Modeling Cyber Crimes and Investigations for Digital Forensics Education
Cover - CISSE Volume 4, Issue 1
PDF

Keywords

Education
Digital Forensics
Classification

How to Cite

Modeling Cyber Crimes and Investigations for Digital Forensics Education. (2016). Journal of The Colloquium for Information Systems Security Education, 4(1), 23. https://journal.cisse.info/jcisse/article/view/54

Abstract

Current network forensics education lacks a systematic view of how real-world cybercrimes are committed and how real-world cases are investigated. In this paper, we fill these gaps. We explicitly define three basic crime strategies as computer assisted strategy, computer focused strategy and non-cyber strategy (traditional crime strategy) and model a real world cyber crime case as a sequence of crimes using these three basic crime strategies. We explicitly define two basic investigation strategies as computerized techniques and traditional operations. These models allow satisfactory explanation of a case that may involve a number of basic types of crimes and investigations. We have also built a real-world case database system for digital forensics education. Our preliminary survey confirms the usefulness of these models and case database system helping students understand cyber crimes and investigations.

PDF

Open Access License Notice:

This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.