•  
  •  
 

Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals. This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ongoing investigation. IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting offenders.

References

1. Cheeck, J. M., & Buss, A. H. (1981). Shyness and sociability. Journal of Personality and Social Psychology, 41(2), 330.

2. Claypool, M., Le, P., Wased, M., & Brown, D. (2001). Implicit interest indicators. Proceedings of the 6 th International Conference on Intelligent User Interfaces, ACM, 33-40.

3. Colombini, C., & Colella, A. (2013). Digital profiling: A computer forensics approach. Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 330-343.

4. Colombini, C., Colella, A., & Italian Army. (2012). Digital scene of crime: Technique of profiling users. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications.

5. Compton, D., & Hamilton, J. (2011). An examination of the techniques and implications of the crowd-sourced collection of forensic data. Third International Conference on Privacy, Security, Risk and Trust (PASSAT), IEEE, 892- 895.

6. Denning, D. E., & Baugh Jr., W. E. (1999). Hiding crimes in cyberspace. Information, Communication & Society, 2(3), 251-276.

7. Ericsson, K. A., Krampe, R. T., & Tesch-Römer, C. (1993). The role of deliberate practice in the acquisition of expert performance. Psychological Review, 100(3), 363.

8. Florencio, D., & Herley, C. (2007). A largescale study of web password habits. Proceedings of the 16th International Conference on World Wide Web, ACM, 657-666.

9. Gaw, S., & Felten, E. (2006). Password management strategies for online accounts. Proceedings of the Second Symposium on Usable Privacy and Security, ACM, 44-45.

10. Grabosky, P. (2000). Computer crime: A criminological overview. Workshop on Crimes Related to the Computer Network, 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Vienna.

11. Herley, C. (2012). Why do Nigerian Scammers say they are from Nigeria? WEIS.

12. Jenkins, C., Corritore, C. L., & Weidenbeck, S. (2003). Patterns of information seeking on the Web: A qualitative study of domain expertise and Web expertise. IT & Society, 1(3), 64-89.

13. Krone, T. (2004). A typology of online child pornography offending. Australian Institute of Criminology.

14. Merritt, K., Smith, D., & Renzo, J. (2005). An investigation of self-reported computer literacy: Is it reliable. Issues in Information Systems, 6(1), 289-295.

15. Ngo, F. T., & Parternoster, R. (2011). Cybercrime victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5(1), 773-793.

16. Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Digital Investigation, 2(4), 261-267.

17. Orr, E., Sisic, M., Ross, C., Simmering, M. G., Arseneault, J. M., & Orr, R. R. (2009). The influence of shyness on the use of Facebook in an undergraduate sample. CyberPsychology & Behavior, 12(3), 337-340.

18. Radianti, J., Rich, E., & Gonzalez, J. J. (2009). Vulnerability black markets: Empirical evidence and scenario simulation. 42nd Hawaii International Conference on System Sciences, IEEE, 1-10.

19. Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital investigation, 3(2), 97-102.

20. Rogers, M. K. (2010). The psyche of cybercriminals: A psycho-Social perspective. In Cybercrimes: A Multidisciplinary Analysis, 217- 235. Springer Berlin Heidelberg.

21. Scealy, M., Phillips, J. G., & Stevenson, R. (2002). Shyness and anxiety as predictors of patterns of Internet usage. CyberPsychology & Behavior, 5(6), 507-515.

22. Topalli, V. (2004). Criminal expertise and offender decision-making: An experimental analysis of how offenders and non-offenders differentially perceive social stimuli. British Journal of Criminology, 45(3), 269-295.

23. United States Government. (2013, September 27). Criminal Complaint. Retrieved on October 11, 2013 from http://www.scribd.com/doc/172773407/Ulbrich t-Criminal-Complaint-Silk-Road

24. Warren, P., & Streeter, M. (2006). Cyber Alert: How the World is Under Attack from a New Form of Crime. Vision Paperbacks.

25. Wright, R., Logie, R. H., & Decker, S. H. (1995). Criminal expertise and offender decision making: An experimental study of the target selection process in residential burglary. Journal of Research in Crime and Delinquency, 32(1), 39-53.

DOI

https://doi.org/10.15394/jdfsl.2014.1160

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.