A Process Model to Enhance the Accuracy of Digital Forensic Investigations: A case of National Identification and Registration Authority (NIRA-Uganda)

  • Makheti Alex Busitema University
  • Gilbert Gilibrays Ocen Busitema University
  • Badru Lusiba Busitema University
  • Semwogerere Twaibu Busitema University
  • Alunyu Andrew Eguar Busitema University
  • Matovu Davis Busitema University
  • Godfrey Odongtoo Busitema University
Keywords: Digital Forensics, Enhanced Accuracy, Process Model, Investigation
Share Article:

Abstract

The field of digital forensics has become commonplace due to the increasing prevalence of technology since the late 20th century and the inevitable relevance of this technology in the conducting of criminal activity. In traditional forensics, the evidence is generally something tangible that could identify the criminal, such as hair, blood or fingerprints. In contrast, digital forensics deals with files and data in digital form extracted from digital devices like computers, and phones, among other digital devices, meaning is derived from the fact that a computer or computerised device is the subject or object of crime. In this paper, we explore the challenges faced by the National Identification and Registration Authority (NIRA) digital forensic investigation and develop a process model that enhances the accuracy of digital forensic investigation. We adopted a mixed method approach of research involving qualitative, quantitative and experimental design. The study makes significant findings in areas of enhancement accuracy of digital forensic investigation by enumerating the processes that must be followed. As a recommendation for future work, for purposes of generalisation of the study findings, a wider study involving other security agencies such as the police should be conducted.

Downloads

Download data is not yet available.

References

I. O. Ademu, C. O. Imafidion, and D. S. Preston, “A New Approach of Digital Forensic Model for Digital Forensic Investigation,” International Journal of Advanced Computer Science and Applications, vol. 2, no. 12, pp. 175–178, 2011, doi: 10.14569/IJACSA.2011.021226.

S. Daware, S. Dahake, and V. M. Thakare, “Mobile forensics: Overview of digital forensic, computer forensics vs. mobile forensics and tools,” International Journal of Computing Applications, vol. 2012, pp. 7–8, 2012.

M. Pollitt, “Digital Forensic Research Conference A Framework for Digital Forensic Science.” Accessed: Apr. 01, 2019. [Online]. Available: https://www.dfrws.org/sites/default/files/session- files/pres- a_framework_for_digital_forensic_science.pdf

M. Y. Nordiana Rahim, Ainuddin Wahid Abdul Wahab and I. I. and 4Miss L. M. Kiah, “Digital Forensics: An Overview of the Current Trends,” 2014. https://www.researchgate.net/publication/280684566_Digital_Forensics_An_Overview_of_the_Current_Trends (accessed Jul. 27, 2020).

Gilbert Gilibrays Ocen, S. M. Karume, M. S. Mutua, G. B. Mugeni, and D. Matovu, “An Algorithm and Process Flow Model For The Extraction Of Digital Forensic Evidence In Android Devices,” International Scientific Journal Theoretical & Applied Science, vol. 72, no. 04, Apr. 2019, doi: 10.15863/TAS.2019.04.72.1.

“NIRA | National Identification & Registration Authority.” https://www.nira.go.ug/home (accessed Sep. 16, 2022).

R. v Krejcie and D. W. Morgan, “Determining Sample Size for Research Activities Robert,” Educ Psychol Meas, vol. 38, no. 1, pp. 607–610, 1970, doi: 10.1177/001316447003000308.

J. C. Whitehead, P. A. Groothuis, and G. C. Blomquist, “Testing for non-response and sample selection bias in contingent valuation Analysis of a combination phone/mail survey *,” 1993. Accessed: Apr. 19, 2019. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.460.2661&rep=rep1&type=pdf

D. Silverman, Interpreting qualitative data: methods for analysing talk, text, and interaction. SAGE Publications, 2006.

J. M. Morse, M. Barrett, M. Mayan, K. Olson, and J. Spiers, “Verification Strategies for Establishing Reliability and Validity in Qualitative Research,” 2002. Accessed: Apr. 19, 2019. [Online]. Available: https://journals.sagepub.com/doi/pdf/10.1177/160940690200100202

W. Lawrence Neuman, “Social Research Methods: Qualitative and Quantitative Approaches W. Lawrence Neuman Seventh Edition,” 2014. Accessed: Apr. 15, 2019. [Online]. Available: www.pearsoned.co.uk

C. Kothari, Research methodology: methods and techniques. 2004. doi: http://196.29.172.66:8080/jspui/bitstream/123456789/2574/1/Research%20Methodology.pdf.

C. B. Perry R, Hinton, Isabella McMurray, SPSS Explained Second Edition. 2014.

F. Fioravanti and F. Fioravanti, “Software Measurement,” Skills for Managing Rapidly Changing IT Projects, no. January 1998, pp. 191–223, 2011, doi: 10.4018/978-1-59140-757-7.ch013.

T. E. Endres, “Advantages of rapid prototyping,” SAE Technical Papers, 1999, doi: 10.4271/1999-01-3433.

R. Stoykova, “Digital evidence: Unaddressed threats to fairness and the presumption of innocence,” Computer Law & Security Review, vol. 42, p. 105575, Sep. 2021, doi: 10.1016/J.CLSR.2021.105575.

D. Canter and D. Youngs, “Narratives of criminal action and forensic psychology,” undefined, vol. 17, no. 2, pp. 262–275, 2012, doi: 10.1111/J.2044-8333.2012.02050.X.

S. Soltani and S. A. H. Seno, “A survey on digital evidence collection and analysis,” 2017 7th International Conference on Computer and Knowledge Engineering, ICCKE 2017, vol. 2017-January, pp. 247–253, Dec. 2017, doi: 10.1109/ICCKE.2017.8167885.

S. A. Soltan Alharbi, J. W. J. Jens Weber-Jahnke, and I. T. Issa Traore, “The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review,” International Journal of Security and Its Applications, vol. 5, no. 4, pp. 59–72, 2011.

J. P. Venter and J. P. Venter, “Process Flows for Cyber Forensics Training and Operations”, Accessed: Oct. 04, 2022. [Online]. Available: http://130.203.136.95/viewdoc/summary?doi=10.1.1.103.1583

N. M. Karie and H. S. Venter, “Towards a framework for enhancing potential digital evidence presentation,” 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, 2013, doi: 10.1109/ISSA.2013.6641039.

H. Saini, Y. S. Rao, and T. C. Panda, “Cyber-Crimes and their Impacts : A Review 1,” 2012

Published
19 December, 2022
How to Cite
Alex, M., Ocen, G., Lusiba, B., Twaibu, S., Eguar, A., Davis, M., & Odongtoo, G. (2022). A Process Model to Enhance the Accuracy of Digital Forensic Investigations: A case of National Identification and Registration Authority (NIRA-Uganda). East African Journal of Information Technology, 5(1), 216-243. https://doi.org/10.37284/eajit.5.1.1015

Most read articles by the same author(s)