CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Awareness and Understanding of Computer Forensics in the Ghana Legal System

by Michael Adjei Frempong, Kamal Kant Hiran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 20
Year of Publication: 2014
Authors: Michael Adjei Frempong, Kamal Kant Hiran
10.5120/15752-4640

Michael Adjei Frempong, Kamal Kant Hiran . Awareness and Understanding of Computer Forensics in the Ghana Legal System. International Journal of Computer Applications. 89, 20 ( March 2014), 54-59. DOI=10.5120/15752-4640

@article{ 10.5120/15752-4640,
author = { Michael Adjei Frempong, Kamal Kant Hiran },
title = { Awareness and Understanding of Computer Forensics in the Ghana Legal System },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 20 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 54-59 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number20/15752-4640/ },
doi = { 10.5120/15752-4640 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:09:48.730991+05:30
%A Michael Adjei Frempong
%A Kamal Kant Hiran
%T Awareness and Understanding of Computer Forensics in the Ghana Legal System
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 20
%P 54-59
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this era of Technological age also called digital age, most transactions are conducted electronically. This modern-day paradigm makes way for the possibility of harmful unanticipated information security breaches of both civil and criminal nature. However, there is a tremendous knowledge gap in the legal system concerning computer/digital forensics with respect to digital evidence. Courtroom and Legal issues relevant to computer/digital forensics are extensive and differs with respect to procedural evidence rules that ensure reliability of the evidence so produced in the court of law for fair adjudication. Electronic evidence is very fundamental to the successful handling of cases related to such information security breaches. This paper on the impact of awareness and understanding of computer/digital forensics in the Ghana Legal System especially Judges, with regards to the electronic evidence, laws and jurisprudence covered twenty (20) superior Judges. The findings revealed a gap between the Judges and issues on computer forensics which if not looked at may create problems in relation to the influx of computer related crimes.

References
  1. Reyes, A & Wiles, J. , 2007. The Best Damn Cybercrime and Forensics. Burlington: MA. Syngress Publishing Inc.
  2. IC3, 2012. 2012_ic3report. pdf. Retrieved November 18,2013, from http://www. ic3. gov/media/annualreport/
  3. Vacca, J. R. , 2005. Computer Forensics: Computer Crime Scene Investigation, 2nd Edition. Boston, Massachussetts: Rinvers Media Inc.
  4. Robbins, J. , An Explanation of Computer Forensics, PC Software Forensics.
  5. Mack, M. 2003. Electronic Discovery Versus Computer Forensics. Law Journal1, New Jersey.
  6. Cohen, F. 2008/2010. Challenges to Digital Forensics Evidence/Digital Forensics Examination, 2nd Edition. Livemore, CA: ASP Press.
  7. Casey, E. , 2011. Digital Evidence and Computer Crime: Forensics Science, Computer and the Internet, 3rd ed. Amsterdam, Netherlands: Elsevier Academic Press.
  8. Mason, S. , 2008. Judges and Technical Evdience, 2nd International Conference on Cyberforensics Education and Training. Canterbury, UK.
  9. Cohen, F. 2008. Challenges to Digital Forensics Evidence. Livemore, CA: ASP Press. Kerr, O. S. , 2009. Computer Crime Law, 2nd ed. St. Paul. MN: Thomson/West.
  10. Wegman, J. , 2005. Computer Forensics: Admissibility of Evidence in Criminal cases. Journal of Legal Ethical and Regulatory Issues 8(1).
  11. Ball, C. , 2008. What Judges should know about Computer Forensics. National Workshop for District Judges II.
  12. Rogers, M. , Scarborough, K. , & San Martin, C. , 2007. Survey of Law Enforcement perceptions regarding Digital Evidence. In P. Craiger & S. Shenoi, eds. , International Federation for Information Processing (IFIP). Boston, MA: Blackwell.
  13. Marisco, C. , 2004. Computer Evidence V. Daubert: The coming Conflict (CERIAS Tech Report 2005-17). Retrieved November 19, 2013, from htt://www. Cerias. purdue. edu/booksshelf/archive/2005-17. pdf.
  14. Van Buskik, E. , & Liu, V. T. , 2006. Digital Eivdence: Challenging the prersumption of reliability. Journal of Digital Forensic Practice 1(1), 19 – 26.
  15. Losavio, M. , Wilson, D. , & Elmaghraby, A. , 2006. Prevalence, Use and Evidentiary issues of Digital Evidence of cellular telephone consumer and small – scale digital devices. Journal of Digital Forensic Practice, 1(4), 291 – 296.
  16. Parahoo, K. , 1997. Nursing Research: Principles, Process, Issues. London: Macmillan.
  17. Glaser, B. G. , & Strauss, A. L. , 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. New York: Aldine de Gruyter.
Index Terms

Computer Science
Information Sciences

Keywords

Computer Forensic Digital Evidence Admissibility Rules of Evidence.