An ontology-driven model for digital forensics investigations of computer incidents under the ubiquitous computing environments

Hai Cheng Chu, Der Jiunn Deng, Han Chieh Chao

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company's intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.

Original languageEnglish
Pages (from-to)5-19
Number of pages15
JournalWireless Personal Communications
Volume56
Issue number1
DOIs
Publication statusPublished - 2011 Jan 1

Fingerprint

Computer crime
Ubiquitous computing
Ontology
Security of data
Intellectual property
Mobile devices
Industry
Availability
Digital forensics

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

@article{68e1fdb2dd26461fbd47febabb301619,
title = "An ontology-driven model for digital forensics investigations of computer incidents under the ubiquitous computing environments",
abstract = "Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company's intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.",
author = "Chu, {Hai Cheng} and Deng, {Der Jiunn} and Chao, {Han Chieh}",
year = "2011",
month = "1",
day = "1",
doi = "10.1007/s11277-009-9886-x",
language = "English",
volume = "56",
pages = "5--19",
journal = "Wireless Personal Communications",
issn = "0929-6212",
publisher = "Springer Netherlands",
number = "1",

}

An ontology-driven model for digital forensics investigations of computer incidents under the ubiquitous computing environments. / Chu, Hai Cheng; Deng, Der Jiunn; Chao, Han Chieh.

In: Wireless Personal Communications, Vol. 56, No. 1, 01.01.2011, p. 5-19.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An ontology-driven model for digital forensics investigations of computer incidents under the ubiquitous computing environments

AU - Chu, Hai Cheng

AU - Deng, Der Jiunn

AU - Chao, Han Chieh

PY - 2011/1/1

Y1 - 2011/1/1

N2 - Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company's intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.

AB - Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company's intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.

UR - http://www.scopus.com/inward/record.url?scp=78650593518&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78650593518&partnerID=8YFLogxK

U2 - 10.1007/s11277-009-9886-x

DO - 10.1007/s11277-009-9886-x

M3 - Article

AN - SCOPUS:78650593518

VL - 56

SP - 5

EP - 19

JO - Wireless Personal Communications

JF - Wireless Personal Communications

SN - 0929-6212

IS - 1

ER -