New Approaches to the Application of Digital Forensics in Cybersecurity: A Proposal Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.5013/ijssst.a.21.02.36
The challenges faced by organizations in effectively carrying out digital forensic operations have been identified to include poor capacity and defective Information and Communications Technology (ICT) policies, resulting in organizational cluelessness when high profile cyberattacks occur. Organizational unpreparedness in the face of cyberattacks leads to negative impacts including operational disruption, financial loss, reputation damage and crippling litigations. Unfortunately, the sophistication of contemporary cyberattacks makes their investigations even more difficult except where a methodical approach for forensic data collection and analysis is adopted. This paper proposes the Randomized Cyberattack Simulation Model (RCSM) as a checklist for assessing corporate preparedness to digital forensics and as a systematic approach towards enshrining organizational incident response capabilities. The paper also proposes the Baseline Data Classification Model (BDCM) as a pre-forensic data categorization model. Prudent application of both models can potentially mitigate the impacts of cyberattacks on operational sustainability and organizational survivability across all sectors.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5013/ijssst.a.21.02.36
- OA Status
- green
- Cited By
- 5
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3033230457
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3033230457Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5013/ijssst.a.21.02.36Digital Object Identifier
- Title
-
New Approaches to the Application of Digital Forensics in Cybersecurity: A ProposalWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-03-25Full publication date if available
- Authors
-
Kenneth Okereafor, Rania DjehaicheList of authors in order
- Landing page
-
https://doi.org/10.5013/ijssst.a.21.02.36Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://figshare.com/articles/journal_contribution/New_Approaches_to_the_Application_of_Digital_Forensics_in_Cybersecurity_A_Proposal/12421172Direct OA link when available
- Concepts
-
Computer security, Digital forensics, Computer science, Computer forensicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
5Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1, 2022: 1, 2021: 1, 2016: 1, 2013: 1Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3033230457 |
|---|---|
| doi | https://doi.org/10.5013/ijssst.a.21.02.36 |
| ids.doi | https://doi.org/10.6084/m9.figshare.14710656.v1 |
| ids.mag | 3033230457 |
| ids.openalex | https://openalex.org/W3033230457 |
| fwci | 0.56614728 |
| type | article |
| title | New Approaches to the Application of Digital Forensics in Cybersecurity: A Proposal |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12034 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.984000027179718 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Digital and Cyber Forensics |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38652104 |
| concepts[0].level | 1 |
| concepts[0].score | 0.7396191358566284 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[0].display_name | Computer security |
| concepts[1].id | https://openalex.org/C84418412 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6748250126838684 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[1].display_name | Digital forensics |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.5359054207801819 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C556601545 |
| concepts[3].level | 3 |
| concepts[3].score | 0.4744499623775482 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q878553 |
| concepts[3].display_name | Computer forensics |
| keywords[0].id | https://openalex.org/keywords/computer-security |
| keywords[0].score | 0.7396191358566284 |
| keywords[0].display_name | Computer security |
| keywords[1].id | https://openalex.org/keywords/digital-forensics |
| keywords[1].score | 0.6748250126838684 |
| keywords[1].display_name | Digital forensics |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.5359054207801819 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/computer-forensics |
| keywords[3].score | 0.4744499623775482 |
| keywords[3].display_name | Computer forensics |
| language | en |
| locations[0].id | doi:10.5013/ijssst.a.21.02.36 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S2764887484 |
| locations[0].source.issn | 1473-8031, 1473-804X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1473-8031 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Simulation Systems Science & Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Simulation Systems Science & Technology |
| locations[0].landing_page_url | https://doi.org/10.5013/ijssst.a.21.02.36 |
| locations[1].id | pmh:oai:figshare.com:article/12421172 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400572 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | OPAL (Open@LaTrobe) (La Trobe University) |
| locations[1].source.host_organization | https://openalex.org/I196829312 |
| locations[1].source.host_organization_name | La Trobe University |
| locations[1].source.host_organization_lineage | https://openalex.org/I196829312 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | Text |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://figshare.com/articles/journal_contribution/New_Approaches_to_the_Application_of_Digital_Forensics_in_Cybersecurity_A_Proposal/12421172 |
| locations[2].id | pmh:oai:figshare.com:article/14710656 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306400572 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | OPAL (Open@LaTrobe) (La Trobe University) |
| locations[2].source.host_organization | https://openalex.org/I196829312 |
| locations[2].source.host_organization_name | La Trobe University |
| locations[2].source.host_organization_lineage | https://openalex.org/I196829312 |
| locations[2].license | cc-by |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | Text |
| locations[2].license_id | https://openalex.org/licenses/cc-by |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://figshare.com/articles/journal_contribution/New_Approaches_to_the_Application_of_Digital_Forensics_in_Cybersecurity_A_Proposal/14710656 |
| locations[3].id | doi:10.6084/m9.figshare.12421172.v1 |
| locations[3].is_oa | True |
| locations[3].source | |
| locations[3].license | cc-by |
| locations[3].pdf_url | |
| locations[3].version | |
| locations[3].raw_type | article-journal |
| locations[3].license_id | https://openalex.org/licenses/cc-by |
| locations[3].is_accepted | False |
| locations[3].is_published | |
| locations[3].raw_source_name | |
| locations[3].landing_page_url | https://doi.org/10.6084/m9.figshare.12421172.v1 |
| locations[4].id | doi:10.6084/m9.figshare.14710656.v1 |
| locations[4].is_oa | True |
| locations[4].source | |
| locations[4].license | cc-by |
| locations[4].pdf_url | |
| locations[4].version | |
| locations[4].raw_type | article-journal |
| locations[4].license_id | https://openalex.org/licenses/cc-by |
| locations[4].is_accepted | False |
| locations[4].is_published | |
| locations[4].raw_source_name | |
| locations[4].landing_page_url | https://doi.org/10.6084/m9.figshare.14710656.v1 |
| indexed_in | crossref, datacite |
| authorships[0].author.id | https://openalex.org/A5079414965 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-4751-9339 |
| authorships[0].author.display_name | Kenneth Okereafor |
| authorships[0].countries | KR |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210156723 |
| authorships[0].affiliations[0].raw_affiliation_string | National Health Insurance Scheme (NHIS) |
| authorships[0].institutions[0].id | https://openalex.org/I4210156723 |
| authorships[0].institutions[0].ror | https://ror.org/05efm5n07 |
| authorships[0].institutions[0].type | other |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210156723 |
| authorships[0].institutions[0].country_code | KR |
| authorships[0].institutions[0].display_name | National Health Insurance Service |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kenneth Okereafor |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | National Health Insurance Scheme (NHIS) |
| authorships[1].author.id | https://openalex.org/A5054779779 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7145-1317 |
| authorships[1].author.display_name | Rania Djehaiche |
| authorships[1].countries | DZ |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210135256 |
| authorships[1].affiliations[0].raw_affiliation_string | Mohamed El Bachir El Ibrahimi University of Bordj Bou Arreridj |
| authorships[1].institutions[0].id | https://openalex.org/I4210135256 |
| authorships[1].institutions[0].ror | https://ror.org/03e75b898 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210135256 |
| authorships[1].institutions[0].country_code | DZ |
| authorships[1].institutions[0].display_name | University Mohamed El Bachir El Ibrahimi of Bordj Bou Arreridj |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Rania Djehaiche |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Mohamed El Bachir El Ibrahimi University of Bordj Bou Arreridj |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://figshare.com/articles/journal_contribution/New_Approaches_to_the_Application_of_Digital_Forensics_in_Cybersecurity_A_Proposal/12421172 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | New Approaches to the Application of Digital Forensics in Cybersecurity: A Proposal |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12034 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.984000027179718 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Digital and Cyber Forensics |
| related_works | https://openalex.org/W2181728705, https://openalex.org/W4238452393, https://openalex.org/W4247205791, https://openalex.org/W2489557937, https://openalex.org/W4283205458, https://openalex.org/W2167366752, https://openalex.org/W3002268218, https://openalex.org/W2385667210, https://openalex.org/W3001565613, https://openalex.org/W2558079263 |
| cited_by_count | 5 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2021 |
| counts_by_year[2].cited_by_count | 1 |
| counts_by_year[3].year | 2016 |
| counts_by_year[3].cited_by_count | 1 |
| counts_by_year[4].year | 2013 |
| counts_by_year[4].cited_by_count | 1 |
| locations_count | 5 |
| best_oa_location.id | pmh:oai:figshare.com:article/12421172 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400572 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | OPAL (Open@LaTrobe) (La Trobe University) |
| best_oa_location.source.host_organization | https://openalex.org/I196829312 |
| best_oa_location.source.host_organization_name | La Trobe University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I196829312 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | Text |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://figshare.com/articles/journal_contribution/New_Approaches_to_the_Application_of_Digital_Forensics_in_Cybersecurity_A_Proposal/12421172 |
| primary_location.id | doi:10.5013/ijssst.a.21.02.36 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S2764887484 |
| primary_location.source.issn | 1473-8031, 1473-804X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1473-8031 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Simulation Systems Science & Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Simulation Systems Science & Technology |
| primary_location.landing_page_url | https://doi.org/10.5013/ijssst.a.21.02.36 |
| publication_date | 2020-03-25 |
| publication_year | 2020 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 71, 92, 103, 123 |
| abstract_inverted_index.as | 91, 102, 122 |
| abstract_inverted_index.by | 3 |
| abstract_inverted_index.in | 5, 28, 38 |
| abstract_inverted_index.is | 80 |
| abstract_inverted_index.of | 41, 60, 130, 138 |
| abstract_inverted_index.on | 140 |
| abstract_inverted_index.to | 15, 44, 98 |
| abstract_inverted_index.The | 0, 112 |
| abstract_inverted_index.all | 147 |
| abstract_inverted_index.and | 19, 22, 54, 78, 101, 143 |
| abstract_inverted_index.can | 133 |
| abstract_inverted_index.for | 74, 94 |
| abstract_inverted_index.out | 8 |
| abstract_inverted_index.the | 39, 58, 85, 116, 136 |
| abstract_inverted_index.Data | 118 |
| abstract_inverted_index.This | 82 |
| abstract_inverted_index.also | 114 |
| abstract_inverted_index.been | 13 |
| abstract_inverted_index.both | 131 |
| abstract_inverted_index.data | 76, 125 |
| abstract_inverted_index.even | 66 |
| abstract_inverted_index.face | 40 |
| abstract_inverted_index.have | 12 |
| abstract_inverted_index.high | 32 |
| abstract_inverted_index.more | 67 |
| abstract_inverted_index.poor | 17 |
| abstract_inverted_index.when | 31 |
| abstract_inverted_index.(ICT) | 25 |
| abstract_inverted_index.Model | 89, 120 |
| abstract_inverted_index.faced | 2 |
| abstract_inverted_index.leads | 43 |
| abstract_inverted_index.loss, | 51 |
| abstract_inverted_index.makes | 63 |
| abstract_inverted_index.paper | 83, 113 |
| abstract_inverted_index.their | 64 |
| abstract_inverted_index.where | 70 |
| abstract_inverted_index.(BDCM) | 121 |
| abstract_inverted_index.(RCSM) | 90 |
| abstract_inverted_index.across | 146 |
| abstract_inverted_index.damage | 53 |
| abstract_inverted_index.except | 69 |
| abstract_inverted_index.model. | 127 |
| abstract_inverted_index.models | 132 |
| abstract_inverted_index.occur. | 35 |
| abstract_inverted_index.Prudent | 128 |
| abstract_inverted_index.digital | 9, 99 |
| abstract_inverted_index.impacts | 46, 137 |
| abstract_inverted_index.include | 16 |
| abstract_inverted_index.profile | 33 |
| abstract_inverted_index.towards | 106 |
| abstract_inverted_index.Baseline | 117 |
| abstract_inverted_index.adopted. | 81 |
| abstract_inverted_index.analysis | 79 |
| abstract_inverted_index.approach | 73, 105 |
| abstract_inverted_index.capacity | 18 |
| abstract_inverted_index.carrying | 7 |
| abstract_inverted_index.forensic | 10, 75 |
| abstract_inverted_index.incident | 109 |
| abstract_inverted_index.mitigate | 135 |
| abstract_inverted_index.negative | 45 |
| abstract_inverted_index.proposes | 84, 115 |
| abstract_inverted_index.response | 110 |
| abstract_inverted_index.sectors. | 148 |
| abstract_inverted_index.assessing | 95 |
| abstract_inverted_index.checklist | 93 |
| abstract_inverted_index.corporate | 96 |
| abstract_inverted_index.crippling | 55 |
| abstract_inverted_index.defective | 20 |
| abstract_inverted_index.difficult | 68 |
| abstract_inverted_index.financial | 50 |
| abstract_inverted_index.forensics | 100 |
| abstract_inverted_index.including | 47 |
| abstract_inverted_index.policies, | 26 |
| abstract_inverted_index.resulting | 27 |
| abstract_inverted_index.Randomized | 86 |
| abstract_inverted_index.Simulation | 88 |
| abstract_inverted_index.Technology | 24 |
| abstract_inverted_index.challenges | 1 |
| abstract_inverted_index.collection | 77 |
| abstract_inverted_index.enshrining | 107 |
| abstract_inverted_index.identified | 14 |
| abstract_inverted_index.methodical | 72 |
| abstract_inverted_index.operations | 11 |
| abstract_inverted_index.reputation | 52 |
| abstract_inverted_index.systematic | 104 |
| abstract_inverted_index.Cyberattack | 87 |
| abstract_inverted_index.Information | 21 |
| abstract_inverted_index.application | 129 |
| abstract_inverted_index.disruption, | 49 |
| abstract_inverted_index.effectively | 6 |
| abstract_inverted_index.operational | 48, 141 |
| abstract_inverted_index.potentially | 134 |
| abstract_inverted_index.cluelessness | 30 |
| abstract_inverted_index.contemporary | 61 |
| abstract_inverted_index.cyberattacks | 34, 42, 62, 139 |
| abstract_inverted_index.litigations. | 56 |
| abstract_inverted_index.pre-forensic | 124 |
| abstract_inverted_index.preparedness | 97 |
| abstract_inverted_index.capabilities. | 111 |
| abstract_inverted_index.organizations | 4 |
| abstract_inverted_index.survivability | 145 |
| abstract_inverted_index.Classification | 119 |
| abstract_inverted_index.Communications | 23 |
| abstract_inverted_index.Organizational | 36 |
| abstract_inverted_index.Unfortunately, | 57 |
| abstract_inverted_index.categorization | 126 |
| abstract_inverted_index.investigations | 65 |
| abstract_inverted_index.organizational | 29, 108, 144 |
| abstract_inverted_index.sophistication | 59 |
| abstract_inverted_index.sustainability | 142 |
| abstract_inverted_index.unpreparedness | 37 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.7376434 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |