02.12.2012 Views

gengenbach-forensic-workflows-2012

gengenbach-forensic-workflows-2012

gengenbach-forensic-workflows-2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

access to born-digital content in archival settings. 13<br />

The study presented in this paper used semi-structured interviews with archivists<br />

and curators to investigate the implementation of digital <strong>forensic</strong>s practices for managing<br />

born-digital content in collecting institutions. My research objective has been<br />

exploratory; my original intent was to examine how collecting institutions integrate<br />

digital <strong>forensic</strong>s tools and processes into their <strong>workflows</strong> for managing born-digital<br />

content from acquisition to the provision of access. High-level workflow models based<br />

on the information gathered through those interviews provide additional documentation<br />

and context for archives and special collections seeking to develop their own processes<br />

for managing born-digital content.<br />

Defining Digital Forensics<br />

Literature Review<br />

Before delving into the relevant literature, it will be helpful to provide a brief<br />

discussion of the term digital <strong>forensic</strong>s in the context of this work. While the definition<br />

provided above is accurate, it is useful to consider others. In 2001, at the first meeting of<br />

the Digital Forensics Research Workshop (DFRWS), the following was adopted as a<br />

definition for digital <strong>forensic</strong>s:<br />

The use of scientifically derived and proven methods toward the preservation,<br />

collection, validation, identification, analysis, interpretation, documentation and<br />

presentation of digital evidence derived from digital sources for the purpose of<br />

facilitating or furthering the reconstruction of events found to be criminal, or<br />

helping to anticipate unauthorized actions shown to be disruptive to planned<br />

operations. 14<br />

13 This will be further explored in the next section of the present work.<br />

14 Gary Palmer, A Road Map for Digital Forensic Research.Technical Report DTR- T0010-01, DFRWS,<br />

November 2001. Report from the First Digital Forensic Research Workshop (DFRWS): 16,<br />

http://www.dfrws.org/2001/dfrws-rm-final.pdf (accessed August <strong>2012</strong>).<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!