Digital Investigation

  in Journal   Posted on August 27, 2017

Journal Ranking & Metrics

JCR Impact Factor: 1.774
SJR : 0.693
Scopus H-index : 37
Guide2Research Overall Ranking: 303

Journal Information

ISSN: 1742-2876
Publisher :
Periodicity : Quarterly
Journal & Submission Website: https://www.journals.elsevier.com/digital-investigation

Aims & Scope of the Journal

Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world.

The primary pillar of this publication is digital evidence, with the core qualities of provenance, integrity and authenticity.

This widely referenced publication promotes innovations and advances in utilizing digital evidence for legal purposes, including criminal justice, incident response, cyber-risk management, civil and regulatory matters, and privacy protection.

Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.

This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:

Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analyzing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.

Cyber-risk management: Improved ways of using digital evidence to address security breaches involving information systems, and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process.

Practitioner reports: Investigative case studies and reports describing how practitioners are dealing with emerging opportunities and challenges in cybercrime and computer security, including improved methods for conducting effective digital investigations, performing forensic analysis, responding to IT security incidents, and handling and utilizing digital evidence.

Scientific practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence.

Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.

Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.

Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.

Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.

Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.

Legal analysis and updates: Carefully considered commentary by legal experts on recent cases involving digital evidence, forensic applications and computer security risk management, relevant legal developments, privacy issues, and legislative limitations.

Closed Special Issues

Leave a Reply

Your email address will not be published. Required fields are marked *