Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Multi-perspective Cybercrime Investigation Process Modeling

Atsa Etoundi Roger, Mboupda Moyo Achille Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Download full text
  1. Atsa Etoundi Roger and Mboupda Moyo Achille. Article: Multi-perspective Cybercrime Investigation Process Modeling. International Journal of Applied Information Systems 2(8):14-20, June 2012. BibTeX

    	author = "Atsa Etoundi Roger and Mboupda Moyo Achille",
    	title = "Article: Multi-perspective Cybercrime Investigation Process Modeling",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 2,
    	number = 8,
    	pages = "14-20",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"


Several works have been carried out in the domain of cybercrime investigation. Each of the resulting models is based on a set of activities that should be performed in order to obtain the required evidences that are needed in the court for prosecution. In the literature, three processes have been highlighted for the digital forensic investigation based on a current situation; they include proactive, active and reactive processes. However, none of the defined approaches for investigation has taken into consideration the three perspectives despite the fact that they are linked together in the management of cybercrime within an organization. Moreover, there is no agreement in the definition of different tasks to be performed for each process in the achievement of the associated investigation goal. Each researcher comes with a specific set of activities based on the case under studies. In the same manner, the ordering of activities for a given process is not clearly specified; therefore, in different cases using the same process with the same activities, the associated executions are sometimes very different. There is a lack of standards in the cybercrime investigation processes. As the cybercrime increases in the modern society based on the use and the growth of ICTs (Information and Communication Technologies), there is an urgent need to set up a standard which takes into account the above issues. This paper proposes a multi-perspective cybercrime investigation process modeling that can be considered as a basis for standardization. The proposed model is constructed by extending and unifying the existing approaches.


  1. Yong-Dal Shin. "New Model for Cyber Crime Investigation Procedure". Journal of Next Generation Information Technology, Volume 2, Number 2, May 2011.
  2. Inikpi O. Ademu, Dr Chris O. Imafidon, Dr David S. Preston: "A New Approach of Digital Forensic Model for Digital Forensic Investigation". (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 12, 2011.
  3. Sundresan Perumal: "Digital Forensic Model Based On Malaysian Investigation Process". IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 8, August 2009.
  4. Séamus Ó Ciardhuáin: "An Extended Model of Cybercrime Investigations". International Journal of Digital Evidence Summer 2004, Volume 3, Issue 1.
  5. Ankit Agarwal, Megha Gupta, Saurabh Gupta \& Prof. (Dr. ) S. C. Gupta: "Systematic Digital Forensic Investigation Model". International Journal of Computer Science and Security (IJCSS), Volume(5): Issue(1): 2011, 118-131.
  6. Baryamureeba and Florence Tushabe: "The Enhanced Digital Investigation Process Model". Institute of Computer Science, Makerere University P. O. Box 7062, Kampala Uganda www. makerere. ac. ug/ics.
  7. Brian Carrier Eugene H. Spafford: "Getting Physical with the Digital Investigation Process". International Journal of Digital Evidence Fall 2003, Volume 2, Issue 2.
  8. W. Thomas: Automata on Infinite Objects". Handbook on Theoretical Computer Science, J. Van Leeuwen, ed, pp. 133-187, Elsevier Science, 1990.
  9. G. Berry, P. Couronne and G. Gonthier:} "\texttt{Synchronous Programming of Reactive Systems: An introduction to ESTEREL". Proc. 1st Franco-Japanese Symp. on programming of Future Generation Computers, 1986, Tokyo. pp. 35-56. S. Garfinkel, "Anti-forensics: Techniques, detection and countermeasures," in 2nd International Conference on i-Warfare and Security, 2007, p. 77.
  10. CP Grobler, CP Louwrens, SH von Solms "A multi-component view of Digital Forensics}". International Conference on Availability, Reliability and Security, 2010.
  11. Soltan Alharbi, Jens Weber-Jahnke, Issa Traore: "The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review". International Journal of Security and Its Applications Vol. 5 No. 4, October, 2011.
  12. A. Orebaugh: "Proactive forensics". Journal of digital forensic Practice, vol. 1, p. 37, 2006.
  13. Ieong, R. and H. Leung: "Deriving Cse-specific Live Forensics Investigation Procedures from FORZA". In Symposium on Applied Computing archive Proceedings of the 2007 ACM symposium on Applied computing 2007. Seoul, Korea: ACM Press New York, NY, USA.
  14. Ren, W. and H. Jin: "Honeynet Based Distributed Adaptive Network Forensics and Active Real Time Investigation". In 2005 ACM Symposium on Applied Computing. 2005. Santa Fe, New Mexico, USA.
  15. Foster M, W. J: "Process Forensics: A pilot study on the use of checkpointing technology in computer forensics". International Journal of Digital Evidence, 2004. 3(1).


Computer Forensics, Cybercrime Investigation, Forensic Process Models, Proactive Forensic Investigation, Active And Reactive Forensic Investigation