Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
Law enforcement officers should now expect to encounter forms of digital evidence at most of their inquiries, and as a result ensure they are prepared to effectively deal with it. This should involve the production of a digital evidence strategy (DES) which describes those actions required of any investigative team to effectively identify, collect, examine, and evaluate any digital devices/data, while also defining the circumstances for when it is appropriate to conduct such tasks. To help officers to produce robust DESs this work provides a DES template which utilizes the “GAMEPLANS” acrostic to identify nine fundamental components that are required of all DESs—“G”–Grounds for investigation; “A”–Authorization; “M”–Method of investigation; “E”–Evaluation of the meaning of any findings; “P”–Proportionality; “L”–Logic; “A”–Agreement; “N”–Necessity; “S”–Scrutiny. Each of these components are described including the sub‐tasks that are contained within each, which any officer constructing a robust and effective DES must address (and provide evidence of having addressed). To support this, a DES template file is also provided, which can be utilized by officers.
Law enforcement officers should now expect to encounter forms of digital evidence at most of their inquiries, and as a result ensure they are prepared to effectively deal with it. This should involve the production of a digital evidence strategy (DES) which describes those actions required of any investigative team to effectively identify, collect, examine, and evaluate any digital devices/data, while also defining the circumstances for when it is appropriate to conduct such tasks. To help officers to produce robust DESs this work provides a DES template which utilizes the “GAMEPLANS” acrostic to identify nine fundamental components that are required of all DESs—“G”–Grounds for investigation; “A”–Authorization; “M”–Method of investigation; “E”–Evaluation of the meaning of any findings; “P”–Proportionality; “L”–Logic; “A”–Agreement; “N”–Necessity; “S”–Scrutiny. Each of these components are described including the sub‐tasks that are contained within each, which any officer constructing a robust and effective DES must address (and provide evidence of having addressed). To support this, a DES template file is also provided, which can be utilized by officers.
Practical and empirical question dominating the discussion is whether or not the remote forensic auditing techniques and capabilities in detection of fraud schemes in remote workforce. The overall intent of this article is to examine the merits, and opportunities of the use of remote forensic auditing techniques in addressing the challenges for internal audits and controls during the outbreak of COVID 19 and beyond in tackling fraud schemes in remote workforce. Scoping review of literature methodological framework was employed. Studies extracted from five electronic databases such as Emerald insight, Springer, Semantic Scholar, Science Direct, IEEE Xplore Digital Library. Data was thematically analysed. The theoretical framework used in this article were Technology-Organisation-Environment (TOE) which consider the influence of technology, organisation, and environment factors on the adoption and implementation of new technology on forensic auditing and the fraud triangle which consider factors behind fraud perpetrators during COVID19. The research results revealed that the use of remoted forensic auditing tools and techniques can potentially address address the weakness of internal controls and audits on fraud schemes during pandemic levels and beyond in the remote workforce. This article contributes to the to the current body of knowledge and deepens understanding on remote forensic auditing tools and techniques on fraud schemes in remote workforce. It also provides further discussion regarding what forensic auditors practitioners, internal auditors and companies can do to adapt and adopt remote forensic auditing techniques, remote forensic software and hardware tools. The study contributed to theoretical and practical contributions and proposes a remote forensic auditing framework to assist all auditors to deepen their remote and digital forensic investigation. Thus, the article recommends remote forensic auditing framework to address the issues of fraud schemes in remote workforce in South Africa context and beyond.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.