This assignment delves into the field of electronic email forensics. Students are tasked with examining the role of technology in investigating crimes related to emails. The focus includes analyzing relevant tools, effective investigation methods, legal procedures, and the challenges faced in identifying perpetrators through digital evidence.
Contribute Materials
Your contribution can guide someoneβs learning journey. Share your
documents today.
Forensics and Incident Response (Electronic emails)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT Advancement in technology is effective enough to protect people from the type of criminal activities that take place. However, it is identified that individuals get in trap of the people who are wan to harm or get money. The present research is conducted to determine the methods, procedure and tools for investigation applied by forensic companies for electronic email. This is an area in which the research is carried as the rate of crime is increasing tremendously. So as to conduct the research, there are both primary and secondary methods that are applied so that information with respect to the topic can be identified. More specifically, the researcher has made use of interview from 5 of the exports of Forensic persons. They are selectedastheyhaveproperunderstandingabouttheresearchtopic.Fromtheresearch conducted, it is identified that the lack of knowledge is the main cause due to which people get in trouble or become the part of criminal case. In addition to this, forensic firms need to be frequent advancement made towards technology so that they are able to identify the people behind the crime conducted through email.
Contents ABSTRACT....................................................................................................................................2 INTRODUCTION...........................................................................................................................1 Background......................................................................................................................................2 The crime that take place through electronic emails...................................................................3 Procedures that are followed by digital forensic companies for investigating on crimes caused through electronic emails.............................................................................................................4 Methods and tools that are used for Electronic emails by digital forensics company in UK......5 Methodology....................................................................................................................................7 Result and discussion.....................................................................................................................11 Conclusion.....................................................................................................................................14 REFERENCES..............................................................................................................................15 APPENDIX 1.................................................................................................................................17 APPENDIX 2.................................................................................................................................23 Questionnaire from Forensic Experts........................................................................................23
INTRODUCTION With time there are different type of changes that has taken place with regard to technology. There are many firms that have come up so that people can be protected from any type of crime. With advancement in technology, it has also given raise to crime with the help of different type of electronic sources (Casey, 2011). In order to be better, firms make frequent changes in their services and the type of technologies that are being used. Present research is focused on forensic investigation in which analysis and gathering for the crime that are related with physical evidence. This is done so that appropriate conclusion is determined through which the suspect can be found. There are different areas in which the investigators will look, it includes fingerprints, hard drives, residue, computer or any other type of electronic technologies that are found at the crime scene. There are various type of tools that are used so that clues can be found out and the suspect can be caught (Chung, Park and Kang, 2012). There are forensic scientists who collect analyse and preserve the evidence that are found during the investigation and are some of the scientists who travel to crime scenes and collect evidence themselves. Both civil and criminal cases are testified and they have the privilege to work defence or prosecution. When taking about ancient world, the rate of standardized forensic practices. Confessions took place so as to make the crimes done by people and they were punished (Nelson, Phillips and Steuart, 2014). However, with changes in time, there are many experts who aim at understanding the case and focus on findings out clues that can help to catch the suspect. In the year 1248, there was first account of making use of entomology and medicine were used so as to criminal cases. Later on there are many different type of advancement in technology that formed many organization that work towards solving cases so that true person involved can be punished as their part in the crime (Hoog, 2011). Many different form of crime take place and these areas are studied by different departments in forensic team. The present research is focused conducting the research. People made use of tools that are helpful enough to connect with other so that they are able to convey information. In this context, Email has become a primary sources or means for connecting with others. Further, these are considered to be the easy source of forged. Many crimes has been reported that are done with the help of emails. In business world, firms have develop their own email addresses so that they are able to track down that interactions that are taken place between employees (Bryman and Bell, 2015). Further, there are other emails like Yahoo, gmail, etc. in which there are many crimes that take place and it 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
requires to have forensic team that can identify the crime that has taken place. To carry out the research in effective manner below given are the aim objectives: Aim: To investigate over recent method, procedures and tools used for Electronic emails by digital forensics company in UK. Objectives: ο·To identify the crime that take place through electronic emails. ο·Todeterminetheproceduresthatarefollowedbydigitalforensiccompaniesfor investigating on crimes caused through electronic emails. ο·To understand the methods and tools that are used for Electronic emails by digital forensics company in UK. ο·To recommend way to reduce the rate of crime that take place through Electronic emails at UK. Background Electronic emails can be determined as sources that are used by people to connect with others. All the crime that are performed by this sources fall under computer related crime or cyber-crime. As per cybercrimes, it can be defined as type of offences which are undertaken against groups or individuals who have criminal motive due to which people get affected negatively. People in this modern world, aim at gaining money by any means (Garfinkel, 2010). For this process, it take different type of strategies so that people can be manipulated and tricked to get money. Further, there are cases in which the link that are send by the criminals which when clicked, then their private information gets leaked. The fraud for email is the intentional deception that are made by a person to damage others or for personal gain. When the rate of email users increased, then it became means of defraud people. Further, this can also be taken as a form of scam or con game (Salehi and Alipour, 2010). Further, there are different forms of strategies that are applied by people in which they get to earn money. In this context, below given are the some of the forms of crime that are conducted through emails: Spoofing: This is a type of process in which a person will pretend to be someone else, then it is known to be spoofing. As perOliveira and Martins, (2011)there are number of ways through which spoofing take place. Among all these one of the common one is when actual 2
senderβs origin of the message and the name are masked or concealed from the recipient. One of the type of spoofing is as follows: Phishing for data: There are some of the spoof that purport to be from existing companies or from the firms that are already known to the victim (Rose, Hair and Clark, 2011). The main is send in form that asks for information from client in which it includes bank details that has to be confirmed. This also includes development of new account or sharing of password. Bogus offers: This is a type of email solicitation is an attempted fraud in which interest among people are developed by giving the offer of services or goods (Turvey, 2011). The prices of the product or services are reduced or there are additional gifts that are given which enables to develop interest among people. Request for help: In this type of email fraud, there are emotional mails are send in which the reader develops sympathy. People tent to send these people money. For example, people will ask money for operation in order to cure cancer, etc. When there are emotional touch included, then it make clients to send some money so that they can overcome their problems. Where criminal activities that take place, then helps is taken from digital forensic companies so that they will be able to help to get back the money or to punish the person behind all these activities (Men and Tsai, 2012). The crime that take place through electronic emails. According to Wirtz, Schilke and Ullrich, (2010), online fraud and criminal activities are spreading like viral and interrupting the stability of societies across the globe. The online frauds are classified among internet banking mobile banking, emails, cyber attack etc. the most increasing criminal activities are via emails which need to secured as the fraud in leading to mislead of confidential information (See-To and Ho, 2014). Further, it is turning important to spread awareness among society about emails which will help them to never respond to requests for personal details. Some email frauds/scams are extremely convincing which promotes the internet criminal activities. Moreover, the hacking activities are increasing because it is quite easy access over information when the individual have cheat codes to break the passwords (Siponen, Pahnila and Mahmood, 2010). Besides, almost every person uses Microsoft software which is open to abuse and this the reason that the criminals have developed hacking a program called βThe Backdoorβ which enables them access over all Microsoft systems. According to Scholar, organisational systems are difficult to hack because the management protect the 3
information and data by establishing security measures. However, in contrary Margaryan, Littlejohn and Vojt,(2011), as stated that crime that take place through electronic emails is the situation of ethical dilemma because there are various motives of accessing over others information. For instance, when some expertise and legal person access over confidential information of other tan it defined under protection of individual wile when this is done by some hack or illegal authority than it is considered under crime activities But the science of confidential and personal information states that no one can access over the private email of anyone (Trepte, Reinecke and Juechems,2012). Apart from this there are various situations under which it turns important for the person to go through emails of others like, unusual death, suicide, major injury to someone because these days the justice system is advance and make use of every advanced technology which can provide easy access personal information to track the record and data of criminal activities which can be protected. In contrast, the crime through email is increasing and the people are not even aware about this and therefore share their personal details through email which leads to misleading and misinterpretation of personal information (Gloe and BΓΆhme,2010). For instance, under this the information is accessed when there is no clue of evidence to prove the crime than it becomes necessary for the individual to check ones emails. The email criminal activities are increasing by sending information on the name of some fake company and fake character in which the victim is asked share about his or her information as according to their tactics the individual is some price winner which motivates the society and there are people who share their confidential information like, name, personal number, bank details by which the criminal succeed in its crime (Hargittai, 2010). Procedures that are followed by digital forensic companies for investigating on crimes caused through electronic emails. Apart from this, there is specific procedure followed by digital forensic companies for investigating on crimes caused through electronic emails. Chung, Park and Kang,(2012), has argued that there are various challenges faced individual to success over others email ids which are, determining whether law enforcement is needed in the process of investigation. Further, the legal individual is liable to obtain written permission to conduct the forensic investigation for the specific incident. Then the individual need to discuss the investigation process with the legal advisors to analyse and evaluate the potential issues (Nelson, Phillips and Steuart, 2014). Lastly 4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
the person is bound to ensuring that the information of clients is safe and confidential and limited to the process. Computer Forensics is a developing field and but there is standardization and relevancy in the justice system and electronic industryβ. In addition to this every forensic model is based on specific area of investigation like, law enforcement or analysing electronic evidence. In contrast, according to Bryman and Bell, (2015), there is no single digital forensic investigation model which has been universally accepted by any legal authorities but have been accepted and implemented under digital forensic model framework which provides flexibility in collecting evidence and analysing incident. In accordance to the model, it as been determined that The βPreserve and Document Evidenceβ arrow indicates the perseverance and documentation of all collected evidences from investigation. The evidence will only be opened by the judge to make progress and process of criminal activities (Casey, 2011Chung, Park and Kang,2012). The process of investigation involves, Gathering of easily available information by analysing the information and site of incident, evaluating the influence of the investigation on the business or victim which can be, loss of revenue, and loss of confidential information. Further, the model aims at collection of information of the networks and devices which were involved in the case like, router, switches, hub, computers, servers, network diagram and firewall (Nelson, Phillips and Steuart, 2014). Moreover, the system aims at identifying the external storage devices such as pen drive, flash drive, external hard disk, memory cards which can be a strong evidence to prove the and identify the root cause of incident. The system will further evaluate the forensic tools which can assist the investigation process. The forensic team also captures live network traffic in case there is a suspicious activity found during investigation (Bryman and Bell, 2015). Lastly, the system make appropriate record and Documentation of all the activities and information gathered during the investigation which can assist the court to verify the actions. In accordance, Salehi and Alipour, (2010)digital forensics company in UK it is important for the organisation to work under defined procedure of investigation in order to gather appropriate information and evidence to prove crime. Moreover, it is done to ensure safe practices over accessing someone personal and confidential information. Methods and tools that are used for Electronic emails by digital forensics company in UK. Oliveira and Martins, (2011), has stated that implementing the use of methods and tools of which are been used for Electronic emails by digital forensics company in UK, make the 5
investigation process easier and helps the company in collecting appropriate evidence during the process. There are various techniques which can assist the system like Email header analysis in which the investigationis done in order to extract data of the email sender and also analyzing the path or the place from where the email has been sent (Rose, Hair and Clark, 2011). Basically, the metadata of emails is saved in the headers but sometimes the headers can be tampered in which the motive of sender is to hide its identity. Besides, there is Bait Tactic in which the investigator tracks the IP address of sender. In this, the mail is composed of http: β$lt;img src>β tag which is sent to the mail address from which the mail has been received by the victim of the case. In this when the criminal opens the mail the investigator is able to track the IP address which makes further process of investigation easier (Men and Tsai, 2012). However, in contrary, as per the views ofWirtz, Schilke and Ullrich, (2010), Extraction from Server is the best technique to identify and evaluate the information of sender. Under this technique, Server inquiry becomes accessible when the emails domicile on the sender and receiver ends have been tracked permanently. In this the investigator analyses the record of server as it maintain a log of the sent and received emails. Moreover, the logs provides the information of the source from which the emails have been sent (See-To and Ho, 2014). Apart from this, Mail Examiner is an advanced investigation toolwhich aims at supporting more than 20 email formats and around 750 MIME formats. The tool comprises advanced features like, In advance search for keywords, connected analysis of emails, Peel tone analysis, and Live Exchange Mailbox investigation.Incontrary,Siponen,PahnilaandMahmood,(2010)statedthatthe Investigation of Network Source technique is used by investigator in case when server logs fail to generate the appropriate information. Further, in this the Internet Service Providers do not provide access to the server. The logs generated by network like, hubs, routers, firewalls, etc. Provides adequate information about the domicile of the email. Hence, there are various methods and tools which can be beneficial in investigating and reporting the information regarding incident (Margaryan, Littlejohn and Vojt, 2011). The purpose of a computer forensic examination is to recover data from computers seized as evidence in criminal investigations. Experts use a systematic approach to examine evidence that could be presented in court during proceedings. The involvement of forensic experts needs to investigate incident on early stage as it is beneficial in properly 6
collectingtechnicalinformation,dataandmaterialto reporttheincident.Forensic investigation system of UK, comprises efforts like, Collection through search and grasping of digital evidence, and acquiring data, Examination of situation by applying techniques to recognize and collect data, analyzing the data and resources evident the incident and reporting the collected information (Trepte, Reinecke and Juechems, 2012). Henceforth, the forensics process used by Forensic Company of UK comprises report writing in which Computer forensic examiners prepares reports for the attorney to evaluate facts and evidence. Thus, evidence for testimony plays a vital role in supporting the witness and evidence in the court. Methodology This is an important part of the research as it helps to conduct the research in effective manner. There are different type of tools, methods or techniques that are included and these are used so that with proper structure that data is collected and research is carried out. Below given are the methodologies that are followed by the researcher: Research philosophy: This can be determined to be the values, belief and assumptions that are carried out the researcher for the topic (Mackey and Gass, 2015). There are mainly two different type of research philosophies which are positivism and interpretivism. In accordance with interpretivism, it can be stated that it reflects single fact that is followed by the numerous facts. On the other hand, positivism is depend upon certain facts and figures that are related with particular aspects (Taylor, Bogdan and DeVault, 2015). In accordance with the type of research topic that is selected, the type of philosophy that is selected. The research has made use of positivism as it enables to focus on the real facts and figures that are important for the research. This way, it becomes helpful to develop in depth understanding for the research topic in effective manner. Research strategy: It is important for the research to determine appropriate way so that the research can be carried out in effective manner (Flick, 2015). There are two different ways that are helpful to conduct the research. In this context, it includes quantitative and qualitative strategies. With this respect, qualitative is a type of research strategy that focus on theoretical aspects and this is highly effective to develop in depth understanding for the research topic. There are many research that are already conducted by other researchers on similar topic. The data gathered from their part is effective to develop knowledge about the topic (Smith, 2015). On 7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
the other hand, quantitative research is a type of strategy in which statistical methods are applied like standard deviation, regression, etc. This is helpful enough to present the relationship between variables. Among these two research strategies, qualitative research is selected as it will be help to focus on the develop in depth understanding for the methods, procedure and tools that are applied to make proper investigation for emails by digital forensic companies. Further, it is also important that proper outcome can be determined from the research conducted and with the help of quantitative research, the investigator are able to provide appropriate outcome from the research. Research approach: This is an important aspect in research as it focus on the type of pattern that are applied by the business to gather information (Cammarota and Fine, 2010). The data that are provided can be presented two different ways. First one is from general to specific and other one is specific to general. Both have their own set of importance and this is selected based on the type of research that has to be conducted. There are two different type of research approaches which are inductive and deductive approaches. Inductive approach is a type in which the topic is generally explained and then specific topic are explained. In other there are consideration made for the theoretical aspects that are helpful enough to raise understand for the topic (Miller, Birch and Jessop, 2012). On the other hand, deductive approach focus on gathering data that are specific and then generalized content is presented. In other words, more emphasis is put on new theories and this is done by making proper evaluation of the aspects and facts. Among these two the researcher has made use of inductive approach in which the information is provided generally and then specific information is presented. This is approach is selected as it enables to provided proper understanding of topic and then then particular to the research can be focused. Research design: This is determined to be the blue print in which step by step process is presented. Further, it is the process in which the findings are presented of the information gathered (Mackey and Gass, 2015). These are of three types which are exploratory, explanatory and descriptive. Among these, descriptive is a type of research design that focus on describing the characteristics of the population that are selected. Further, explanatory focus on the type of issues that are faced and appropriate outcomes that are determined. This is mainly focused on the aim and objectives that are set by the researcher. Lastly, exploratory is used to find out problems or the issues that are not been discussed till know (Taylor, Bogdan and DeVault, 2015). Among 8
all these, the researcher has made use of descriptive design is applied as it enables to focus on the aim and objectives that are set. Main reason for selecting this design is that, it enables to present the main issues that are faced by the forensic companies to find out the people who perform criminal activities through electronic email. Characteristics of the population is analysed as it enables to focus on developing in depth understanding. Data Collection: This is the ways through which information is gathered in accordance with the research topic. There are different type of methods that can be applied so that the adequate data can be gathered (Flick, 2015). In this context, it includes primary and secondary method. Both are highly effective in order to provide relevant information. Primary method is the data that are collected for the first time. There are different type of tools that are available which are interview questionnaire, observation and focus groups. On the other hand, secondary methods are those data that are already gathered by some other researchers. Tools that are helpful to collect these type of information includes books, journals, online sources, etc. Among these two, the researcher has made use of both these methods that is primary and secondary. More specifically, to gather primary information the investigator has made use of interview (Smith, 2015). On the other hand, to gather secondary information, books, journals, online sources, etc. are used. There are open ended questions that are asked by the researcher in which all the objectives are covered. Through this methods, the data that is required to carry out the research is collected through primary and secondary methods. Sampling: It is not possible for the researcher to focus on the population that can provide adequate data as per the research topic. In this context, it is important that particular population is selected who can support for carrying out the research (Cammarota and Fine, 2010). There are two different method of sampling which are probabilistic and non probabilistic sampling methods. Probabilistic is a type of sampling method in which the research randomly select from the population all the sample in from the population have equal chance of being selected. On the other hand, non probabilistic is a type of method in which the researcher ha proper understanding of the samples that has to be selected. The investigator will chose from the population as per his/her preferences. Among these two, the researcher has made use of probabilistic sampling method. This is selected as the research focus on the overall organization that provide services related with forensics (Miller, Birch and Jessop, 2012). In this context, probabilistic sampling is selected from the large population. Further, it can be stated that the researcher has conducted 9
interview from 5 of the Forensic exports as they have proper understanding and they are supportive to provide information about the methods, procedure and the tools that are applied by digital forensic companies at the time of any crime. Data analysis: When information is gathered, then it required to have proper analysis made. This is important as it enables to come up with appropriate outcome so that the rate of understanding can be enhanced (Mackey and Gass, 2015). The data is gathered with the help of secondary and primary sources are effective enough to make sure that the data can be presented in understandable manner. As it was discussed above, there are two methods that are helpful enough to carry out the research. In this context, it includes quantitative and qualitative methods. More specifically, the investigator can made use of qualitative method in which the tools used are thematic. On the other form quantitative research, the researcher can make use of SPSS so that the research can be presented in form of standard deviation or any other tests (Taylor, Bogdan and DeVault, 2015). Among these two, the researcher has made use of qualitative method in which the information gathered is presented in the form of thematic.In the present research the investigator has made use of conducting interview from 5 of the respondents who are Forensic experts. Questions are designed in such a way that the research aim and objectives are covered. With the help of thematic, the research is presented in the form of tables, charts, graphs, etc. Ethical consideration: There are different type of ethical considerations that has to be considered by the researcher. In this context, it includes information to be properly cited for the data that are gathered from secondary information (Flick, 2015). There are information that are used from secondary information. These data cannot be used as it is but, it requires to be writer in own words. This is done so that the rate of risk related with plagiarism can be reduced. Further, there are people who are involved to provide adequate information. It requires to make sure that all the respondents are provided with appropriate data in which it includes that main cause for which the information is gathered. When respondents are conveyed about the main reason, then it became helpful to get appropriate information (Smith, 2015). Further, there is a proper system that is used so that the personal information that are provided by the respondents are not being mis used. Further the person who is authorised is inly allowed to access the personal information. Moreover, the personal information will be destroyed when the use for the data gathered is over. 10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Research limitations: There are different type of limitations that has to be considered by the researcher. In this context, below given are the limitations that has covered by the researcher: Limitation of aim and objectives: It is important that proper research to be conducted so that the research can be carried out in effective manner (Cammarota and Fine, 2010). It becomes limitation, when aim and objectives of the research is not properly framed. Limitation of finance: There are different type of activities that has to be covered and each of them it requires to have proper financial support so that these activities can be completed. In this context, the researcher has to have proper planning so that within the finance available activates are attained. Limitation of time: All the activities need to be completed with the time that the researcher has. It is important that proper planning is done so that he/she is able to manage time in effective manner. It becomes a limitation with the plan is not properly made (Miller, Birch and Jessop, 2012). Limitation of connecting the respondents: There are different type of sources that are available that are helpful to connect with the respondents. It is important that proper steps are taken so that all the respondents who are selected are provided appropriate information in relation with the topic. Result and discussion The research is carried out with the help of 5 respondents who are Forensic exports. In this context, there are open ended questions that are developed and these are helpful to generate appropriate answers in relation with the topic. Fellow give are the findings and discussion that are made from these respondents: Theme 1: Rate of crime is increasing with electric emails Description:From the interview conducted from 5 of the respondents, it is found that with time there are many changes that has taken place. In this, people have found out different way through which innocent people can be fooled. Other respondents say that there are different form of criminal acts that are undertaken on email in which identity other persons are used so that fraud can be done. However, the respondents in overall state that the issues or the crime related with the email has increased. There are many new cases of fraud that has been identified in UK. It is important for the people to develop their understanding for the various type of ways 11
that are performed by individuals so that they are able to harm or get money from innocent people. From the response given by a forensic export, one of the strategy applied by people are by making use of top companies in which luck draws are conducted and viewer is asked to deposit certain amount of money so as to get the winning price. Theme 2: The tools that are important to be considered for electronic emails Description: From the response given by the export, it can be stated that there are different type of tools that are used by digital forensic companies so that they are able to conduct the investigation. As per an expert, firms made use of Bait tactics in which the IP address of the sender is tracked. This is a type of technique that is highly effective to find out the criminals as it provides the address of the sender from where the mail was sent. Another export stated that email header analysis done so that the information can be extracted from the senderβs mail. In addition to this, it also help to determine the path through which email is transmitted. Further, there are other tools like investigation of network sources that are helpful enough to generate the information regarding the server logs when it fails. When the information provided do not have any type of given access to the server, then it enables to opt the network sources. Theme 3: Improvement in technology is a need for forensic companies Description: There are many changes that has taken place in which hackers are able to get personal information from people. Many systems are developed that are helpful enough for the criminals in which forensic teams are not able to hack 5the criminals. In this context, it is important to make sure that proper steps are taken in which technology are updated or new system is installed so that the rate of criminal activities can be reduced. Forensic firms has to make use of highly advanced technology so that they are able to track out criminals and to protect innocent people from getting in to situations of fraud. Over all, it can be stated that there are many changes that has taken place in relation with technology so that forensic team is able to find out the criminals. From the response from one of the experts, the forensic team has to be much more advanced than the technology that are used by criminals. This can only be helpful enough to provide safety to public. Theme 4: Most effective method that are helpful to investigate electronic emails 12
Description:The companies make use of different type of methods that are helpful enough to find the criminals who make use of emails. In this context, it includes the server investigation when the emails residing by the receiver and sender have purged permanently. There are various type of logs that are maintained from the side of senders and receivers. These logs are highly effective to provide appropriate findings and to determine the suspects who are involved. From the interview conducted, it was found that IP address is traced so that the position of the sender can be identified. This is done so that people who may be affected with the criminal activity performed can be caught and put behind bars. Overall it can be stated that the experts have diverse set of perception for the methods that are applied. The type of methods that are applied depends upon the situations or the type of crime that has taken place. Theme5:Theappropriateprocedurethatisfollowedbyforensiccompaniesfor investigating electronic emails Description:From the response gathered from the interview, it is found that there are different type of procedure that are followed. However, there are some set of common procedures that are followed so that the criminals can be caught. First of all, it is important that proper analysis is made of the situation so that the condition can be identified. Then it includes analysis made of the losses of the type of harm that is faced. Then, analysis is made to know the type of electronic tool is used or the type of strategy that is are applied by the criminals to harm the innocent people. Further, there are different ways are analysed so that the most appropriate strategy can be applied in effective manner. Moreover, data is gathered in which the interaction or the relation with the sender is determined. When all the evidence and the situation is properly analysed, then based on the evidence the criminal is caught. Theme 6: The procedure, method and tools applied effective enough to identify the criminals Description: The methods, procedure and the tools that are applied are effective enough to make sure that proper analysis is made so that the rate of performance can be made. From the response given by the exports, it can be stated that all these depend on the type of crime that has taken place. There are some of the condition in which the forensic team are not able to trace down the criminal. This is because of the advanced technology that are used by the people. There 13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
are system in which the IP address gets changed on every search that are made. In such type of condition, it becomes difficult for the team to track the person. However, the type of procedure, method and the tools are highly effective as the team has understand the techniques that are applied and so that it has become favourable to find out the person who are behind the crime. Theme 7: The main causes due to which people face fraud type situation Description:From the interview conducted, it is identified that there are many reasons due to which people face situations related with fraud. One of the main reason identified with lack of understanding or knowledge that people have towards the crime that take place with the help of criminals take advantage of that. In this context, it requires to have proper knowledge can be conveyed so that they will be able to eliminate the issues or the problems that are faced by people. Another type of response given by an expert state that people are get in stuck of such situation due to emotional conditions. There are many criminals who convey that they there are some kind of health issues for which they need to have money. These are the condition due to which innocent people get in problems there are harm faced by them. Conclusion From the research conducted, it can be stated that the rate of crime is increasing drastically. It is important to make sure that proper consideration is made by the forensic firms in which they update their technology frequently and the members are provided with proper training so that they will be able to make use of the tools in effective manner. Further, it required to have information to be spread to people regarding the criminal activities that are taking place. This is important to be considered so that the rate of crime that has increased can be reduced. Further, it also identified that proper security should be maintained in which strong password is formed. This is highly effective to reduce the rate of crime as it is difficult to hack the system where is strong password made. Further, there are different type of methods that are applied by the forensic companies. Among all these bait tactics is highly effective as it enables to determine the IP address of the sender and this becomes helpful to track out the criminal. In addition to this, the rate of crime can be reduced when there are proper awareness among the people so that they will be able to help people from criminal activities. 14
REFERENCES Books and Journals Bryman, A. and Bell, E., 2015.Business research methods. Oxford University Press, USA. Cammarota, J. and Fine, M. eds., 2010.Revolutionizing education: Youth participatory action research in motion. Routledge. Casey, E., 2011.Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press. Chung, H., Park, J. and Kang, C., 2012. Digital forensic investigation of cloud storage services.Digital investigation,9(2), pp.81-95. Flick, U., 2015.Introducing research methodology: A beginner's guide to doing a research project. Sage. Garfinkel, S. L., 2010. Digital forensics research: The next 10 years.digital investigation,7, pp.S64-S73. Gloe, T. and BΓΆhme, R., 2010. The dresden image database for benchmarking digital image forensics.Journal of Digital Forensic Practice,3(2-4), pp.150-159. Hargittai, E., 2010. Digital na (t) ives? Variation in internet skills and uses among members of the βnet generationβ.Sociological inquiry,80(1), pp.92-113. Hoog, A., 2011.Android forensics: investigation, analysis and mobile security for Google Android. Elsevier. Mackey, A. and Gass, S. M., 2015.Second language research: Methodology and design. Routledge. Margaryan, A., Littlejohn, A. and Vojt, G., 2011. Are digital natives a myth or reality? University studentsβ use of digital technologies.Computers & education,56(2), pp.429- 440. Men, L. R. and Tsai, W. H. S., 2012. How companies cultivate relationships with publics on social network sites: Evidence from China and the United States.Public Relations Review,38(5), pp.723-730. Miller, T., Birch, M. and Jessop, J. eds., 2012.Ethics in qualitative research. Sage. Nelson, B., Phillips, A. and Steuart, C., 2014.Guide to computer forensics and investigations. Cengage Learning. 15
Oliveira, T. and Martins, M. F., 2011. Literature review of information technology adoption modelsatfirmlevel.Theelectronicjournalinformationsystemsevaluation,14(1), pp.110-121. Rose, S., Hair, N. and Clark, M., 2011. Online customer experience: A review of the businessβtoβ consumer online purchase context.International Journal of Management Reviews,13(1), pp.24-39. Salehi, M. and Alipour, M., 2010. E-banking in emerging economy: empirical evidence of Iran.International Journal of Economics and Finance,2(1), p.201. See-To, E. W. and Ho, K. K., 2014. Value co-creation and purchase intention in social network sites: The role of electronic Word-of-Mouth and trustβA theoretical analysis.Computers in Human Behavior,31, pp.182-189. Siponen, M., Pahnila, S. and Mahmood, M. A., 2010. Compliance with information security policies: An empirical investigation.Computer,43(2). Smith, J.A. ed., 2015.Qualitative psychology: A practical guide to research methods. Sage. Taylor, S. J., Bogdan, R. and DeVault, M., 2015.Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons. Trepte, S., Reinecke, L. and Juechems, K., 2012. The social side of gaming: How playing online computergamescreatesonlineandofflinesocialsupport.ComputersinHuman Behavior,28(3), pp.832-839. Turvey, B. E., 2011.Criminal profiling: An introduction to behavioral evidence analysis. Academic press. Wirtz, B. W., Schilke, O. and Ullrich, S., 2010. Strategic development of business models: implicationsoftheWeb2.0forcreatingvalueontheinternet.Longrange planning,43(2), pp.272-290. 16
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPENDIX 2 Questionnaire from Forensic Experts 1. Do you think that rate of crime is increasing with electric emails? 2. What are the tools that are important to be considered for electronic emails? 3. Do you think improvement in technology is a need for forensic companies? 4. What are most effective method that are helpful to investigate electronic emails? 5. What are the appropriate procedure that is followed by forensic companies for investigating electronic emails? 6. Are the procedure, method and tools applied effective enough to identify the criminals? 7. What are the main causes due to which people face fraud type situation? 23