Professional Documents
Culture Documents
Respondent 1: Currently, my basic job is with the Extraction of data and analysis. I also work on
reporting and interpretation of the data.
Respondent 2: 4 years
2. Do you feel your knowledge of digital forensics is adequate to fulfil your job duties?
Respondent 1: Hmm,I believe every day we need to learn new things and upgrade ourselves. I can’t say
I understand and know every side of the forensic process, but when it comes to extraction, I can say I am
very good at it.
Respondent 2: Yes. Due to my IT background, I can understand and follow the protocols in our industry.
Respondent 1:
Analogical Evidence
Anecdotal Evidence
Circumstantial Evidence
Digital Evidence.
Forensic Evidence
Respondent 2:
Respondent 2:
1.Mostly I read on Google Technologies update news
2.Also, I do online self-learning courses
3.Also, I have a technology group we share ideas.
4. On a scale of 1 to 5 describe your familiarity with IT, computers, and forensics.
Where 1= low; 2=below average; 3=average; 4= above average; 5=High
Respondent 1:
1 2 3 4 5
Digital Evidence 5
Computer Forensic Process 5
Computer Technology 5
Internet Applications 5
Respondent 2:
1 2 3 4 5
Digital Evidence 5
Computer Forensic Process 4
Computer Technology 4
Internet Applications 5
5. Do you feel the involvement of forensic evidence, in general, makes a case more or less
complicated than a case not involving forensic evidence?
Respondent 1: Yes
Respondent 2: Yes
Respondent 1:
Respondent 2:
12. Do you use any software/application/algorithm to extract evidence from a digital device?
Respondent 2: Cellebrite.
Factors Influencing Digital forensics
13. From a scale of 1 to 5 describe how the following influences digital forensics investigation.
Where 1= low; 2=below average; 3=average; 4= above average; 5=High
Respondent 1:
Factors 1 2 3 4 5
Heterogeneous sources of data 3
Expanding the diversity of digital devices 5
Diversity of data 5
anti-forensics (such as artefact wiping, data hiding, trail 5
obfuscation, data encryption, and attacks against
computer forensics tools and processes)
Big volume of data 5
Legal requirements such as compliance with the law 5
Efficiency of digital forensic departments 5
Respondent 2
Factors 1 2 3 4 5
Heterogeneous sources of data 5
Expanding the diversity of digital devices 4
Diversity of data 4
anti-forensics (such as artefact wiping, data hiding, trail 5
obfuscation, data encryption, and attacks against
computer forensics tools and processes)
Big volume of data 5
Legal requirements such as compliance with the law 5
Efficiency of digital forensic departments 5