OMA054-6: Email Forensics and Incident Response Investigation

Verified

Added on  2020/06/05

|26
|7956
|375
Report
AI Summary
This report delves into the methods, procedures, and tools employed by digital forensics companies in the UK to investigate crimes involving electronic emails. It begins with an abstract highlighting the increasing rate of email-related crimes and the need for effective investigation techniques. The introduction provides background information on the evolution of technology and the rise of cybercrime, particularly through emails. The report defines the aim and objectives, including identifying email-related crimes, determining investigation procedures, understanding the tools and methods used, and recommending ways to reduce email crime rates. It covers various email-related crimes like spoofing, phishing, and bogus offers. The report examines the procedures followed by digital forensic companies, discussing challenges, legal considerations, and the importance of protecting client information. The methodology section outlines the research approach, including interviews with forensic experts. The results and discussion analyze the findings, highlighting the lack of knowledge as a major factor contributing to email crime and the need for forensic firms to stay updated with technological advancements. The conclusion summarizes the key findings and emphasizes the importance of forensic investigations in addressing email-related crimes. References and appendices, including questionnaires from forensic experts, are included to support the research.
Document Page
Forensics and Incident
Response (Electronic emails)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ABSTRACT
Advancement in technology is effective enough to protect people from the type of
criminal activities that take place. However, it is identified that individuals get in trap of the
people who are wan to harm or get money. The present research is conducted to determine the
methods, procedure and tools for investigation applied by forensic companies for electronic
email. This is an area in which the research is carried as the rate of crime is increasing
tremendously. So as to conduct the research, there are both primary and secondary methods that
are applied so that information with respect to the topic can be identified. More specifically, the
researcher has made use of interview from 5 of the exports of Forensic persons. They are
selected as they have proper understanding about the research topic. From the research
conducted, it is identified that the lack of knowledge is the main cause due to which people get in
trouble or become the part of criminal case. In addition to this, forensic firms need to be frequent
advancement made towards technology so that they are able to identify the people behind the
crime conducted through email.
Document Page
Contents
ABSTRACT....................................................................................................................................2
INTRODUCTION...........................................................................................................................1
Background......................................................................................................................................2
The crime that take place through electronic emails...................................................................3
Procedures that are followed by digital forensic companies for investigating on crimes caused
through electronic emails.............................................................................................................4
Methods and tools that are used for Electronic emails by digital forensics company in UK......5
Methodology....................................................................................................................................7
Result and discussion.....................................................................................................................11
Conclusion.....................................................................................................................................14
REFERENCES..............................................................................................................................15
APPENDIX 1.................................................................................................................................17
APPENDIX 2.................................................................................................................................23
Questionnaire from Forensic Experts........................................................................................23
Document Page
INTRODUCTION
With time there are different type of changes that has taken place with regard to
technology. There are many firms that have come up so that people can be protected from any
type of crime. With advancement in technology, it has also given raise to crime with the help of
different type of electronic sources (Casey, 2011). In order to be better, firms make frequent
changes in their services and the type of technologies that are being used. Present research is
focused on forensic investigation in which analysis and gathering for the crime that are related
with physical evidence. This is done so that appropriate conclusion is determined through which
the suspect can be found. There are different areas in which the investigators will look, it
includes fingerprints, hard drives, residue, computer or any other type of electronic technologies
that are found at the crime scene. There are various type of tools that are used so that clues can
be found out and the suspect can be caught (Chung, Park and Kang, 2012). There are forensic
scientists who collect analyse and preserve the evidence that are found during the investigation
and are some of the scientists who travel to crime scenes and collect evidence themselves. Both
civil and criminal cases are testified and they have the privilege to work defence or prosecution.
When taking about ancient world, the rate of standardized forensic practices. Confessions took
place so as to make the crimes done by people and they were punished (Nelson, Phillips and
Steuart, 2014). However, with changes in time, there are many experts who aim at understanding
the case and focus on findings out clues that can help to catch the suspect.
In the year 1248, there was first account of making use of entomology and medicine were
used so as to criminal cases. Later on there are many different type of advancement in
technology that formed many organization that work towards solving cases so that true person
involved can be punished as their part in the crime (Hoog, 2011). Many different form of crime
take place and these areas are studied by different departments in forensic team. The present
research is focused conducting the research. People made use of tools that are helpful enough to
connect with other so that they are able to convey information. In this context, Email has become
a primary sources or means for connecting with others. Further, these are considered to be the
easy source of forged. Many crimes has been reported that are done with the help of emails. In
business world, firms have develop their own email addresses so that they are able to track down
that interactions that are taken place between employees (Bryman and Bell, 2015). Further, there
are other emails like Yahoo, gmail, etc. in which there are many crimes that take place and it
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
requires to have forensic team that can identify the crime that has taken place. To carry out the
research in effective manner below given are the aim objectives:
Aim:
To investigate over recent method, procedures and tools used for Electronic emails by digital
forensics company in UK.
Objectives:
To identify the crime that take place through electronic emails.
To determine the procedures that are followed by digital forensic companies for
investigating on crimes caused through electronic emails.
To understand the methods and tools that are used for Electronic emails by digital
forensics company in UK.
To recommend way to reduce the rate of crime that take place through Electronic emails
at UK.
Background
Electronic emails can be determined as sources that are used by people to connect with
others. All the crime that are performed by this sources fall under computer related crime or
cyber-crime. As per cybercrimes, it can be defined as type of offences which are undertaken
against groups or individuals who have criminal motive due to which people get affected
negatively. People in this modern world, aim at gaining money by any means (Garfinkel, 2010).
For this process, it take different type of strategies so that people can be manipulated and tricked
to get money. Further, there are cases in which the link that are send by the criminals which
when clicked, then their private information gets leaked. The fraud for email is the intentional
deception that are made by a person to damage others or for personal gain. When the rate of
email users increased, then it became means of defraud people. Further, this can also be taken as
a form of scam or con game (Salehi and Alipour, 2010). Further, there are different forms of
strategies that are applied by people in which they get to earn money. In this context, below
given are the some of the forms of crime that are conducted through emails:
Spoofing: This is a type of process in which a person will pretend to be someone else,
then it is known to be spoofing. As per Oliveira and Martins, (2011) there are number of ways
through which spoofing take place. Among all these one of the common one is when actual
2
Document Page
sender’s origin of the message and the name are masked or concealed from the recipient. One of
the type of spoofing is as follows:
Phishing for data: There are some of the spoof that purport to be from existing companies
or from the firms that are already known to the victim (Rose, Hair and Clark, 2011). The main is
send in form that asks for information from client in which it includes bank details that has to be
confirmed. This also includes development of new account or sharing of password.
Bogus offers: This is a type of email solicitation is an attempted fraud in which interest
among people are developed by giving the offer of services or goods (Turvey, 2011). The prices
of the product or services are reduced or there are additional gifts that are given which enables to
develop interest among people.
Request for help: In this type of email fraud, there are emotional mails are send in which
the reader develops sympathy. People tent to send these people money. For example, people will
ask money for operation in order to cure cancer, etc. When there are emotional touch included,
then it make clients to send some money so that they can overcome their problems.
Where criminal activities that take place, then helps is taken from digital forensic
companies so that they will be able to help to get back the money or to punish the person behind
all these activities (Men and Tsai, 2012).
The crime that take place through electronic emails.
According to Wirtz, Schilke and Ullrich, (2010), online fraud and criminal activities are
spreading like viral and interrupting the stability of societies across the globe. The online frauds
are classified among internet banking mobile banking, emails, cyber attack etc. the most
increasing criminal activities are via emails which need to secured as the fraud in leading to
mislead of confidential information (See-To and Ho, 2014). Further, it is turning important to
spread awareness among society about emails which will help them to never respond to requests
for personal details. Some email frauds/scams are extremely convincing which promotes the
internet criminal activities. Moreover, the hacking activities are increasing because it is quite
easy access over information when the individual have cheat codes to break the passwords
(Siponen, Pahnila and Mahmood, 2010). Besides, almost every person uses Microsoft software
which is open to abuse and this the reason that the criminals have developed hacking a program
called “The Backdoor” which enables them access over all Microsoft systems. According to
Scholar, organisational systems are difficult to hack because the management protect the
3
Document Page
information and data by establishing security measures. However, in contrary Margaryan,
Littlejohn and Vojt, (2011), as stated that crime that take place through electronic emails is the
situation of ethical dilemma because there are various motives of accessing over others
information. For instance, when some expertise and legal person access over confidential
information of other tan it defined under protection of individual wile when this is done by some
hack or illegal authority than it is considered under crime activities But the science of
confidential and personal information states that no one can access over the private email of
anyone (Trepte, Reinecke and Juechems, 2012). Apart from this there are various situations
under which it turns important for the person to go through emails of others like, unusual death,
suicide, major injury to someone because these days the justice system is advance and make use
of every advanced technology which can provide easy access personal information to track the
record and data of criminal activities which can be protected. In contrast, the crime through
email is increasing and the people are not even aware about this and therefore share their
personal details through email which leads to misleading and misinterpretation of personal
information (Gloe and Böhme, 2010). For instance, under this the information is accessed when
there is no clue of evidence to prove the crime than it becomes necessary for the individual to
check ones emails. The email criminal activities are increasing by sending information on the
name of some fake company and fake character in which the victim is asked share about his or
her information as according to their tactics the individual is some price winner which motivates
the society and there are people who share their confidential information like, name, personal
number, bank details by which the criminal succeed in its crime (Hargittai, 2010).
Procedures that are followed by digital forensic companies for investigating on crimes caused
through electronic emails.
Apart from this, there is specific procedure followed by digital forensic companies for
investigating on crimes caused through electronic emails. Chung, Park and Kang, (2012), has
argued that there are various challenges faced individual to success over others email ids which
are, determining whether law enforcement is needed in the process of investigation. Further, the
legal individual is liable to obtain written permission to conduct the forensic investigation for the
specific incident. Then the individual need to discuss the investigation process with the legal
advisors to analyse and evaluate the potential issues (Nelson, Phillips and Steuart, 2014). Lastly
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the person is bound to ensuring that the information of clients is safe and confidential and limited
to the process. Computer Forensics is a developing field and but there is standardization and
relevancy in the justice system and electronic industry”. In addition to this every forensic model
is based on specific area of investigation like, law enforcement or analysing electronic evidence.
In contrast, according to Bryman and Bell, (2015), there is no single digital forensic investigation
model which has been universally accepted by any legal authorities but have been accepted and
implemented under digital forensic model framework which provides flexibility in collecting
evidence and analysing incident.
In accordance to the model, it as been determined that The “Preserve and Document
Evidence” arrow indicates the perseverance and documentation of all collected evidences from
investigation. The evidence will only be opened by the judge to make progress and process of
criminal activities (Casey, 2011Chung, Park and Kang, 2012). The process of investigation
involves, Gathering of easily available information by analysing the information and site of
incident, evaluating the influence of the investigation on the business or victim which can be,
loss of revenue, and loss of confidential information. Further, the model aims at collection of
information of the networks and devices which were involved in the case like, router, switches,
hub, computers, servers, network diagram and firewall (Nelson, Phillips and Steuart, 2014).
Moreover, the system aims at identifying the external storage devices such as pen drive, flash
drive, external hard disk, memory cards which can be a strong evidence to prove the and identify
the root cause of incident. The system will further evaluate the forensic tools which can assist the
investigation process. The forensic team also captures live network traffic in case there is a
suspicious activity found during investigation (Bryman and Bell, 2015). Lastly, the system make
appropriate record and Documentation of all the activities and information gathered during the
investigation which can assist the court to verify the actions. In accordance, Salehi and Alipour,
(2010) digital forensics company in UK it is important for the organisation to work under
defined procedure of investigation in order to gather appropriate information and evidence to
prove crime. Moreover, it is done to ensure safe practices over accessing someone personal and
confidential information.
Methods and tools that are used for Electronic emails by digital forensics company in UK.
Oliveira and Martins, (2011), has stated that implementing the use of methods and tools
of which are been used for Electronic emails by digital forensics company in UK, make the
5
Document Page
investigation process easier and helps the company in collecting appropriate evidence during the
process. There are various techniques which can assist the system like Email header analysis in
which the investigation is done in order to extract data of the email sender and also analyzing the
path or the place from where the email has been sent (Rose, Hair and Clark, 2011). Basically, the
metadata of emails is saved in the headers but sometimes the headers can be tampered in which
the motive of sender is to hide its identity. Besides, there is Bait Tactic in which the investigator
tracks the IP address of sender. In this, the mail is composed of http: “$lt;img src>” tag which is
sent to the mail address from which the mail has been received by the victim of the case. In this
when the criminal opens the mail the investigator is able to track the IP address which makes
further process of investigation easier (Men and Tsai, 2012). However, in contrary, as per the
views of Wirtz, Schilke and Ullrich, (2010), Extraction from Server is the best technique to
identify and evaluate the information of sender. Under this technique, Server inquiry becomes
accessible when the emails domicile on the sender and receiver ends have been tracked
permanently. In this the investigator analyses the record of server as it maintain a log of the sent
and received emails. Moreover, the logs provides the information of the source from which the
emails have been sent (See-To and Ho, 2014). Apart from this, Mail Examiner is an advanced
investigation tool which aims at supporting more than 20 email formats and around 750
MIME formats. The tool comprises advanced features like, In advance search for
keywords, connected analysis of emails, Peel tone analysis, and Live Exchange Mailbox
investigation. In contrary, Siponen, Pahnila and Mahmood, (2010) stated that the
Investigation of Network Source technique is used by investigator in case when server
logs fail to generate the appropriate information. Further, in this the Internet Service
Providers do not provide access to the server. The logs generated by network like, hubs,
routers, firewalls, etc. Provides adequate information about the domicile of the email.
Hence, there are various methods and tools which can be beneficial in investigating and
reporting the information regarding incident (Margaryan, Littlejohn and Vojt, 2011). The
purpose of a computer forensic examination is to recover data from computers seized as
evidence in criminal investigations. Experts use a systematic approach to examine
evidence that could be presented in court during proceedings. The involvement of
forensic experts needs to investigate incident on early stage as it is beneficial in properly
6
Document Page
collecting technical information, data and material to report the incident. Forensic
investigation system of UK, comprises efforts like, Collection through search and grasping of
digital evidence, and acquiring data, Examination of situation by applying techniques to
recognize and collect data, analyzing the data and resources evident the incident and reporting
the collected information (Trepte, Reinecke and Juechems, 2012). Henceforth, the forensics
process used by Forensic Company of UK comprises report writing in which Computer forensic
examiners prepares reports for the attorney to evaluate facts and evidence. Thus, evidence for
testimony plays a vital role in supporting the witness and evidence in the court.
Methodology
This is an important part of the research as it helps to conduct the research in effective
manner. There are different type of tools, methods or techniques that are included and these are
used so that with proper structure that data is collected and research is carried out. Below given
are the methodologies that are followed by the researcher:
Research philosophy: This can be determined to be the values, belief and assumptions
that are carried out the researcher for the topic (Mackey and Gass, 2015). There are mainly two
different type of research philosophies which are positivism and interpretivism. In accordance
with interpretivism, it can be stated that it reflects single fact that is followed by the numerous
facts. On the other hand, positivism is depend upon certain facts and figures that are related with
particular aspects (Taylor, Bogdan and DeVault, 2015). In accordance with the type of research
topic that is selected, the type of philosophy that is selected.
The research has made use of positivism as it enables to focus on the real facts and
figures that are important for the research. This way, it becomes helpful to develop in depth
understanding for the research topic in effective manner.
Research strategy: It is important for the research to determine appropriate way so that
the research can be carried out in effective manner (Flick, 2015). There are two different ways
that are helpful to conduct the research. In this context, it includes quantitative and qualitative
strategies. With this respect, qualitative is a type of research strategy that focus on theoretical
aspects and this is highly effective to develop in depth understanding for the research topic.
There are many research that are already conducted by other researchers on similar topic. The
data gathered from their part is effective to develop knowledge about the topic (Smith, 2015). On
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the other hand, quantitative research is a type of strategy in which statistical methods are applied
like standard deviation, regression, etc. This is helpful enough to present the relationship
between variables. Among these two research strategies, qualitative research is selected as it will
be help to focus on the develop in depth understanding for the methods, procedure and tools that
are applied to make proper investigation for emails by digital forensic companies. Further, it is
also important that proper outcome can be determined from the research conducted and with the
help of quantitative research, the investigator are able to provide appropriate outcome from the
research.
Research approach: This is an important aspect in research as it focus on the type of
pattern that are applied by the business to gather information (Cammarota and Fine, 2010). The
data that are provided can be presented two different ways. First one is from general to specific
and other one is specific to general. Both have their own set of importance and this is selected
based on the type of research that has to be conducted. There are two different type of research
approaches which are inductive and deductive approaches. Inductive approach is a type in which
the topic is generally explained and then specific topic are explained. In other there are
consideration made for the theoretical aspects that are helpful enough to raise understand for the
topic (Miller, Birch and Jessop, 2012). On the other hand, deductive approach focus on gathering
data that are specific and then generalized content is presented. In other words, more emphasis is
put on new theories and this is done by making proper evaluation of the aspects and facts.
Among these two the researcher has made use of inductive approach in which the
information is provided generally and then specific information is presented. This is approach is
selected as it enables to provided proper understanding of topic and then then particular to the
research can be focused.
Research design: This is determined to be the blue print in which step by step process is
presented. Further, it is the process in which the findings are presented of the information
gathered (Mackey and Gass, 2015). These are of three types which are exploratory, explanatory
and descriptive. Among these, descriptive is a type of research design that focus on describing
the characteristics of the population that are selected. Further, explanatory focus on the type of
issues that are faced and appropriate outcomes that are determined. This is mainly focused on the
aim and objectives that are set by the researcher. Lastly, exploratory is used to find out problems
or the issues that are not been discussed till know (Taylor, Bogdan and DeVault, 2015). Among
8
Document Page
all these, the researcher has made use of descriptive design is applied as it enables to focus on the
aim and objectives that are set. Main reason for selecting this design is that, it enables to present
the main issues that are faced by the forensic companies to find out the people who perform
criminal activities through electronic email. Characteristics of the population is analysed as it
enables to focus on developing in depth understanding.
Data Collection: This is the ways through which information is gathered in accordance
with the research topic. There are different type of methods that can be applied so that the
adequate data can be gathered (Flick, 2015). In this context, it includes primary and secondary
method. Both are highly effective in order to provide relevant information. Primary method is the
data that are collected for the first time. There are different type of tools that are available which
are interview questionnaire, observation and focus groups. On the other hand, secondary
methods are those data that are already gathered by some other researchers. Tools that are helpful
to collect these type of information includes books, journals, online sources, etc. Among these
two, the researcher has made use of both these methods that is primary and secondary. More
specifically, to gather primary information the investigator has made use of interview (Smith,
2015). On the other hand, to gather secondary information, books, journals, online sources, etc.
are used. There are open ended questions that are asked by the researcher in which all the
objectives are covered. Through this methods, the data that is required to carry out the research is
collected through primary and secondary methods.
Sampling: It is not possible for the researcher to focus on the population that can provide
adequate data as per the research topic. In this context, it is important that particular population is
selected who can support for carrying out the research (Cammarota and Fine, 2010). There are
two different method of sampling which are probabilistic and non probabilistic sampling
methods. Probabilistic is a type of sampling method in which the research randomly select from
the population all the sample in from the population have equal chance of being selected. On the
other hand, non probabilistic is a type of method in which the researcher ha proper understanding
of the samples that has to be selected. The investigator will chose from the population as per
his/her preferences. Among these two, the researcher has made use of probabilistic sampling
method. This is selected as the research focus on the overall organization that provide services
related with forensics (Miller, Birch and Jessop, 2012). In this context, probabilistic sampling is
selected from the large population. Further, it can be stated that the researcher has conducted
9
Document Page
interview from 5 of the Forensic exports as they have proper understanding and they are
supportive to provide information about the methods, procedure and the tools that are applied by
digital forensic companies at the time of any crime.
Data analysis: When information is gathered, then it required to have proper analysis
made. This is important as it enables to come up with appropriate outcome so that the rate of
understanding can be enhanced (Mackey and Gass, 2015). The data is gathered with the help of
secondary and primary sources are effective enough to make sure that the data can be presented
in understandable manner. As it was discussed above, there are two methods that are helpful
enough to carry out the research. In this context, it includes quantitative and qualitative methods.
More specifically, the investigator can made use of qualitative method in which the tools used
are thematic. On the other form quantitative research, the researcher can make use of SPSS so
that the research can be presented in form of standard deviation or any other tests (Taylor,
Bogdan and DeVault, 2015). Among these two, the researcher has made use of qualitative
method in which the information gathered is presented in the form of thematic. In the present
research the investigator has made use of conducting interview from 5 of the respondents who
are Forensic experts. Questions are designed in such a way that the research aim and objectives
are covered. With the help of thematic, the research is presented in the form of tables, charts,
graphs, etc.
Ethical consideration: There are different type of ethical considerations that has to be
considered by the researcher. In this context, it includes information to be properly cited for the
data that are gathered from secondary information (Flick, 2015). There are information that are
used from secondary information. These data cannot be used as it is but, it requires to be writer
in own words. This is done so that the rate of risk related with plagiarism can be reduced.
Further, there are people who are involved to provide adequate information. It requires to make
sure that all the respondents are provided with appropriate data in which it includes that main
cause for which the information is gathered. When respondents are conveyed about the main
reason, then it became helpful to get appropriate information (Smith, 2015). Further, there is a
proper system that is used so that the personal information that are provided by the respondents
are not being mis used. Further the person who is authorised is inly allowed to access the
personal information. Moreover, the personal information will be destroyed when the use for the
data gathered is over.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research limitations: There are different type of limitations that has to be considered by
the researcher. In this context, below given are the limitations that has covered by the researcher:
Limitation of aim and objectives: It is important that proper research to be conducted so
that the research can be carried out in effective manner (Cammarota and Fine, 2010). It becomes
limitation, when aim and objectives of the research is not properly framed.
Limitation of finance: There are different type of activities that has to be covered and
each of them it requires to have proper financial support so that these activities can be
completed. In this context, the researcher has to have proper planning so that within the finance
available activates are attained.
Limitation of time: All the activities need to be completed with the time that the
researcher has. It is important that proper planning is done so that he/she is able to manage time
in effective manner. It becomes a limitation with the plan is not properly made (Miller, Birch and
Jessop, 2012).
Limitation of connecting the respondents: There are different type of sources that are
available that are helpful to connect with the respondents. It is important that proper steps are
taken so that all the respondents who are selected are provided appropriate information in
relation with the topic.
Result and discussion
The research is carried out with the help of 5 respondents who are Forensic exports. In
this context, there are open ended questions that are developed and these are helpful to generate
appropriate answers in relation with the topic. Fellow give are the findings and discussion that
are made from these respondents:
Theme 1: Rate of crime is increasing with electric emails
Description: From the interview conducted from 5 of the respondents, it is found that
with time there are many changes that has taken place. In this, people have found out different
way through which innocent people can be fooled. Other respondents say that there are different
form of criminal acts that are undertaken on email in which identity other persons are used so
that fraud can be done. However, the respondents in overall state that the issues or the crime
related with the email has increased. There are many new cases of fraud that has been identified
in UK. It is important for the people to develop their understanding for the various type of ways
11
Document Page
that are performed by individuals so that they are able to harm or get money from innocent
people. From the response given by a forensic export, one of the strategy applied by people are
by making use of top companies in which luck draws are conducted and viewer is asked to
deposit certain amount of money so as to get the winning price.
Theme 2: The tools that are important to be considered for electronic emails
Description: From the response given by the export, it can be stated that there are
different type of tools that are used by digital forensic companies so that they are able to conduct
the investigation. As per an expert, firms made use of Bait tactics in which the IP address of the
sender is tracked. This is a type of technique that is highly effective to find out the criminals as it
provides the address of the sender from where the mail was sent. Another export stated that
email header analysis done so that the information can be extracted from the sender’s mail. In
addition to this, it also help to determine the path through which email is transmitted. Further,
there are other tools like investigation of network sources that are helpful enough to generate the
information regarding the server logs when it fails. When the information provided do not have
any type of given access to the server, then it enables to opt the network sources.
Theme 3: Improvement in technology is a need for forensic companies
Description: There are many changes that has taken place in which hackers are able to
get personal information from people. Many systems are developed that are helpful enough for
the criminals in which forensic teams are not able to hack 5the criminals. In this context, it is
important to make sure that proper steps are taken in which technology are updated or new
system is installed so that the rate of criminal activities can be reduced. Forensic firms has to
make use of highly advanced technology so that they are able to track out criminals and to
protect innocent people from getting in to situations of fraud. Over all, it can be stated that there
are many changes that has taken place in relation with technology so that forensic team is able to
find out the criminals. From the response from one of the experts, the forensic team has to be
much more advanced than the technology that are used by criminals. This can only be helpful
enough to provide safety to public.
Theme 4: Most effective method that are helpful to investigate electronic emails
12
Document Page
Description: The companies make use of different type of methods that are helpful
enough to find the criminals who make use of emails. In this context, it includes the server
investigation when the emails residing by the receiver and sender have purged permanently.
There are various type of logs that are maintained from the side of senders and receivers. These
logs are highly effective to provide appropriate findings and to determine the suspects who are
involved. From the interview conducted, it was found that IP address is traced so that the
position of the sender can be identified. This is done so that people who may be affected with the
criminal activity performed can be caught and put behind bars. Overall it can be stated that the
experts have diverse set of perception for the methods that are applied. The type of methods that
are applied depends upon the situations or the type of crime that has taken place.
Theme 5: The appropriate procedure that is followed by forensic companies for
investigating electronic emails
Description: From the response gathered from the interview, it is found that there are
different type of procedure that are followed. However, there are some set of common
procedures that are followed so that the criminals can be caught. First of all, it is important that
proper analysis is made of the situation so that the condition can be identified. Then it includes
analysis made of the losses of the type of harm that is faced. Then, analysis is made to know the
type of electronic tool is used or the type of strategy that is are applied by the criminals to harm
the innocent people. Further, there are different ways are analysed so that the most appropriate
strategy can be applied in effective manner. Moreover, data is gathered in which the interaction
or the relation with the sender is determined. When all the evidence and the situation is properly
analysed, then based on the evidence the criminal is caught.
Theme 6: The procedure, method and tools applied effective enough to identify the
criminals
Description: The methods, procedure and the tools that are applied are effective enough
to make sure that proper analysis is made so that the rate of performance can be made. From the
response given by the exports, it can be stated that all these depend on the type of crime that has
taken place. There are some of the condition in which the forensic team are not able to trace
down the criminal. This is because of the advanced technology that are used by the people. There
13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
are system in which the IP address gets changed on every search that are made. In such type of
condition, it becomes difficult for the team to track the person. However, the type of procedure,
method and the tools are highly effective as the team has understand the techniques that are
applied and so that it has become favourable to find out the person who are behind the crime.
Theme 7: The main causes due to which people face fraud type situation
Description: From the interview conducted, it is identified that there are many reasons
due to which people face situations related with fraud. One of the main reason identified with
lack of understanding or knowledge that people have towards the crime that take place with the
help of criminals take advantage of that. In this context, it requires to have proper knowledge can
be conveyed so that they will be able to eliminate the issues or the problems that are faced by
people. Another type of response given by an expert state that people are get in stuck of such
situation due to emotional conditions. There are many criminals who convey that they there are
some kind of health issues for which they need to have money. These are the condition due to
which innocent people get in problems there are harm faced by them.
Conclusion
From the research conducted, it can be stated that the rate of crime is increasing
drastically. It is important to make sure that proper consideration is made by the forensic firms in
which they update their technology frequently and the members are provided with proper
training so that they will be able to make use of the tools in effective manner. Further, it required
to have information to be spread to people regarding the criminal activities that are taking place.
This is important to be considered so that the rate of crime that has increased can be reduced.
Further, it also identified that proper security should be maintained in which strong password is
formed. This is highly effective to reduce the rate of crime as it is difficult to hack the system
where is strong password made. Further, there are different type of methods that are applied by
the forensic companies. Among all these bait tactics is highly effective as it enables to determine
the IP address of the sender and this becomes helpful to track out the criminal. In addition to this,
the rate of crime can be reduced when there are proper awareness among the people so that they
will be able to help people from criminal activities.
14
Document Page
REFERENCES
Books and Journals
Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press, USA.
Cammarota, J. and Fine, M. eds., 2010. Revolutionizing education: Youth participatory action
research in motion. Routledge.
Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the
internet. Academic press.
Chung, H., Park, J. and Kang, C., 2012. Digital forensic investigation of cloud storage
services. Digital investigation, 9(2), pp.81-95.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Garfinkel, S. L., 2010. Digital forensics research: The next 10 years. digital investigation, 7,
pp.S64-S73.
Gloe, T. and Böhme, R., 2010. The dresden image database for benchmarking digital image
forensics. Journal of Digital Forensic Practice, 3(2-4), pp.150-159.
Hargittai, E., 2010. Digital na (t) ives? Variation in internet skills and uses among members of
the “net generation”. Sociological inquiry, 80(1), pp.92-113.
Hoog, A., 2011. Android forensics: investigation, analysis and mobile security for Google
Android. Elsevier.
Mackey, A. and Gass, S. M., 2015. Second language research: Methodology and design.
Routledge.
Margaryan, A., Littlejohn, A. and Vojt, G., 2011. Are digital natives a myth or reality?
University students’ use of digital technologies. Computers & education, 56(2), pp.429-
440.
Men, L. R. and Tsai, W. H. S., 2012. How companies cultivate relationships with publics on
social network sites: Evidence from China and the United States. Public Relations
Review, 38(5), pp.723-730.
Miller, T., Birch, M. and Jessop, J. eds., 2012. Ethics in qualitative research. Sage.
Nelson, B., Phillips, A. and Steuart, C., 2014. Guide to computer forensics and investigations.
Cengage Learning.
15
Document Page
Oliveira, T. and Martins, M. F., 2011. Literature review of information technology adoption
models at firm level. The electronic journal information systems evaluation, 14(1),
pp.110-121.
Rose, S., Hair, N. and Clark, M., 2011. Online customer experience: A review of the businessto
consumer online purchase context. International Journal of Management Reviews, 13(1),
pp.24-39.
Salehi, M. and Alipour, M., 2010. E-banking in emerging economy: empirical evidence of
Iran. International Journal of Economics and Finance, 2(1), p.201.
See-To, E. W. and Ho, K. K., 2014. Value co-creation and purchase intention in social network
sites: The role of electronic Word-of-Mouth and trust–A theoretical analysis. Computers
in Human Behavior, 31, pp.182-189.
Siponen, M., Pahnila, S. and Mahmood, M. A., 2010. Compliance with information security
policies: An empirical investigation. Computer, 43(2).
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
Taylor, S. J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A
guidebook and resource. John Wiley & Sons.
Trepte, S., Reinecke, L. and Juechems, K., 2012. The social side of gaming: How playing online
computer games creates online and offline social support. Computers in Human
Behavior, 28(3), pp.832-839.
Turvey, B. E., 2011. Criminal profiling: An introduction to behavioral evidence analysis.
Academic press.
Wirtz, B. W., Schilke, O. and Ullrich, S., 2010. Strategic development of business models:
implications of the Web 2.0 for creating value on the internet. Long range
planning, 43(2), pp.272-290.
16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
APPENDIX 1
17
Document Page
18
Document Page
19
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
20
Document Page
21
Document Page
22
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
APPENDIX 2
Questionnaire from Forensic Experts
1. Do you think that rate of crime is increasing with electric emails?
2. What are the tools that are important to be considered for electronic emails?
3. Do you think improvement in technology is a need for forensic companies?
4. What are most effective method that are helpful to investigate electronic emails?
5. What are the appropriate procedure that is followed by forensic companies for investigating
electronic emails?
6. Are the procedure, method and tools applied effective enough to identify the criminals?
7. What are the main causes due to which people face fraud type situation?
23
chevron_up_icon
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]