Computer & Cyber Forensics: A Case Study of Ghana

  • Mohammed Mahfouz Alhassan Zhejiang Normal University, College of Mathematics, Physics& Information Engineering 688 tying bin road, Jinhua Zhejiang Province 321004, China
  • Alexander Adjei-Quaye Zhejiang Normal University, College of Mathematics, Physics& Information Engineering 688 tying bin road, Jinhua Zhejiang Province 321004, China
Keywords: Computer and cyber forensics fundamental importance and concerns to all security agencies.

Abstract

The study was to examine the importance for the study of computer and cyber forensics on the performance of the Ghanaian security agencies, namely the bureau of national investigations and the Ghana police service.(BNI)Ghanaian security agencies with a case study at Ghana police service and bureau of national investigations. Information and Communication Technology (ICT) is at the center of the world today. The applications and concepts, techniques, policies and implementation strategies to security services has become a subject of fundamental importance and concerns to all security agencies and indeed a prerequisite for local and global competitiveness. The purpose of the research is to assess and evaluate the impact of computer related crimes on the continent of Africa and especially Ghana in particular. The Bureau of National Investigations, (BNI), to find the positive and negative  impact of  ICT  and its related  contributions in the everyday life of Ghanaian security agencies, especially the BNI and GPS ones(once) to examine how ICT has helped reduce and prevent crime and also  cost of  identifying and preventing crimes thus to determine the efficient use of information technology to help fight corruption at workplaces, prevent and protect the country and its people from any kind fraud within or attached that will be launched on the Ghanaian soil using ICT. 

References

[1].United States Department of Justice’s Cyber Crime website. Retrieved from http://www.cybercrime.gov.
[2] United States Department of Justice. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Retrieved from. http://www.cybercrime.gov
[3] Wouter Alink, Raoul Bhoedjang, Peter Boncz, and Arjen de Vries. From the proceedings of The Digital Forensic Research Conference DFRWS 2006 USA Lafayette, IN (Aug 14th - 16th)
[4] U.S. Department of Justice Office of Justice Programs, National Institute of Justice, NIJ Special report.April (04)
[5] A Simplified Guide To Digital Evidence, ELECTRONIC CSI, A GUIDE FOR FIRST RESPONDERS,2ND EDITION, National Institute of Justice, April 2008
[6] Rick Ayers Sam Brothers Wayne Jansen, Guidelines on Mobile Device Forensics, NIST Special Publication 800-101 Revision 1, May 2014
[7] U.S. Department of Justice Office of Justice Programs National Institute of Justice, crime scene investigation, A Guide for Law Enforcement A Guide for Law Enforcement, research report. January 2000
[8] Casey, Eoghan. Digital evidence and computer crime: forensic science, computers, and the internet, with contributions from Susan W. Brenner 3rd edition.
[9 Daniel J. Ryan, Gal Shpantzer, Legal Aspects of Digital Forensics,
[10] Jordan Robertson, U.S Mulls stiffer sentences for, Net proxy crime, Associated press updated 4/14/2009 1:17:14 PM ET
Published
2017-02-23
Section
Articles