Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies

Authors

  • Wan Abdul Malek Wan Abdullah School of Information Science, UiTM Puncak Perdana
  • Nurussobah Hussin School of Information Science, UiTM Puncak Perdana
  • Mohd Nazir Ahmad School of Information Science, UiTM Puncak Perdana
  • Ahmad Zam Hariro Samsudin School of Information Science, UiTM Puncak Perdana
  • Abdurrahman Jalil School of Information Science, UiTM Puncak Perdana

DOI:

https://doi.org/10.24191/jikm.v14i2.4474

Keywords:

computer forensic investigation, digital information management, criminal evidence, computer crime, information management

Abstract

To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor.

References

Accenture. (2003). Web services: IT efficiency today...powerful business solutions tomorrow. Retrieved from http://rvww-306.ibm.com/software/solutions/webservices/pdf/RTS_AB_hires.pdf

Agarwal, A., Gupta, M., Gupta, S., & Gupta, S.C. (2011). Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS), 5(1), 118–131.

Awa, H.O., Ojiabo, U., & Emecheta, B.C. (2016). Exploring the trend towards cloud computing: Literature review and current research. Cogent Business & Management. [Ibid].

Barske, D., Stander, A., & Jordan, J. (2010). A digital forensic readiness framework for South African SMEs. Information Security for South Africa (ISSA), 1-6. Sandton, Johannesburg: IEEE.

Beebe, N.L. (2005). A hierarchical, objectives-based framework for the digital investigations process. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.98.2406&rep=rep1&type=pdf

Carrier, B.D. (2003). Open source computer forensic manual. Available from: http://www.digitalevidence.org/ Casey, E. (2004). Digital evidence and computer crime: Forensic science, computers, and the Internet. Academic Press.

Ciardhuain, S. (2004). An extended model of cybercrime investigation. International Journal of Digital Evidence, 3(1), 1-22. Coburn, N. (2006). Corporate investigations. Journal of Financial Crime. Retrieved from www.emerald.com/insight/content/doi/10.1108/13590790610678422/full/html?mobileUi=0&fullSc=1

Cohen, F.B. (2012). Digital forensic evidence examination. Fred Cohen & Associates.

Dong, L., Neufeld, D., & Higgins, C. (2009). Top management support of enterprise systems implementation. Journal of Information Technology, 24, 55-80. https://doi.org/10.1057/jit.2008.21

Duranti, L., & Endicott-Popovsky, B. (2010). Digital records forensics: A new science and academic program for forensic readiness. Scholarly Commons. Retrieved from commons.erau.edu/jdfsl/vol5/iss2/4/

Dzomira, S. (2014). Digital forensic technologies as e-fraud risk mitigation tools in the banking industry: Evidence from Zimbabwe. Risk Governance & Control: Financial Markets & Institutions, 4(2).

Fahmid, I. (2006). Enterprise computer forensics: A defensive and offensive strategy to fight computer crime. Australian Digital Forensics Conference. Retrieved from https://ro.ecu.edu.au/adf/

Freiling, F.C., & Schwittay, B. (2007). Common process model for incident and computer forensics. Proceedings of Conference on IT Incident Management and IT Forensics, Stuttgart.

Frost & Sullivan. (2015, February 18). Cybersecurity risks threaten digital integration in key process industries. LinkedIn SlideShare. Retrieved from www.slideshare.net/FrostandSullivan/cybersecurityrisks-threaten-digital-integration-in-key-process-industries

Grobler, C.P., & Louwrens, C.P. (2007). Digital forensic readiness as a component of information security best practice. In New approaches for security, privacy and trust in complex environments (pp. 13–24). Springer, Boston, MA.

Hameed, T., Counsell, S., & Swift, S. (2012). Technology adoption in organizations: A review of the literature. [Ibid]. Henriksen, H.Z. (2006). Motivators for IOS adoption in Denmark. Journal of Electronic Commerce in Organizations, 4, 25–39. https://doi.org/10.4018/JECO

Hitchcock, B., Le-Khac, N.-A., & Scanlon, M. (2016). Tiered forensic methodology model for digital field triage by non-digital evidence specialists. Digital Investigation, 16, S75–S85.

Imtiaz, F. (2006). Forensic computer crime investigation. In Taylor & Francis Group.

ISO/IEC 17799:2005. (2010, June 3). Retrieved from www.iso.org/standard/39612.html

Jeyaraj, A., Rottman, J., & Lacity, M. (2006). A review of the predictors, linkages, and biases in IT innovation adoption research. Journal of Information Technology, 21, 1–23. https://doi.org/10.1057/palgrave.jit.2000056

Johnson, R. (2006). Forensic computer crime investigation. Taylor & Francis Group. Kauffman, R.J., & Walden, E.A. (2001). Economics and electronic commerce: Survey and directions for research. International Journal of Electronic Commerce, 5, 5–116.

Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. NIST Special Publication, 10(800), 886.

Khairina, Y., Siew, E.G., & Yeow, P.H.P. (2012). Investigating the technological, organizational, and environmental influence on the adoption of audit technology among Malaysian audit firms. Retrieved July 3, 2014, from www.buseco.monash.edu.my

Kinuthia, J.N. (2015). Technological, organizational, and environmental factors affecting the adoption of cloud enterprise resource planning (ERP) systems. Semantic Scholar. Retrieved from https://pdfs.semanticscholar.org/fb6c/9f4d8648a9e39791694d9536d34af0aab2d2.pdf

Kohn, M.D., Eloff, M.M., & Eloff, J.H.P. (2013). Integrated digital forensic process model. Computers & Security, 38, 103–115.

Kruse, W., & Heiser, J.G. (2001). Computer forensics: Incident response essentials (1st ed.). Addison Wesley Professional.

Kruse, W., & Heiser, J.G. (2002). Computer forensics: Incident response essentials. Addison Wesley Professional.

Li, P., & Xie, W. (2012). A strategic framework for determining e-commerce adoption. Journal of Technology Management in China, 7(1), 22-35.

Martini, B., & Choo, K.-K.R. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 9(2), 71–80.

Mbugua Chahira, J., KinanuKiruki, J., & KipronoKemei, P. (2016). A proactive approach in network forensic investigation process. International Journal of Computer Applications Technology and Research, 5, 304-311. https://doi.org/10.7753/IJCATR0505.1012

McCreight, R. (2022). Reconceptualizing security vulnerabilities. In Handbook of Security Science. Springer, UK.

National Institute of Justice. (2008). Electronic crime scene investigation: A guide for first responders (2nd ed.). U.S. Department of Justice Office of Justice Programs. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/219941.pdf

Nicolas, M., et al. (2020). Advanced technologies adoption and use by U.S. firms: Evidence from the annual business survey. NBER Working Paper No. 28290. Retrieved from https://www.nber.org/system/files/working_papers/w28290/w28290.pdf

Oliveira, T., & Martins, M.F. (2011). Literature review of information technology adoption models at firm level. The Electronic Journal Information Systems Evaluation, 14(1), 110-121. Retrieved from www.ejise.com

Palmer, G. (2001). A road map for digital forensic research. In First Digital Forensic Research Workshop, Utica, New York (pp. 27–30).

Pangalos, G. (2010). The importance of corporate forensic readiness in the information security framework. Retrieved from www.researchgate.net/publication/221015022_The_Importance_of_Corporate_Forensic_Readiness_i n_the_Information_Security_Framework

Perumal, S. (2009). Digital forensic model based on Malaysian investigation process. International Journal of Computer Science and Network Security, 9, 38–44.

Pilli, E.S., Joshi, R.C., & Niyogi, R. (2010). A framework for network forensic analysis. SpringerLink. Retrieved from https://link.springer.com/chapter/10.1007/978-3-642-15766-0_21

PWC. (2016). Forensic investigations and fraud risk management. Retrieved from https://www.pwc.pl/en/services/forensic.html

Downloads

Published

01-10-2024

How to Cite

Wan Abdullah, W. A. M. ., Hussin, N. ., Ahmad, M. N. ., Samsudin, A. Z. H., & Jalil, A. (2024). Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia’s Critical Information Infrastructure Agencies. Journal of Information and Knowledge Management, 14(2), 127–137. https://doi.org/10.24191/jikm.v14i2.4474

Issue

Section

Articles