1
|
Almazrouei MA, Kukucka J, Morgan RM, Levy I. Unpacking workplace stress and forensic expert decision-making: From theory to practice. Forensic Sci Int Synerg 2024; 8:100473. [PMID: 38737991 PMCID: PMC11087230 DOI: 10.1016/j.fsisyn.2024.100473] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/14/2024] [Revised: 04/18/2024] [Accepted: 04/18/2024] [Indexed: 05/14/2024]
Abstract
Workplace stress can affect forensic experts' job satisfaction and performance, which holds financial and other implications for forensic service providers. Therefore, it is important to understand and manage workplace stress, but that is not simple or straightforward. This paper explores stress as a human factor that influences forensic expert decision-making. First, we identify and highlight three factors that mitigate decisions under stress conditions: nature of decision, individual differences, and context of decision. Second, we situate workplace stress in forensic science within the Challenge-Hindrance Stressor Framework. We argue that stressors in forensic science workplaces can have a positive or a negative impact, depending on the type, level, and context of stress. Developing an understanding of the stressors, their sources, and their possible impact can help forensic service providers and researchers to implement context-specific interventions to manage stress at work and optimize expert performance.
Collapse
Affiliation(s)
- Mohammed A. Almazrouei
- Center for Neurocognition and Behavior, Wu Tsai Institute, Yale University, New Haven, CT, USA
- Department of Comparative Medicine, Yale University, New Haven, CT, USA
| | - Jeff Kukucka
- Department of Psychology, Towson University, Towson, MD, USA
| | - Ruth M. Morgan
- Centre for the Forensic Sciences, University College London, London, UK
- Department of Security and Crime Science, University College London, London, UK
| | - Ifat Levy
- Center for Neurocognition and Behavior, Wu Tsai Institute, Yale University, New Haven, CT, USA
- Department of Comparative Medicine, Yale University, New Haven, CT, USA
| |
Collapse
|
2
|
Horsman G. Digital evidence strategies for digital forensic science examinations. Sci Justice 2023; 63:116-126. [PMID: 36631176 DOI: 10.1016/j.scijus.2022.11.004] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 07/15/2022] [Revised: 11/01/2022] [Accepted: 11/21/2022] [Indexed: 11/26/2022]
Abstract
Given the size and complexity of many digital forensic science device examinations, there is a need for practitioners to formally and strategically determine a course of conduct which allows them to undertake the most robust and efficient examination possible. This work outlines both the need for practitioners to have a digital evidence strategy (DES) when tackling any given examination scenario, how to construct one and the concerns which exist when no formal DES is in place. Approaches to DES development are examined and the context to which they should be deployed are analysed, with focus being on the use of DESs at the examination/processing stage of the investigative workflow. Finally, a 'DES skeleton' is offered to guide practitioners as they seek to create their own DES.
Collapse
Affiliation(s)
- Graeme Horsman
- Cranfield University, College Rd, Cranfield, Wharley End, Bedford MK43 0AL, United Kingdom.
| |
Collapse
|
3
|
Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques. KUNSTLICHE INTELLIGENZ 2022. [DOI: 10.1007/s13218-022-00763-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Abstract
AbstractThe impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex digital forensics investigative problems. Forensics analysis can make use of machine learning models’ pattern detection and recognition capabilities to uncover hidden evidence in digital artifacts that would have been missed if conducted manually. Numerous works have proposed ways for applying AI to digital forensics; nevertheless, scepticism regarding the opacity of AI has impeded the domain’s adequate formalization and standardization. We present three critical instruments necessary for the development of sound machine-driven digital forensics methodologies in this paper. We cover various methods for evaluating, standardizing, and optimizing techniques applicable to artificial intelligence models used in digital forensics. Additionally, we describe several applications of these instruments in digital forensics, emphasizing their strengths and weaknesses that may be critical to the methods’ admissibility in a judicial process.
Collapse
|
4
|
Horsman G. Considering ‘technically possible’ alternative meanings for data traces found during a digital forensic examination. AUST J FORENSIC SCI 2022. [DOI: 10.1080/00450618.2022.2071988] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Affiliation(s)
- Graeme Horsman
- School of Computing, Engineering & Digital Technologies, Teesside University, Middlesbrough, UK
| |
Collapse
|
5
|
|
6
|
Horsman G. An "order of data acquisition" for digital forensic investigations. J Forensic Sci 2022; 67:1215-1220. [PMID: 34997585 DOI: 10.1111/1556-4029.14979] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/21/2021] [Revised: 11/23/2021] [Accepted: 12/14/2021] [Indexed: 11/30/2022]
Abstract
Data acquisition is a fundamental stage of the digital forensic workflow, where without it, it may not be possible to conduct many criminal inquiries effectively. While any investigative team may want access to all digital data available, it is no longer an approach that is considered justifiable or proportionate in all cases. There is now an increasing narrative highlighting the invasiveness of digital data acquisition processes and their impact upon privacy, with calls to ensure greater scrutiny is placed upon their use. This work proposes the "Order of Data Acquisition" which defines 10 digital data acquisition methods that are available to practitioners as a part of a forensic examination, derived from a review of existing literature and best practice acquisition approaches, and arranged by their "invasiveness." Each method is discussed with examples provided in order to clarify and formalize the process of determining a suitable acquisition method in every case while acknowledging privacy invasion concerns. Finally, conclusions are drawn.
Collapse
|
7
|
Unboxing the digital forensic investigation process. Sci Justice 2022; 62:171-180. [DOI: 10.1016/j.scijus.2022.01.002] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 07/15/2021] [Revised: 11/27/2021] [Accepted: 01/16/2022] [Indexed: 11/18/2022]
|
8
|
Jaquet-Chiffelle DO, Casey E. A formalized model of the Trace. Forensic Sci Int 2021; 327:110941. [PMID: 34543782 DOI: 10.1016/j.forsciint.2021.110941] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/25/2020] [Revised: 08/05/2021] [Accepted: 08/06/2021] [Indexed: 11/19/2022]
Abstract
This work proposes a formalized model, grounded in forensic science, to support a unified understanding of the Trace across scientific disciplines. The model is precisely defined in mathematical terms that reflect the dynamics of an offense as expressed in Locard's Exchange principle. Specifically, this mathematical approach represents the Trace as the modification of a Scene, subsequently perceptible, resulting from the Event under investigation. Examples are provided to illustrate how this conceptualization applies to forensic science, including DNA and digital evidence. Broader implications of this model are presented in the context of COVID-19, emphasizing the value of cohesive scientific study of the Trace. The aim of this work is to stimulate more formalized study of the Trace, both from tangible and abstract perspectives, and to strengthen forensic science as a whole.
Collapse
Affiliation(s)
| | - Eoghan Casey
- University of Lausanne, Batochime, Lausanne, Switzerland
| |
Collapse
|
9
|
PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations. Sci Justice 2021; 61:477-492. [PMID: 34482928 DOI: 10.1016/j.scijus.2021.06.003] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 02/19/2021] [Revised: 04/26/2021] [Accepted: 06/06/2021] [Indexed: 11/20/2022]
Abstract
Software invisibly permeates our everyday lives: operating devices in our physical world (traffic lights and cars), effecting our business transactions and powering the vast World Wide Web. We have come to rely on such software to work correctly and efficiently. The generally accepted narrative is that any software errors that do occur can be traced back to a human operator's mistakes. Software engineers know that this is merely a comforting illusion. Software sometimes has bugs, which might lead to erratic performance: intermittently generating errors. The software, hardware and communication infrastructure can all introduce errors, which are often challenging to isolate and correct. Anomalies that manifest are certainly not always due to an operator's actions. When the general public and the courts believe the opposite, that errors are usually attributable to some human operator's actions, it is entirely possible for some hapless innocent individual to be blamed for anomalies and discrepancies whose actual source is a software malfunction. This is what occurred in the Post Office Horizon IT case, where unquestioning belief in the veracity of software-generated evidence led to a decade of wrongful convictions. We will use this case as a vehicle to demonstrate the way biases can influence investigations, and to inform the development of a framework to guide and inform objective digital forensics investigations. This framework, if used, could go some way towards neutralising biases and preventing similar miscarriages of justice in the future.
Collapse
|
10
|
Sunde N. What does a digital forensics opinion look like? A comparative study of digital forensics and forensic science reporting practices. Sci Justice 2021; 61:586-596. [PMID: 34482939 DOI: 10.1016/j.scijus.2021.06.010] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 01/13/2021] [Revised: 06/15/2021] [Accepted: 06/28/2021] [Indexed: 10/21/2022]
Abstract
This study explores digital forensics (DF) reporting practices and compares the results with other forensic science disciplines. Forty reports were obtained from a quasi-experiment involving DF examiners, and a quantitative content analysis was performed to determine which conclusion types they applied and which content they included with relevance to the credibility of the reported results. A qualitative analysis was performed to examine the certainty expressions used in the conclusions. The results were compared to a study of eight forensic science disciplines performed by Bali et al. [24,26]. The results show that the DF examiners tend to present their conclusions either as Categorical conclusion or Strength of support (SoS) conclusion types and that they address source, activity, and offence level issues in their conclusions. The content analysis indicates deficiencies in DF reporting practices, and several of the challenges seem to be shared with other FS disciplines. The analysis of certainty expressions showed that a plethora of expressions was used, and that they lacked reference to an established framework. The results indicate that more research on DF evaluation and reporting practices is necessary and justifies a need for enhanced focus on quality control and peer review within the DF discipline.
Collapse
Affiliation(s)
- Nina Sunde
- Norwegian Police University College, Postboks 2109 Vika, 0125 Oslo, Norway.
| |
Collapse
|
11
|
|
12
|
Introduction of the ARDS—Anti-Ransomware Defense System Model—Based on the Systematic Review of Worldwide Ransomware Attacks. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11136070] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
We live in a world of digital information communication and digital data storage. Following the development of technology, demands from the user side also pose serious challenges for developers, both in the field of hardware and software development. However, the increasing penetration of the Internet, IoT and digital solutions that have become available in almost every segment of life, carries risks as well as benefits. In this study, the authors present the phenomenon of ransomware attacks that appear on a daily basis, which endangers the operation and security of the digital sphere of both small and large enterprises and individuals. An overview of ransomware attacks, the tendency and characteristics of the attacks, which have caused serious financial loss and other damages to the victims, are presented. This manuscript also provides a brief overview of protection against ransomware attacks and the software and hardware options that enhance general user security and their effectiveness as standalone applications. The authors present the results of the study, which aimed to explore how the available software and hardware devices can implement digital user security. Based on the results of the research, the authors propose a complex system that can be used to increase the efficiency of network protection and OS protection tools already available to improve network security, and to detect ransomware attacks early. As a result, the model of the proposed protection system is presented, and it can be stated that the complex system should be able to detect ransomware attacks from either the Internet or the internal network at an early stage, mitigate malicious processes and maintain data in recoverable state.
Collapse
|
13
|
Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102237] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
14
|
Duran G, Michael GA. French gendarmes' ability to make inferences while listening to witnesses: Implicit and interfering information curbs their comprehension. APPLIED COGNITIVE PSYCHOLOGY 2021. [DOI: 10.1002/acp.3807] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Affiliation(s)
- Geoffrey Duran
- Department of Cognitive Psychology, Cognitive Science & Neuropsychology, Laboratoire d'Etude des Mécanismes Cognitifs (EA 3082) Université de Lyon, Université Lumière Lyon 2 Lyon France
| | - George A. Michael
- Department of Cognitive Psychology, Cognitive Science & Neuropsychology, Laboratoire d'Etude des Mécanismes Cognitifs (EA 3082) Université de Lyon, Université Lumière Lyon 2 Lyon France
| |
Collapse
|
15
|
Reedy P. Interpol review of digital evidence 2016 - 2019. Forensic Sci Int Synerg 2021; 2:489-520. [PMID: 33385144 PMCID: PMC7770434 DOI: 10.1016/j.fsisyn.2020.01.015] [Citation(s) in RCA: 17] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/06/2020] [Accepted: 01/16/2020] [Indexed: 11/17/2022]
Abstract
This review paper covers the forensic-relevant literature in digital evidence from 2016 to 2019 as a part of the 19th Interpol International Forensic Science Managers Symposium. The review papers are also available at the Interpol website at: https://www.interpol.int/content/download/14458/file/Interpol Review Papers 2019.pdf
Collapse
|
16
|
Graeme H. Part 1:- quality assurance mechanisms for digital forensic investigations: Introducing the Verification of Digital Evidence (VODE) framework. FORENSIC SCIENCE INTERNATIONAL: REPORTS 2020. [DOI: 10.1016/j.fsir.2019.100038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022] Open
|
17
|
Bartliff Z, Kim Y, Hopfgartner F, Baxter G. Leveraging digital forensics and data exploration to understand the creative work of a filmmaker: A case study of Stephen Dwoskin's digital archive. Inf Process Manag 2020. [DOI: 10.1016/j.ipm.2020.102339] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|