Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies
DOI:
https://doi.org/10.24191/jikm.v14i2.4474Keywords:
computer forensic investigation, digital information management, criminal evidence, computer crime, information managementAbstract
To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor.
References
Accenture. (2003). Web services: IT efficiency today...powerful business solutions tomorrow. Retrieved from http://rvww-306.ibm.com/software/solutions/webservices/pdf/RTS_AB_hires.pdf
Agarwal, A., Gupta, M., Gupta, S., & Gupta, S.C. (2011). Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS), 5(1), 118–131.
Awa, H.O., Ojiabo, U., & Emecheta, B.C. (2016). Exploring the trend towards cloud computing: Literature review and current research. Cogent Business & Management. [Ibid].
Barske, D., Stander, A., & Jordan, J. (2010). A digital forensic readiness framework for South African SMEs. Information Security for South Africa (ISSA), 1-6. Sandton, Johannesburg: IEEE.
Beebe, N.L. (2005). A hierarchical, objectives-based framework for the digital investigations process. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.98.2406&rep=rep1&type=pdf
Carrier, B.D. (2003). Open source computer forensic manual. Available from: http://www.digitalevidence.org/ Casey, E. (2004). Digital evidence and computer crime: Forensic science, computers, and the Internet. Academic Press.
Ciardhuain, S. (2004). An extended model of cybercrime investigation. International Journal of Digital Evidence, 3(1), 1-22. Coburn, N. (2006). Corporate investigations. Journal of Financial Crime. Retrieved from www.emerald.com/insight/content/doi/10.1108/13590790610678422/full/html?mobileUi=0&fullSc=1
Cohen, F.B. (2012). Digital forensic evidence examination. Fred Cohen & Associates.
Dong, L., Neufeld, D., & Higgins, C. (2009). Top management support of enterprise systems implementation. Journal of Information Technology, 24, 55-80. https://doi.org/10.1057/jit.2008.21
Duranti, L., & Endicott-Popovsky, B. (2010). Digital records forensics: A new science and academic program for forensic readiness. Scholarly Commons. Retrieved from commons.erau.edu/jdfsl/vol5/iss2/4/
Dzomira, S. (2014). Digital forensic technologies as e-fraud risk mitigation tools in the banking industry: Evidence from Zimbabwe. Risk Governance & Control: Financial Markets & Institutions, 4(2).
Fahmid, I. (2006). Enterprise computer forensics: A defensive and offensive strategy to fight computer crime. Australian Digital Forensics Conference. Retrieved from https://ro.ecu.edu.au/adf/
Freiling, F.C., & Schwittay, B. (2007). Common process model for incident and computer forensics. Proceedings of Conference on IT Incident Management and IT Forensics, Stuttgart.
Frost & Sullivan. (2015, February 18). Cybersecurity risks threaten digital integration in key process industries. LinkedIn SlideShare. Retrieved from www.slideshare.net/FrostandSullivan/cybersecurityrisks-threaten-digital-integration-in-key-process-industries
Grobler, C.P., & Louwrens, C.P. (2007). Digital forensic readiness as a component of information security best practice. In New approaches for security, privacy and trust in complex environments (pp. 13–24). Springer, Boston, MA.
Hameed, T., Counsell, S., & Swift, S. (2012). Technology adoption in organizations: A review of the literature. [Ibid]. Henriksen, H.Z. (2006). Motivators for IOS adoption in Denmark. Journal of Electronic Commerce in Organizations, 4, 25–39. https://doi.org/10.4018/JECO
Hitchcock, B., Le-Khac, N.-A., & Scanlon, M. (2016). Tiered forensic methodology model for digital field triage by non-digital evidence specialists. Digital Investigation, 16, S75–S85.
Imtiaz, F. (2006). Forensic computer crime investigation. In Taylor & Francis Group.
ISO/IEC 17799:2005. (2010, June 3). Retrieved from www.iso.org/standard/39612.html
Jeyaraj, A., Rottman, J., & Lacity, M. (2006). A review of the predictors, linkages, and biases in IT innovation adoption research. Journal of Information Technology, 21, 1–23. https://doi.org/10.1057/palgrave.jit.2000056
Johnson, R. (2006). Forensic computer crime investigation. Taylor & Francis Group. Kauffman, R.J., & Walden, E.A. (2001). Economics and electronic commerce: Survey and directions for research. International Journal of Electronic Commerce, 5, 5–116.
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. NIST Special Publication, 10(800), 886.
Khairina, Y., Siew, E.G., & Yeow, P.H.P. (2012). Investigating the technological, organizational, and environmental influence on the adoption of audit technology among Malaysian audit firms. Retrieved July 3, 2014, from www.buseco.monash.edu.my
Kinuthia, J.N. (2015). Technological, organizational, and environmental factors affecting the adoption of cloud enterprise resource planning (ERP) systems. Semantic Scholar. Retrieved from https://pdfs.semanticscholar.org/fb6c/9f4d8648a9e39791694d9536d34af0aab2d2.pdf
Kohn, M.D., Eloff, M.M., & Eloff, J.H.P. (2013). Integrated digital forensic process model. Computers & Security, 38, 103–115.
Kruse, W., & Heiser, J.G. (2001). Computer forensics: Incident response essentials (1st ed.). Addison Wesley Professional.
Kruse, W., & Heiser, J.G. (2002). Computer forensics: Incident response essentials. Addison Wesley Professional.
Li, P., & Xie, W. (2012). A strategic framework for determining e-commerce adoption. Journal of Technology Management in China, 7(1), 22-35.
Martini, B., & Choo, K.-K.R. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 9(2), 71–80.
Mbugua Chahira, J., KinanuKiruki, J., & KipronoKemei, P. (2016). A proactive approach in network forensic investigation process. International Journal of Computer Applications Technology and Research, 5, 304-311. https://doi.org/10.7753/IJCATR0505.1012
McCreight, R. (2022). Reconceptualizing security vulnerabilities. In Handbook of Security Science. Springer, UK.
National Institute of Justice. (2008). Electronic crime scene investigation: A guide for first responders (2nd ed.). U.S. Department of Justice Office of Justice Programs. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/219941.pdf
Nicolas, M., et al. (2020). Advanced technologies adoption and use by U.S. firms: Evidence from the annual business survey. NBER Working Paper No. 28290. Retrieved from https://www.nber.org/system/files/working_papers/w28290/w28290.pdf
Oliveira, T., & Martins, M.F. (2011). Literature review of information technology adoption models at firm level. The Electronic Journal Information Systems Evaluation, 14(1), 110-121. Retrieved from www.ejise.com
Palmer, G. (2001). A road map for digital forensic research. In First Digital Forensic Research Workshop, Utica, New York (pp. 27–30).
Pangalos, G. (2010). The importance of corporate forensic readiness in the information security framework. Retrieved from www.researchgate.net/publication/221015022_The_Importance_of_Corporate_Forensic_Readiness_i n_the_Information_Security_Framework
Perumal, S. (2009). Digital forensic model based on Malaysian investigation process. International Journal of Computer Science and Network Security, 9, 38–44.
Pilli, E.S., Joshi, R.C., & Niyogi, R. (2010). A framework for network forensic analysis. SpringerLink. Retrieved from https://link.springer.com/chapter/10.1007/978-3-642-15766-0_21
PWC. (2016). Forensic investigations and fraud risk management. Retrieved from https://www.pwc.pl/en/services/forensic.html
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Wan Abdul Malek Wan Abdullah, Nurussobah Hussin, Mohd Nazir Ahmad, Ahmad Zam Hariro Samsudin, Abdurrahman Jalil
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright of articles that appear in the journal belongs exclusively to Faculty of Information Management, Universiti Teknologi MARA (Publisher). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions or any other reproductions of similar nature.