APPLICATION OF DIGITAL FORENSICS IN CYBERCRIME INVESTIGATIONS: THEORETICAL FRAMEWORK

Authors

  • Inda Kreso Faculty of Criminal Justice, Criminology and Security Studies University of Sarajevo, Bosnia and Herzegovina

Keywords:

cybercrime, investigation, digital forensics, digital evidence preservation

Abstract

Crime evolves in accordance with contemporary trends, particularly those associated with technological advancements. As technology progresses, criminal activity likewise adapts, with cybercrime as a prominent illustration of this phenomenon. Given the persistent rise in cybercrime, including hacking, identity theft, and ransomware attacks, our responses must be equally robust and effective. Investigating cybercrime presents significant challenges. Despite advancements in technology, the difficulties surrounding cybercrime investigations continue to evolve. Digital forensics is a valuable tool for investigating cybercrime. The tools used in digital forensics can significantly improve the effectiveness of these investigations. Literature suggests using digital forensics methodology and tools to enhance the identification, collection, and preservation of digital evidence in cybercrime investigations, improving the accuracy and reliability of the investigations. This paper undertakes a literature review as its methodological framework to illustrate that integrating digital forensics in the investigation phase may significantly enhance the effectiveness of cybercrime investigations. The prevalence of cybercrime is a significant issue in modern society. Criminology, as a scientific discipline, must consistently and actively study the phenomenon of cybercrime. Technology is advancing at a rapid pace, making it essential to stay updated with the latest trends to effectively combat cybercriminals. The academic community recognizes digital forensics as a crucial research area. Nonetheless, a gap remains that calls for new studies focusing on the significance of thorough investigations into cybercrime. Existing literature indicates that there is no universally accepted definition of cybercrime. A common approach in defining cybercrime involves identifying the key concepts and terms relevant to cybercrime investigations. To accurately define cybercrime, literature suggests classifying it into five categories: unauthorized access to computer data and systems, unauthorized interception of data confidentiality, interference with data and systems, and computer-related forgery and fraud. Additionally, offenses such as child pornography and violations of copyright rights are considered as cybercrime. These categories collectively encapsulate the various facets of cybercrime. It is crucial to differentiate between pure cybercrime and crime facilitated by cyberspace. This paper will investigate pure cybercrime and apply digital forensics within that context. Pure cybercrime, or cyber-dependent crimes, can only be committed through computers, computer networks, and other information communication technology. This includes spreading viruses and malware, hacking, and launching distributed denial-of-service (DDoS) attacks. It is crucial to emphasize that pure cybercrime is directed against computers and computer networks. On the other hand, cyber-enabled crimes have been increasing in recent years due to the widespread use of computers, computer networks, and other forms of information technology. Unlike pure cybercrime, which solely relies on information technology, cyber-enabled crimes can also occur without using such technology, including traditional fraud and theft. While cyber fraud and theft can be perpetrated in a digital environment, they are not inherently dependent on information technology. Investigating cybercrime is a complex task. A skilled hacker or cybercriminal is the opposite of a cybercrime investigator, which adds to the challenges of cybercrime investigation. Digital forensics refers to the practice of identifying, recovering, and analyzing electronic data in order to unveil and interpret crucial information. Its primary objective is to preserve the integrity of evidence, ensuring it remains in its original condition. This process entails a thorough and systematic investigation, which includes the collection, identification, and validation of digital information to accurately reconstruct previous events. Digital forensics has emerged as an indispensable tool in the investigation of crimes, particularly in relation to cybercrime and therefore it is very important to research application of digital forensics in cybercrime investigations.

References

Adedayo M. Balogun, & Tranos Zuva. (2018). Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution.

Akter, O., Akther, A., Uddin, M. A., & Manowarul Islam, M. (2020). Cloud Forensics: Challenges and

Blockchain Based Solutions. International Journal of Wireless and Microwave Technologies, 10(5), 1–12. https://doi.org/10.5815/ijwmt.2020.05.01

AlKhanafseh, M., & Surakhi, O. (2024). Evidence Preservation in Digital Forensics: An Approach Using Blockchain and LSTM-Based Steganography. Electronics, 13(18), 3729. https://doi.org/10.3390/electronics13183729

Almutairi, W., & Moulahi, T. (2023). Joining Federated Learning to Blockchain for Digital Forensics in IoT. Computers, 12(8). https://doi.org/10.3390/computers12080157

Alotaibi, F., Al-Dhaqm, A., & Al-Otaibi, Y. D. (2023). A Conceptual Digital Forensic Investigation Model Applicable to the Drone Forensics Field. Engineering, Technology and Applied Science Research, 13(5), 11608–11615. https://doi.org/10.48084/etasr.6195

Arshad, H., Jantan, A. Bin, & Abiodun, O. I. (2018). Digital forensics: Review of issues in scientific validation of digital evidence. Journal of Information Processing Systems, 14(2), 346–376. https://doi.org/10.3745/JIPS.03.0095

Aswathnarayanan, K., & Karthik, M. A. (2024). “Enhancing Cybercrime Investigation Capabilities: A Comprehensive Analysis of the Tamil Nadu Police Department’s Cyber Cell and Operational Procedures.” In Madhya Pradesh Journal of Social Sciences A biannually Journal of M. P. Institute of Social Science Research (Vol. 29, Issue 5). https://www.researchgate.net/publication/384145246

Atlam, H. F., Ekuri, N., Azad, M. A., & Lallie, H. S. (2024). Blockchain Forensics: A Systematic Literature Review of Techniques, Applications, Challenges, and Future Directions. In Electronics (Switzerland) (Vol. 13, Issue 17). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/electronics13173568

Ayotunde, J. (2022). The Effectiveness of Cybercrime Investigations and Prosecution in Nigeria. https://www.researchgate.net/publication/388658641

Batista, D., Mangeth, A. L., Frajhof, I., Alves, P. H., Nasser, R., Robichez, G., Silva, G. M., & Miranda, F. P. de. (2023). Exploring Blockchain Technology for Chain of Custody Control in Physical Evidence: A Systematic Literature Review. In Journal of Risk and Financial Management (Vol. 16, Issue 8). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/jrfm16080360

Bhat, W. A., AlZahrani, A., & Wani, M. A. (2021). Can computer forensic tools be trusted in digital investigations? Science and Justice, 61(2), 198–203. https://doi.org/10.1016/j.scijus.2020.10.002

Billard, D. (2018). Weighted forensics evidence using blockchain. ACM International Conference Proceeding Series, Part F137704, 57–61. https://doi.org/10.1145/3219788.3219792

Bonomi, S., Casini, M., & Ciccotelli, C. (2020). B-CoC: A blockchain-based chain of custody for evidences management in digital forensics. OpenAccess Series in Informatics, 71. https://doi.org/10.4230/OASIcs.Tokenomics.2019.12

Brown, C. S. D. (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55–119. https://doi.org/10.5281/zenodo.22387

Chavhan, M. S., Nirkhi, M., Tech Scholar, M., & Professor, A. (n.d.). Visualization Techniques for Digital forensics: A Survey. In International Journal of Advanced Computer Research.

Chen, C., & Dong, B. (2023). Digital forensics analysis based on cybercrime and the study of the rule of law in space governance. Open Computer Science, 13(1). https://doi.org/10.1515/comp-2022-0266

Choi, H., Lee, S., & Jeong, D. (2021). Forensic Recovery of SQL Server Database: Practical Approach. IEEE Access, 9, 14564–14575. https://doi.org/10.1109/ACCESS.2021.3052505

Da-Yu Kao, Fuching Tsai, Yi-Ting Chao, & Chia-Yang Huang. (2018). Digital Evidence Analytics Applied in Cybercrime Investigations.

Dimitriadis, A., Ivezic, N., Kulvatunyou, B., & Mavridis, I. (2020). D4I - Digital forensics framework for reviewing and investigating cyber attacks. Array, 5, 100015. https://doi.org/10.1016/j.array.2019.100015

Ding, Z. (2025). The Difficulties and Approaches in Investigate Evidence of New Types Cybercrime. Scientific Journal Of Humanities and Social Sciences, 7, 2025.

Du, X., Le-Khac, N.-A., & Scanlon, M. (n.d.). Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service.

Dubey, H., Bhatt, S., & Negi, L. (2023). Digital Forensics Techniques and Trends: A Review. International Arab Journal of Information Technology, 20(4), 644–654. https://doi.org/10.34028/iajit/20/4/11

Eboibi, F. (2020). A Critical Examination of Cybercrime Investigation Agency under the Nigerian Cybercrimes Act 2015. https://www.researchgate.net/publication/342657697

Efanov, D., & Roschin, P. (2018). The all-pervasiveness of the blockchain technology. Procedia Computer Science, 123, 116–121. https://doi.org/10.1016/j.procs.2018.01.019

Ekuma, N., & Fon, Y. (n.d.). Blockchain Technology for Secure and Transparent Evidence Management in Criminal Investigations

Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7(SUPPL.). https://doi.org/10.1016/j.diin.2010.05.009

Goni, I., Mishion Gumpy, J., Umar Maigari, T., Muhammad, M., & Saidu, A. (2020). Cybersecurity and Cyber Forensics: Machine Learning Approach. Machine Learning Research, 5(4), 46. https://doi.org/10.11648/j.mlr.20200504.11

Gopalan, S. H., Suba, S. A., Ashmithashree, C., Gayathri, A., & Jebin Andrews, V. (2019). Digital forensics using blockchain. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 182–184. https://doi.org/10.35940/ijrte.B1030.0982S1119

Gorda, M. D., & Chechulin, A. A. (2023). Cybercrime investigation model. Informatization and Communication, 3. https://doi.org/10.34219/2078-8320-2023-14-3-92-97

Hamid Lone, A., & Naaz Mir, R. (2017). FORENSIC-CHAIN: ETHEREUM BLOCKCHAIN BASED DIGITAL FORENSICS CHAIN OF CUSTODY. In Scientific and Practical Cyber Security Journal (SPCSJ) (Vol. 1, Issue 2).

Horan, C., & Saiedian, H. (2021). Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions. Journal of Cybersecurity and Privacy, 1(4), 580–596. https://doi.org/10.3390/jcp1040029

Horsman, G. (2019). Tool testing and reliability issues in the field of digital forensics. Digital Investigation, 28, 163–175. https://doi.org/10.1016/j.diin.2019.01.009

Jain, R., & Sonowal, B. (2025). Analyzing the Procedure for Investigation in Cybercrime and Admissibility of Electronic Evidence (pp. 265–289). https://doi.org/10.1007/978-3-031-80557-8_12

Kreso, I. (2025). USING BLOCKCHAIN TECHNOLOGY FOR PRESERVING DIGITAL EVIDENCE IN DIGITAL FORENSICS. In KNOWLEDGE-International Journal (Vol. 68, Issue 3).

Lone, A. H., & Mir, R. N. (2019). Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer. Digital Investigation, 28, 44–55. https://doi.org/10.1016/j.diin.2019.01.002

Mahrous, W. A., Farouk, M., & Darwish, S. M. (2021). An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash. IEEE Access, 9, 151327–151336. https://doi.org/10.1109/ACCESS.2021.3126715

Maratsi, M. I., Popov, O., Alexopoulos, C., & Charalabidis, Y. (2022). Ethical and Legal Aspects of Digital Forensics Algorithms: The Case of Digital Evidence Acquisition. ACM International Conference Proceeding Series, 32–40. https://doi.org/10.1145/3560107.3560114

Mohammed, K. H., Mohammed, Y. D., & Solanke, A. A. (2019). Cybercrime and Digital Forensics: Bridging the gap in Legislation, Investigation and Prosecution of Cybercrime in Nigeria. The International Journal of Cybersecurity Intelligence and Cybercrime, 2(1), 56–63. https://doi.org/10.52306/02010519zjrk2912

Muyambo, E., & Omeleze Baror, S. (n.d.). Systematic Review to Propose a Blockchain-Based Digital Forensic Ready Internet Voting System.

Nouh, M., Nurse, J. R. C., Webb, H., & Goldsmith, M. (2019, March 23). Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. https://doi.org/10.14722/usec.2019.23032

Oerlemans, J. J. (2017). Investigating cybercrime. Meijers-reeks. In J. J.

Oerlemans, J.-J., & Galič, M. (n.d.). Cybercrime investigations.

Page, H., Horsman, G., Sarna, A., & Foster, J. (2019). A review of quality procedures in the UK forensic sciences: What can the field of digital forensics learn? Science and Justice, 59(1), 83–92. https://doi.org/10.1016/j.scijus.2018.09.006

Patil, S., Kadam, S., & Katti, J. (2021). Security enhancement of forensic evidences using blockchain. Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021, 263–268. https://doi.org/10.1109/ICICV50876.2021.9388486

Sathyaprakasan, R., Govindan, P., Alvi, S., Sadath, L., Philip, S., & Singh, N. (2021). An Implementation of Blockchain Technology in Forensic Evidence Management. Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021, 208–212. https://doi.org/10.1109/ICCIKE51210.2021.9410791

Scholarworks, S., & Beardall, D. (2023). Unveiling the Digital Shadows: Cybersecurity and the Art of Digital Forensics.

Shatakshi Johri. (2024). Strengthening Digital Forensics with Blockchain Technology and Algorithms. World Journal of Advanced Research and Reviews, 24(2), 459–467. https://doi.org/10.30574/wjarr.2024.24.2.3317

Sikos, L. F. (2021). AI in digital forensics: Ontology engineering for cybercrime investigations . WIREs Forensic Science, 3(3). https://doi.org/10.1002/wfs2.1394

Sunde, N., & Dror, I. E. (2019). Cognitive and human factors in digital forensics: Problems, challenges, and the way forward. Digital Investigation, 29, 101–108. https://doi.org/10.1016/j.diin.2019.03.011

Sviatun, O. V., Goncharuk, O. V., Chernysh, R., Kuzmenko, O., & Kozych, I. V. (2021). Combating cybercrime: Economic and legal aspects. WSEAS Transactions on Business and Economics, 18, 751–762. https://doi.org/10.37394/23207.2021.18.72

Tsai, F. C. (2021). The application of blockchain of custody in criminal investigation process. Procedia Computer Science, 192, 2779–2788. https://doi.org/10.1016/j.procs.2021.09.048

Tyagi, A. K., Balogun, B. F., & Tiwari, S. (2024). Role of blockchain in digital forensics: A systematic study. In Global Perspectives on the Applications of Computer Vision in Cybersecurity (pp. 197–222). IGI Global. https://doi.org/10.4018/978-1-6684-8127-1.ch008

van Beek, H. M. A., van den Bos, J., Boztas, A., van Eijk, E. J., Schramp, R., & Ugen, M. (2020). Digital forensics as a service: Stepping up the game. In Forensic Science International: Digital Investigation (Vol. 35). Elsevier Ltd. https://doi.org/10.1016/j.fsidi.2020.30102

Vincze, E. A. (2016). Challenges in digital forensics. Police Practice and Research, 17(2), 183–194. https://doi.org/10.1080/15614263.2015.1128163

Wu, Y., Xiang, D., Gao, J. M., & Wu, Y. (2019). Research on investigation and evidence collection of cybercrime Cases. Journal of Physics: Conference Series, 1176(4). https://doi.org/10.1088/1742-6596/1176/4/042064

Yunianto, E., Prayudi, Y., & Sugiantoro, B. (2019). B-DEC: Digital Evidence Cabinet based on Blockchain for Evidence Management. In International Journal of Computer Applications (Vol. 181, Issue 45).

Downloads

Published

2025-08-20

How to Cite

Kreso, I. (2025). APPLICATION OF DIGITAL FORENSICS IN CYBERCRIME INVESTIGATIONS: THEORETICAL FRAMEWORK. KNOWLEDGE - International Journal , 71(1), 197–203. Retrieved from http://ojs.ikm.mk/index.php/kij/article/view/7648