Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors
نویسندگان
چکیده
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how mobile users respond to social engineering attacks conducted via mobile devices. The results of this experiment outline a guided mobile phone forensics investigation method which could facilitate the work of digital forensics investigators while analysing the data from mobile devices. The behavioural response of users could be impacted by several aspects, such as impulsivity, smartphone usage and security or simply awareness that QR codes could contain malware. The findings indicate that the impulsivity of users is one of the key areas that determine the common mistakes of mobile device users. As a result, an investigative framework for mobile phone forensics is proposed based on the impulsivity and common mistakes of mobile device users. As a result, an investigative framework for mobile phone forensics is proposed based on the impulsivity and common mistakes of mobile device users. It could help the forensics investigators by potentially shortening the time spent on investigation of possible breach scenarios.
منابع مشابه
Sharing Is Caring: a Data Exchange Framework for Co-located Mobile Apps
Data sharing between mobile apps that are co-located in a smartphone may lead to synergistic benefits to the user especially in the health-care domain. Mobile apps that monitor and control user behavior can interact to engage the user into a healthy schedule over a long term. In the current app development paradigm, apps are being developed individually and agnostic of each other. To enable int...
متن کاملMobile Forensics "triaging": new directions for methodology
Over the past few years Mobile Forensics, the branch of Digital Forensics that deals with gathering, retrieving, identifying, storing and documenting mobile phone’s evidence with probative value in court, has become more and more specialized. Nowadays, specific extraction tools have been developed in order to acquire and store phone’s content and digital evidence, in compliance with forensic me...
متن کاملسیستم پیشنهاد دهنده زمینهآگاه برای انتخاب گوشی تلفن همراه با ترکیب روشهای تصمیمگیری جبرانی و غیرجبرانی
Recommender systems suggest proper items to customers based on their preferences and needs. Needed time to search is reduced and the quality of customer’s choice is increased using recommender systems. The context information like time, location and user behaviors can enhance the quality of recommendations and customer satisfication in such systems. In this paper a context aware recommender sys...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1706.08048 شماره
صفحات -
تاریخ انتشار 2017