02.12.2012 Views

gengenbach-forensic-workflows-2012

gengenbach-forensic-workflows-2012

gengenbach-forensic-workflows-2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

physical <strong>forensic</strong>s methodology. 32 Others have compiled models chronologically to<br />

document their increasing complexity. 33 More recently, researchers have synthesized<br />

existing models, isolating common investigative processes in order to create a basic high-<br />

level abstract model, usable for the development of new tools and technologies, but also<br />

helpful for the application of digital <strong>forensic</strong>s processes outside of criminal investigation<br />

and computer security. 34<br />

Digital Preservation and Digital Forensics in Collecting Institutions<br />

It is only in the recent past that practitioners and researchers in digital <strong>forensic</strong>s<br />

and digital preservation have recognized the overlap in their respective fields. Through<br />

the 1980s and 1990s, the rapid pace of technology and the development of new hardware<br />

and software systems had caused some archivists to entirely reconsider how to approach<br />

electronic records, and to question whether traditional conceptions of archival practice<br />

were still valid for this new era. 35 Articles by Adrian Cunningham, Tom Hyry and Rachel<br />

Onuf during this period note the lack of attention to electronic records in collecting<br />

32 Brian Carrier and Eugene H. Spafford, “Getting Physical with the Digital Investigation Process,”<br />

International Journal of Digital Evidence 2 no. 2 (Fall 2003), 1-20,<br />

https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2003-29.pdf (accessed August <strong>2012</strong>).<br />

33 Mark M. Pollitt, “An Ad Hoc Review of Digital Forensic Models,” Proceeding of the Second<br />

International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’07),<br />

Washington, D.C., (2007), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4155349<br />

(accessed August <strong>2012</strong>).<br />

34 Yusoff, Ismail, and Hassan, “Common Phases of Computer Forensics Investigation Models,” 29-30.<br />

35 There is a sizable body of scholarship available on this topic; for a classic articulation of the “new<br />

paradigm” model of electronic records management, see David Bearman, “An Indefensible Bastion:<br />

Archives as a Repository in the Digital Age,” in D. Bearman (ed.) Archival Management of Electronic<br />

Records, Archives and Museum Informatics Technical Report 13 (1991), 14-24. An alternative<br />

perspective is provided by Linda J. Henry, “Schellenberg in Cyberspace,” American Archivist 61 no. 2<br />

(Fall 1998): 310-311, http://www.jstor.org/stable/40294090 (accessed July <strong>2012</strong>). For summaries of the<br />

differences between the projects, see Philip C. Bantin, “Strategies for Managing Electronic Records: A<br />

New Archival Paradigm? An Affirmation of our Archival Traditions?” Archival Issues 23, no. 1 (1998),<br />

17-34; and Peter B. Hirtle, “Archival Authenticity in a Digital Age,” in Authenticity in a Digital<br />

Environment (Washington, D.C.: Council on Library and Information Resources, May 2000), 8-23,<br />

http://www.clir.org/pubs/reports/pub92/pub92.pdf (accessed July <strong>2012</strong>).<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!