CFP last date
20 January 2025
Reseach Article

A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying

by Victor R. Kebande, Nickson M. Karie, Stacey Omeleze
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 1
Year of Publication: 2016
Authors: Victor R. Kebande, Nickson M. Karie, Stacey Omeleze
10.5120/ijca2016909193

Victor R. Kebande, Nickson M. Karie, Stacey Omeleze . A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying. International Journal of Computer Applications. 140, 1 ( April 2016), 28-33. DOI=10.5120/ijca2016909193

@article{ 10.5120/ijca2016909193,
author = { Victor R. Kebande, Nickson M. Karie, Stacey Omeleze },
title = { A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 1 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number1/24561-2016909193/ },
doi = { 10.5120/ijca2016909193 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:41:09.031275+05:30
%A Victor R. Kebande
%A Nickson M. Karie
%A Stacey Omeleze
%T A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 1
%P 28-33
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The existence of mobile devices in today’s modern society has generated greater advantages to many users especially within the African continent with regard to how information is being disseminated. However, the efficacy of mobile device technology has not come without some drawbacks, especially with the proliferation of Internet enabled mobile devices among young people. Trends of cyber-bullying, for example, are on the increase and recent studies in South Africa have shown that the use of mobile devices among school pupils between the ages of 2 to 17 years is at 60%. This can only be attributed to mobile device proliferation, increased cyber technologies like social network and change of communication modes. For this reason, one might end up being excluded from this environment if one excludes oneself from the modern communication culture. However, with all this advances in mobile communication technologies, there lacks proper guidance on the side of young people with regard to the proper use of mobile devices and their forensic readiness capability. This is aggravated by the fact that a bigger percentage of parents also have no knowledge of what young people do online especially with their mobile device features such as online chat rooms, cyber-bullying, and sexting. Therefore, the problem being addressed in this paper is that: by the time of writing this paper, there exist no reliable and effective mobile forensic readiness models that can be used to create awareness to both young people and their parents on how to minimize cyber-bullying. This paper thus proposes a mobile forensic readiness model that can minimize cyber bullying, enhance awareness on issues of cyber bullying as well as the creation of parental guidance information on cyber bullying. The model can also act as a monitoring tool that can be embedded on different mobile devices assigned to, for example, learners and minors. The embedded model can then help parents and guardians to identify and maintain control of the various information and online activities that children engage in. Mobile forensic readiness model aimed at minimizing cyber bullying, as well as enhance awareness on issues of cyber bullying, constitutes the main contribution of this paper.

References
  1. California Senate Bill No. 1841. (April 19, 2004). Retrieved on February 23, 2016 from Website: http://www.steptoe.com/publications/315c.pdf
  2. Olweus, D. "Victimization by peers: Antecedents and long-term outcomes," in Social withdrawal, inhibitions and shyness, K. Rubin and J. Asendorf, Eds. Hillsdale, NJ: Lawrence Erlbaum Associates, 1993, pp. 315-341.
  3. Danesh, A., Inkpen, K., Lau, F., Shu, K., & Booth, K. (2001). Geney: De-signing a collaborative activity for the Palm handheld computer. Proceedings of CHI, Conference on Human Factors in Computing Systems.Seattle: WA.
  4. Roschelle, J. (2003). Unlocking the value of wireless mobile devices. Journal of Computer Assisted Learning 19, 260–272.
  5. K. Brown and S. Singh, "A Network Architecture for Mobile Computing," in Proc. of INFOCOM'96, IEEE, pp.1388-1396, March 1996.
  6. Peng, W. C., & Chen, M. S. (2005). Query processing in a mobile computing environment: Exploiting the features of asymmetry. Knowledge and Data Engineering, IEEE Transactions on, 17(7), 982-996.
  7. Rowlingson, R. (2004). A ten step process for forensic readiness. International Journal of Digital Evidence, 2(3), 1-28.
  8. ISO/IEC 27043: 2015. Information technology -- Security techniques -- Incident investigation principles and processes. Accessed at http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44407
  9. Kebande, V. R., & Venter, H. S. (2014). A Cloud Forensic Readiness Model Using a Botnet as a Service. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 23-32). The Society of Digital Information and Wireless Communication.
  10. E. Menesini, Smith, P K and Žukauskiene, R, (2009): Cyberbullying: “Coping with negative and enhancing positive uses of new technologies, in relationships in educational settings," Mykolas Romeris University Publishing Center, Lithuania.
  11. S. Hinduja and J. Patchin,(2010) "Bullying, Cyberbullying, and suicide," Archives of Suicide Research, vol. 14, pp. 206-221.
  12. S. Hinduja and J. Patchin(2015)” Cyberbullying Research Center, accessed at” http://cyberbullying.org/2015-data/”
  13. Karthik D.,Roi R. and Henry L.(2011) Modeling the Detection of Textual Cyberbullying. Association for the Advancement of Artificial Intelligence
  14. Lambros L., Vassilis B., Despoina O., Haralambos T., (2013) A process model of cyberbullying in adolescence. Computers in Human Behavior.Vol. 29, No.3.,Pages 881–887.
  15. Serra, S.M. and Venter, H.S., (2010). Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. Information security South Africa conference.
  16. Darryl T. B., (2009). Content Monitoring Issues - Legal and Otherwise. SANS Institute InfoSec Reading Room.
  17. Kebande, V. R., & Venter, H. S. (2015, February). Obfuscating a Cloud-Based Botnet Towards Digital Forensic Readiness. In Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security (p. 434). Academic Conferences Limited.
  18. Kebande, V. R., & Venter, H. S. (2015, August). Adding event reconstruction to a Cloud Forensic Readiness model. In Information Security for South Africa (ISSA), 2015 (pp. 1-9). IEEE.
  19. Kebande, V., & Venter, H. S. (2015, July). A Functional Architecture for Cloud Forensic Readiness Large-scale Potential Digital Evidence Analysis. In Proceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015 (p. 373). Academic Conferences Limited.
  20. Tan, J. (2001). Forensic readiness. Cambridge, MA:@ Stake, 1-23.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile forensic readiness model cyber bullying Mobile devices content monitoring.