Commentary:- Can I use that tool?
dc.contributor.author | Horsman, Graeme | |
dc.date.accessioned | 2024-12-13T11:07:11Z | |
dc.date.available | 2024-12-13T11:07:11Z | |
dc.date.freetoread | 2024-12-13 | |
dc.date.issued | 2024-12-01 | |
dc.date.pubOnline | 2024-11-17 | |
dc.description.abstract | The decision as to whether a given tool can be used for the purposes of conducting a digital forensic examination of a device and its data may seem straightforward, but it is not. As part of their work, practitioners must always seek to identify and use tools that are appropriate for their investigative tasks, deploy them reliably within an applicable scenario, and be able to trust and understand the results that they provide. Before they can begin to do this, they must first ask themselves the question - ‘can I use that tool?‘, where this work considers how a practitioner may begin to formulate an answer. By unpacking the hidden complexity of this question, it is suggested that five sub-questions must be explored by any practitioner when seeking to use a tool, namely - (1) ‘what does that tool do?‘; (2) ‘how do I use that tool?‘; (3) ‘how does the tool do it?‘; (4) ‘does the tool do it properly?’ and (5) ‘should I use the tool?‘. This work discusses each in turn and the risks they pose to a practitioner. | |
dc.description.journalName | Forensic Science International: Digital Investigation | |
dc.identifier.citation | Horsman G. (2024) Commentary:- Can I use that tool? Forensic Science International: Digital Investigation, Volume 51, December 2024, Article number 301843 | |
dc.identifier.eissn | 2666-2817 | |
dc.identifier.elementsID | 559321 | |
dc.identifier.issn | 2666-2817 | |
dc.identifier.paperNo | 301843 | |
dc.identifier.uri | https://doi.org/10.1016/j.fsidi.2024.301843 | |
dc.identifier.uri | https://dspace.lib.cranfield.ac.uk/handle/1826/23261 | |
dc.identifier.volumeNo | 51 | |
dc.language | English | |
dc.language.iso | en | |
dc.publisher | Elsevier | |
dc.publisher.uri | https://www.sciencedirect.com/science/article/pii/S2666281724001707?via%3Dihub | |
dc.rights | Attribution 4.0 International | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.subject | 35 Commerce, Management, Tourism and Services | |
dc.subject | 3503 Business Systems In Context | |
dc.subject | 46 Information and Computing Sciences | |
dc.subject | 4604 Cybersecurity and Privacy | |
dc.subject | 4609 Information Systems | |
dc.subject | Generic health relevance | |
dc.subject | Information Systems | |
dc.subject | 3503 Business systems in context | |
dc.subject | 4604 Cybersecurity and privacy | |
dc.subject | 4609 Information systems | |
dc.title | Commentary:- Can I use that tool? | |
dc.type | Article | |
dc.type.subtype | Review | |
dcterms.dateAccepted | 2024-11-08 |