 2003. Richardson R. 2003 CSI/FBI computer crime and security survey. Retrieved 10 December 2004, from Computer Crime and Security Website: <http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2003.pdf>; 2003. Rowlingson R. Forensic readiness — enabling a corporate approach to digital evidence, white paper. Retrieved 10 December 2004, from Qinetiq Website: <http://www.qinetiq.com/home/core_skills/knowledge_information_and_systems/trusted_information_management/white_paper_index.Par.0005.File.pdf>; 2003. Rowlingson R. A ten step process for forensic readiness. International Journal of Digital Evidence Winter 2004;2(3) [Electronic version]. Retrieved 10 December 2004, from International Journal of Digital Evidence Website: http://www.ijde.org/docs/04_winter_v2i3_art2.pdf; Winter 2004. Wolfe H. The question of organisational forensic policy. Computer Fraud and Security June 2004;2004(6):13e4 [Electronic version]. Retrieved 10 December 2004, from Science Direct Website: <http://www.sciencedirect.com>; June 2004. Wolfe-Wilson J, Wolfe HB. Management strategies for implementing forensic security measures. Digital Forensics 2003; 8(2) [Electronic version]. Retrieved 10 December 2004, from Science Direct Website: <http://www.sciencedirect.com>; 2003.en_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record