Cyber Forensic and Data Collection Challenges in Nigeria

α
Whyte Stella Tonye
Whyte Stella Tonye
α Walden University

Send Message

To: Author

Cyber Forensic and Data Collection Challenges in Nigeria

Article Fingerprint

ReserarchID

H0YFV

Cyber Forensic and Data Collection Challenges in Nigeria Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The importance of structural investigation to obtain a reliable chain of evidence on cyber-attacks organizations or individual data for application of legal presentation in court in computer forensics. Where ever there is a discovery of evidence or proofs of illegal misuse of organization data it leads to the prosecution of the culprits. Today the technology in cyber forensic is utilizing the application of scientific methods and technics to recover data from electronic and digital media. This scientific method requires expertise that goes beyond regular forensic data collection, techniques, and practices which must conform to universal standards. Increase in the use of computer and the internet has resulted in the change in human behaviors and ways in which they communicate, this growth in technology has given rise to cybercrimes which have caused the insecurity of the cyberspace in general. The increase in the growth of computer and the Internet use has changed the human behavior and ways of communication, this growth in technology has given rise to the rise in cybercrime which is now sophisticated and difficult to trace, investigate, and prosecution of criminals without reliable and accurate data collection.

References

18 Cites in Article
  1. Michael Christensen,Mcdonald (2015). Disruptive technologies: Catching the wave Joseph L. Bower and Clayton M. Christensen, Harvard Business Review (January–February 1995), pp. 43–53.
  2. Q Darren,R Kim-Kwang (2014). Impacts of increasing volume of digital forensic data: A survey and future research challenges.
  3. H Guo,B Jin,W Qian (2013). Analysis of email header for forensic purpose.
  4. Vikram Harichandran,Frank Breitinger,Ibrahim Baggili,Andrew Marrington (2015). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later.
  5. Nerida Hyett,Amanda Kenny,Virginia Dickson-Swift (2014). Methodology or method? A critical review of qualitative case study reports.
  6. P Krajcovic (2015). UNDERSTANDING THE STRATEGIES OF MEDIA GIANTS.
  7. Noble Kumari,A Mohapatra (2016). An insight into digital forensics branches and tools.
  8. Michael Losavio,Pavel Pastukov,Svetlana Polyakova (2015). Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics.
  9. Noble Kumari,A Mohapatra (2016). An insight into digital forensics branches and tools.
  10. Mary Malina,Hanne Nørreklit,Frank Selto (2011). Lessons learned: advantages and disadvantages of mixed method research.
  11. Ngboawaji Nte,Daniel (2012). An Evaluation of the Challenges of Forensic Investigation and Unsolved Murders in Nigeria.
  12. J Olayemi (2014). A socio-technological analysis of cybercrime and cyber security in Nigeria.
  13. G Sesan,B Soremi,B Olufemi (2015). https://elibrary.ru/download/elibrary_54286279_13302438.pdf.
  14. Florian Skopik,Giuseppe Settanni,Roman Fiedler (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
  15. R Slim,B Noureddine (2012). A Hierarchical Visibility theory for formal digital investigation of antiforensic attacks.
  16. K Suleman,G Abdulla,W Ainuddin,S Mohamed,A Lftikhar (2015). Cyber Forensic Techniques.
  17. A Toloie-Eshlaghy,S Chitsaz,L Karimian,R Charkhchi (2011). A classification of qualitative research methods.
  18. T Tuominen,P Tuominen,I Jussila (2013). A tool to be used deliberately: Investigating the role of profit in consumer co-operatives.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Whyte Stella Tonye. 2018. \u201cCyber Forensic and Data Collection Challenges in Nigeria\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJCST-G Volume 18 (GJCST Volume 18 Issue G3): .

Download Citation

Issue Cover
GJCST Volume 18 Issue G3
Pg. 25- 28
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-G Classification: H.2.7
Version of record

v1.2

Issue date

June 9, 2018

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 5806
Total Downloads: 1532
2026 Trends
Related Research

Published Article

The importance of structural investigation to obtain a reliable chain of evidence on cyber-attacks organizations or individual data for application of legal presentation in court in computer forensics. Where ever there is a discovery of evidence or proofs of illegal misuse of organization data it leads to the prosecution of the culprits. Today the technology in cyber forensic is utilizing the application of scientific methods and technics to recover data from electronic and digital media. This scientific method requires expertise that goes beyond regular forensic data collection, techniques, and practices which must conform to universal standards. Increase in the use of computer and the internet has resulted in the change in human behaviors and ways in which they communicate, this growth in technology has given rise to cybercrimes which have caused the insecurity of the cyberspace in general. The increase in the growth of computer and the Internet use has changed the human behavior and ways of communication, this growth in technology has given rise to the rise in cybercrime which is now sophisticated and difficult to trace, investigate, and prosecution of criminals without reliable and accurate data collection.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cyber Forensic and Data Collection Challenges in Nigeria

Whyte Stella Tonye
Whyte Stella Tonye Walden University

Research Journals