Yudi Prayudi

Work place: Department of Informatics, Universitas Islam Indonesia, Yogyakarta, Indonesia

E-mail: prayudi@uii.ac.id

Website:

Research Interests: Computer Architecture and Organization, Network Architecture, Network Security, Data Structures and Algorithms, Analysis of Algorithms

Biography

Yudi Prayudi, Currently he is a Ph.D Student at The Department of Computer Science and Electronics Gadjah Mada University and also a senior lecturer at Department of Informatics Universitas Islam Indonesia Yogyakarta, Indonesia. His research interests include digital forensics, cybercrime, watermarking, steganography, malware analysis and network security.

Author Articles
A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia

By Yudi Prayudi Ahmad Ashari Tri K Priyambodo

DOI: https://doi.org/10.5815/ijcnis.2015.11.01, Pub. Date: 8 Oct. 2015

Digital forensics will always include at least human as the one who performs activities, digital evidence as the main object, and process as a reference for the activities followed. The existing framework has not provided a description of the interaction between human, interaction between human and digital evidence, as well as interaction between human and the process itself. A business model approach can be done to provide the idea regarding the interaction in question. In this case, what has been generated by the author in the previous study through a business model of the digital chain of custody becomes the first step in constructing a business model of a digital forensics. In principle, the proposed business model already accommodates major components of digital forensics (human, digital evidence, process) and also considers the interactions among the components. The business model suggested has contained several basic principles as described in The Regulation of Chief of Indonesian National Police (Perkap) No 10/2010. This will give support to law enforcement to deal with cybercrime cases that are more frequent and more sophisticated, and can be a reference for each institution and organization to implement digital forensics activities.

[...] Read more.
Other Articles