Chapter 3

Research Methodology

    Methodology

            Basically, this dissertation can be classified as a descriptive research dissertation which objects on analyzing computer forensics and its procedures and approach. In this regard, it is essential to have clear picture of the case on which the dissertation author wishes to collect significant and important facts and figures and pertinent information (Saunders et al, 2003)

Moreover, the research described in this research dissertation is solely based on qualitative research method which permits the research dissertation to be more flexible with the analysis as well as presentation. During the collection of the facts and figures and pertinent data, the choice and design of the approach and technique are modified constantly based on the ongoing investigation. Herein, the dissertation author may also have the chance to investigate essential aspects as they arise and permits the analysis to drop insignificant and important facts and figures from the original plan

            The qualitative approach models are more suitable for this research dissertation than the conventional models to be able to express states of incomplete knowledge about continuous strategies (Benjamin, 1994). The se of qualitative approach ensures to have plausible behaviors consistent with the knowledge in the qualitative mode. 

            The qualitative evaluation of the facts and figures and pertinent information typically refers to raw, descriptive information regarding global phenomenon from different areas which include the accounting system. Three facts and figures and pertinent information gathering approaches are considered in this model: this include direct observation, as well as in-depth, open-ended interviews. This research intends to investigate computer forensics and its procedures and approach.

Secondary Facts and figures and pertinent data

For this dissertation study, the author opted to use secondary facts and figures and pertinent data. In this regard, the dissertation author collated, gathered published documents as well as studies from different local and foreign libraries and universities significant and important to computer forensics and forensic accounting after collating significant and important information, the research will summarized the information make a conclusion based collated and analyzed data on the aims and objectives and provide insightful recommendation for the main issue which is about computer forensics.

Finding significant and important secondary information involves two interlinked facts. The first aspect is to identify whether the information are available as secondary facts and figures and pertinent information and the second aspect is finding the precise facts and figures and pertinent information  required for the dissertation (Saunders et al, 2003).

For this research dissertation, the dissertation author has been able to gather pertinent facts and figures and pertinent information for the research dissertation which is available through the literature review conducted previously. Because of the review, the researched has also been able to collect full and complete data resources to the needed facts and figures and pertinent data.

The use of secondary facts and figures and pertinent data will be used as the primary collection and gathering method which will also serve as validity and reliability indicators of the dissertation author ensuring that the collected facts and figures and pertinent information are balance and unbiased. According to authors like Mac Naughton, Rolfe & Siraj-Blatchford (2001), they have noted that the protocols used to ensure accuracy of qualitative facts and figures and pertinent information through alternative explanations by using different perspectives to examine issues which are called triangulation. In line with the case study approach, such could be done by using multiple sources of facts and figures and pertinent information are (Kaplan & Duchon, 1998; Foss & Ellefsen, 2002; Mingers, 2001). The need for triangulation arises from the ethical need to confirm the validity of the procedures and approaches (Yin, 2003).

This involves the use of existing facts and figures and pertinent data, collected for the purposes of a prior research dissertation, in order to pursue a research interest which is distinct from that of the original work (Scarbrough & Tanenbaum, 1998; Ruspini, 2002). Single or multiple qualitative facts and figures and pertinent information sets, as well as mixed qualitative and quantitative facts and figures and pertinent information sets are used to support or challenge the findings of the research dissertation (Gilmartin, Hesse-Biber & Lydenberg, 1999; Heaton, 2000).

A triangulated research approach wherein facts and figures and pertinent data, investigators, theories, and even methodologies are analyzed simultaneously to validate the findings of the research dissertation using different dissertation studies will be used (Darke, Shanks & Broadbent, 1998). The bulk of the research dissertation will be facilitated under the qualitative paradigm so as to elicit thick information which will be helpful in conceptualizing the arguments of the research endeavor. An in-depth analysis on the findings from the information collected through secondary facts and figures and pertinent information gathering techniques will be made focusing on the comparison of the different cases that the research dissertation will reveal during the organization of the facts and figures and pertinent data. In this regard, an in-depth cross-case comparison analysis will be the main methodology.
 

Data Analysis and Presentation

For the facts and figures and pertinent information analysis of the concepts of the research dissertation, content analysis will be utilized in the research dissertation. Content analysis is the systematic, replicable technique for compressing many words of text into fewer content categories based on explicit rules of coding (Markel, 1998; Fico, Lacy & Riffe, 1998; West, 2001). It is not restricted to the domain of textual analysis but could also include the categorization of illustrations or drawings (Wheelock, Haney & Bebell, 2000) as well as behaviors of individuals that are video tape recorded (Stigler et al, 1999).

The facts and figures and pertinent information collected through the key informant interview method were used and manipulated by utilizing the open-coding and axial coding procedures (Fico, Lacy & Riffe, 1998). This facilitated easier analysis of the qualitative information gathered as patterns, similarities and differences of the responses made by the informants of the research dissertation were classified and categorized to form logical facts and figures and pertinent information analysis and presentation. As such labels, words and statements that were used by the participants to denote or connote similar concepts and themes were grouped and analyzed accordingly to summarize the core findings of the research dissertation (Kerig & Lindahl, 2001; Fairclough, 2003).

As such, content analysis enables dissertation authors to sift through large volumes of facts and figures and pertinent information with relative ease in a systematic fashion (Markel, 1998; Fico, Lacy & Riffe, 1998; West, 2001) and is a useful technique for allowing us to discover and describe the focus of individual, group, institutional, or social attention (Kulm, Dager Wilson & Kitchen, 2005) which allows inferences to be made which can then be corroborated using other methods of facts and figures and pertinent information collection. In the cross-case analysis approach of the research dissertation, content analysis facilitated organized and logical sorting of large facts and figures and pertinent information from interviews in order to arrive at simpler concepts for analysis and discussion as well as in-depth interpretation of the specific cases that were explored so as to come up with holistic analysis of the findings of the research dissertation. As such attributes, constructs and other similar connotations of the topic of the research dissertation were grouped together to synthesize the results of the research dissertation as well as to manage the facts and figures and pertinent information more effectively and efficiently.

References

  • Arter, D. (2002) Quality Audits for Improved Performance.  ASQ Quality Press; 3 edition

  • Atrill, P. & McLaney, E. (2004) Financial Accounting for Decision Makers, 4th edn., Prentice-Hall, New Jersey.

  • Bandler, J. (1994) How to use Financial Statements: A Guide to Understanding the Numbers, McGraw-Hill, New York.

  • Nelson, Bill. Guide to Computer Forensics and Investigations. Boston, MA: Thomson Course Technology, 2004.

  •  

  • Byfield, Bruce, “IT Manager’s Journal; Tracking the Evolution of IT; “The two-edged sword: Legal computer forensics and open source; Legal and Regulatory. Available: http://www.management.itmanagersjournal.com. Retrieve October 2, 2009

  • Brian Carrier and Eugene H. Spafford. Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence, Fall 2003.

  • Brian D. Carrier and Eugene H. Spafford. Defining Event Reconstruction of a Digital Crime Scene. Journal of Forensic Sciences, 2004. To appear.

  • Casey, Eoghan. Digital Evidence and Computer Crime (Second Edition). San Diego, CA:

  • Farmer, Dan; Venema, Wietse (2005) Forensic Discovery. Addison-Wesley Professional, 2005.

  • Fried, D. Sondhi A. & White, G. (2003) The Analysis and Use of Financial Statements, 3rd edn, John Wiley & Sons Inc., New Jersey.

  • Meyers, Matthew and Rogers, Marc (2004), “Computer Forensics: The Need for Standardization and Certification,” International Journal of Digital Evidence, Fall 2004, Volume 2; Available: http://www.ijde.org. Retrieve October 2, 2009

  • Orin, Orin S., :Computer Records and the Federal Rules of Evidence; USA Bulletin (March 2001)

  • 13.  Guide to Public Financial Administration in Queensland (1982) ‘Role of the Auditor-General’, Queensland Government Printers, Brisbane.

    14.  Hamburger, P. (1991) ‘Evaluating Efficiency Auditing’ in J. Uhr, Program Evaluation, Federalism Research Centre, Canberra.

  • Kenneally, Erin, “Computer Forensics,” The Magazine of Usenix & Sage, August 2002 Volume 27-number

  • 16.  Leigland, Ryan, Krings, Axel W (2004)., “A Formalization of Digital Forensics,” International Journal of Digital Evidence; Fall 2004, Volume 3, Issue 2; Available: http://www.ijde.org. Retrieve October 2, 2009

  • Monaghan, C.T. (1989) ‘Comprehensive Auditing for Efficiency’ in Selected Addresses on Public Sector Auditing, no. 5, AAO, Canberra.

  • Reiffel v ACN 075 839 226 Ltd 1 (2003). Online available at http://www.findlaw.com.au/article/8502.htmb. Retrieve October 2, 2009

  • Robbins, Judd An Explanation of Computer Forensics, PC Software Forensics; Available: http://knock-knock.com. Retrieve October 2, 2009

  • Ryan, Daniel J., Shpantzer, George Washington University, “Legal Aspects of Digital Forensics” Available: http://www.danjryan.com. Retrieve October 2, 2009

  • Sharpe, M. (1992) Report of the Independent Audit on an Efficiency Audit of the Australian National Audit Office in Accordance with the Audit Act 1901, 18 September, AGPS, Canberra.

  • Schiehll, Eduardo and Andre, Paul (2003), “Corporate governance and the information gap: The use of financial and non-financial information in executive compensation.” Ivey Business Journal.

  • Mark Reith, Clint Carr, and Gregg Gunsch. An Examination of Digital Forensics Models. International Journal of Digital Evidence, Fall 2002.

  • Rowlingson, Robert (2004), Ph.D, “A Ten Step Process for Forensic Readiness,” International Journal of Digital Evidence,” Winter 2004,

  • U.S. Supreme Court (1984) United States v. Arthur Young & Co., 465 U.S. 805.  Accessed: August 12, 2009, Available online at: http://supreme.justia.com/us/465/805/case.html

  • Wall, Christopher and Paroff, Jason, “Cracking the Computer Forensics Mystery,” Utah Bar Journal, Available: http://www.krollontrack.com

  • Wegman, Jerry, Computer Forensics: Admissibility of Evidence in Criminal Cases; Available: http://www.e-evidence.info/legal2.html

  • [1] United States of America VS Zacarias Moussaoui (2002). Online available at http://notablecases.vaed.uscourts.gov/1:01-cr-00455/docs/68089/0.pdf. Retrieve November 5, 2009

     

    [2] Ibid

    [3] Zubulake v. UBS Warburg case (2004). Online available at http://www.worldcat.org/arcviewer/1/OCC/2007/08/08/0000070511/viewer/file936.pdf . Retrieve November 5, 2009

     

     

               

     


    Credit:ivythesis.typepad.com

    0 comments:

    Post a Comment

     
    Top