Digital forensic readiness: Expert perspectives on a theoretical framework

Computers & Security - Tập 52 - Trang 70-89 - 2015
Mohamed Elyas1, Atif Ahmad1, Sean B. Maynard1, Andrew Lonie2
1Department of Computing and Information Systems, Melbourne School of Engineering, University of Melbourne, Victoria, Australia
2Victorian Life Sciences Institute (VLSI), University of Melbourne, Victoria, Australia

Tài liệu tham khảo

Ahmad, 2012, Incident response teams – challenges in supporting the organizational security function, Comput Secur, 31, 643, 10.1016/j.cose.2012.04.001 Ahmad, 2014, Information security strategies: towards an organizational multi-strategy perspective, J Intel Manuf, 25, 357, 10.1007/s10845-012-0683-0 AIC, 2009 Beebe, 2009, Digital forensic research: the good, the bad, and the unaddressed, 17 Beecham, 2005, Using an expert panel to validate a requirements process improvement model, J Syst Softw, 76, 251, 10.1016/j.jss.2004.06.004 Belanger, 2012, Theorizing in information systems research using focus groups, Australas J Inf Syst, 109 Biggs, 2009 Carrier, 2003, Getting physical with the digital investigation process, Int J Digital Evid, 2, 1 Casey, 2005, Case study: network intrusion investigation - lessons in forensic preparation, Digit Investig, 254, 10.1016/j.diin.2005.11.007 Elo, 2008, The qualitative content analysis process, J Adv Nurs, 107, 10.1111/j.1365-2648.2007.04569.x Elyas, 2014, Forensic readiness: is your organisation ready?, Digit Forensic Mag, 58 Grobler, 2007 Grobler, 2010 Kitzinger, 1995, Qualitative research: introducing focus groups, BMJ, 299, 10.1136/bmj.311.7000.299 Krueger, 2001, Designing and conducting focus group interviews, Soc Analysis Sel Tools Tech, 4 Lim, 2010, Embedding information security culture: emerging concerns and challenges Marcella, 2008, Electronically stored information and cyberforensics, Information Syst Control J, 44 Morgan, 1996, Focus groups, Annu Rev Sociol, 129, 10.1146/annurev.soc.22.1.129 Mouhtaropoulos, 2014, Digital forensic readiness: are we there yet?, J Int Commer Law Technol, 9, 173 Okoli, 2010, 1 Pangalos, 2010, Information assurance and forensic readiness, e-Democracy, 181 Poeppelbuss, 2011, Maturity models in information systems research: literature search and analysis, Commun Assoc Inf Syst, 29, 505 Reyes, 2007, 83 Rowlingson, 2004, A ten step process for forensic readiness, Int J Digital Evid, 2 Shedden, 2010, Organisational learning and incident response: promoting effective learning through the incident response process, 139 Shedden, 2010, Risk management standards – the perception of ease of use, J Inf Syst Secur, 6 Strauss, 1994, Grounded theory methodology, Handb Qual Res, 273 Tan, 2001, 1 Tan, 2003, Incident handling: where the need for planning is often not recognised Tan, 2010, Information security governance: when compliance becomes more important than security, 55 Taylor, 2010, Digital evidence in cloud computing systems, Comput Law Secur Rev, 26, 304, 10.1016/j.clsr.2010.03.002 Webb, 2014, A situation awareness model for information security risk management, Comput Secur, 44, 1, 10.1016/j.cose.2014.04.005 Wolfswinkel, 2011, Using grounded theory as a method for rigorously reviewing literature, Eur J Inf Syst, 22, 45, 10.1057/ejis.2011.51 Yasinsac, 2001