INTRODUCTION
A scientific paper is written to answer a specific question or fulfill a specific research aim. That explains why absolute care should be taken by anyone attempting to write a specific paper.The following are some points to be observed when writing a scientific paper.The given suggestions if observed well will go along way in improving the quality of any scientific write up.
Guidlines on writing good scientific papers
1. Know your audience and write for that specific audience.
Scientific and technical writing can never be "general purpose"; it must be written for a specific audience.The audience could be a community of biologists, who study a particular journal. Various papers are varied in language, format and style, including particular technical jargon for that subject. Consult relevant sources of instructions before writing a particular paper
2. Mind your grammar and spelling.
In case you are proficient in grammar and spelling, engage a reviewer. This is important because a piece of with known errors or problems is a depiction of the following;
a) You don't consider your writing with improving.
b) You don't respect the reader enough to present writing that is as good as you make it.
c) You are unable to improve the writing.
Remember every piece of writing is as good as its writer can make it without outside review.
3.Do not turn in a first draft.
In most cases, the first drafts are rather terrible.Good writing is rewriting and you should make a serious effort at editing, writing, and fine-tuning before giving the manuscript to anyone else to read.There's nothing as frustrating as a paper that has pearls of wisdom hidden in sloppy and ambiguous writing, i, hence take care!
It also takes longer to read poor writing than good writing.
4. Get and use style-books and relevant manuals
Each scientific area or topic has a specific style and way of writing and thus should be observed. Also,
there are other guides on how to edit and re-write your draft for best results.
5. Avoid misusing or abusing word forms, mind grammar, tenses and language.
Use words in a form that conveys your meaning as clearly and simply as possible. Use proper tenses, parts of speech and general grammar should be used. Avoid creating awkward phrase that are clumsy and unclear.
6. Do not over-use words or use more words where few could do.
An example is using "utilization" where "use" will do. Also don't use "jargon" where "ordinary" or "regular language" will do.Another example is in order to anytime you write that phrase, delete it and replace with just "to".
7. Use an outline to organise your ideas and writing
Make an outline of major headings of your topic before starting to write. Write key ideas to be covered under each heading. There are three major tasks that need separation.i.e.
a) Figure out what you want to say.
b) Planning the order and logic of your arguments.
c) Crafting the exact language in which you will express your ideas.
8. Think about the structure of paragraphs
Organise sentences into effective paragraphs and avoid incomplete paragraphs that do not bring out any meaningful idea. Ensure your ideas flow in clear sentences and paragraphs. Remember, it is not how much you write that matters, but rather the quality of your work.
9. Show us don't tell us.
Rather than telling the reader that a result is interesting or significant, show them how its interesting or significant.Instead of describing the result, show readers that they need to know to draw their own conclusion about it.
10. Break up large projects into small pieces and work on the pieces.
Many thesis writers have a hard time starting to write because of intimidation by a large project ahead. Don't write a thesis, write chapters or papers.It is available to separate the thesis into small discrete sections, ideally distinct publishable papers.To avoid burnout "parallel processing" is necessary. This involves writing one chapter while you complete the analyses for others.
REFERENCE:
Notes on writing paper and thesis. http://course/winona.edu/indexing/ECOLAB/21%suggestions
For more information contact: rmonyakundi@gmail.com, khaembakevin@gmail.com
FirstlaneXperts
Thursday, 24 October 2013
Monday, 14 October 2013
Content Marketing
The aspect of content marketing has gained tremendous prominence in recent times. This is because of the increased awareness in online marketing through the many available media, especially the social media.
Improved Marketing
Through these means marketing has become more interactive and this has tremendously increased sales turnover in many companies. If you own a company and wants to increase your sales overnight, just get engaged in content marketing and your income will just explode, leaving wondering what you have been doing for all this time before making the hit!.
Content Marketing Defined
What's really content marketing? This is defined as as publishing content that empowers, engages, educates and connects the readers. This definition is quite superb for in it we would be able to learn all about online marketing. It is said that "content is king" for it can be utilized to inform, educate, empower, boosts credibility and connects you with both your potential and actual customers.
Touching Base with the Online Community
The online community is comprised of millions of people who are out looking for anything of their interest or something that could satisfy their, intellectual, social, economic and personal needs. Through content marketing your business can be linked up to the online community through the
following:
- Social media
- Websites
- Product Review Boards
- Blogs
- Message Boards
- Video presentations
- Slideshows
- Online Groups
- Articles (Through article syndication)
- Testimonials
Through content marketing you can accomplish the two major business promotion functions at once without having to do them separate. The method will help you get your business marketed and promoted through PR at the same time. Some of the specific benefits of content marketing are:
- Old content can be incorporated in the new media, especially online. This makes it convenient for those that are getting their business online for the first time. This is time saving for one does not need to post new content.
- Content exist both online and offline. This means that one can use the offline media when not able to use the internet and this improves accessibility as well.
- The use of multiples internet tools helps potential customers in locating your company and products easily. This will attract potential customers for the tools will help you get increased inbound traffic. Through this your business can also appeal to niche audiences.
- The many internet tools also helps by increasing accessibility. The variety of internet tools also makes it possible to appeal to variety of customers. This is so because content is permanently online.
- The content is consistent across the spectrum of internet tools. All customers suing different media are able to get the same message and updates.
- The online interaction through feedback increases the ability of customers to understand your company and products well. Many actual and potential customers are well informed about your business and products
Finally, content is indeed everything about getting in touch with the millions of customers out there. In essence a message conveyed to a reader or viewer accomplishes at least one or more of the following:
- Educates
- Informs
- Connects
- Entertains
- Create Trustworthiness
For further information about content development for quality online business please contact us on our email: firstlanexperts@gmail.com
Thursday, 10 October 2013
PUBLISHING THE BEST WAY TO GO!
In this life, there's time for everything and as it
is rightly said, there's time to be born and time to grow old. Time to study and time to
complete or graduate. There's also time to work and time to retire. We
shouldn't forget that there's time to live and time to die. Since we are aware
that everything in life and under the sun and moon has its own time for beginning and ending, it is
important to plan to spend our time well and for good purposes.
While we're still alive, the one pertinent question that should
ring through our minds is that when we leave this solid earth what will we
be remembered for? This is a very important question because it will form the
basis for, and inform the reason for existence. If answered appropriately, it will make a strong
argument in favour of our lives on earth and we will be celebrated even after we are long gone.
Great Writers
There are many great people some who passed on
long time ago, but whenever their names are mentioned it is as if they are
still alive. Great writers or authors bequeathed to
successive generations great literary works. Some of the writers include William Shakespeare, George Orwell, Charles
Dickens, George Eliot, Mark Twain, Charlotte Bronte, and in Africa we have Wole
Soyinka, Chinua Achebe, Mariama Ba, Ngugi Wa Thiongo, among many others.
Some of these writers are still
immortalised even when they are long gone because of their great contribution to the society. Many life-inspiring quotes have been derived from most of the great works and this is what keeps us going through life with hope and
assurance.
To Be Remembered
One best thing to be remembered for is to bequeath
something useful to successive generations, and this would be nothing else but
a piece of writing on paper. Great people die and they are forgotten but not those that wrote something that's read again and again.
Many great and intelligent men and women have gone down with great ideas
and memoirs that would have enabled us to know where we are coming from and where we are
going. Written and oral literature is the voice of society and any written word is a good mirror
for societal survival and coexistence.
The Challenge
Now since we know life is just but short and is
lived once, a challenge is put to us to organise and publish the great ideas.We can contribute to knowledge reservoirs by either writing a book, article,
poem, or any other literature that would make a difference in society.
Link Up With Us.
We at Firstlane Xperts are ready and
waiting for you to share your manuscript which we can help transform into a
beautiful literary work. We would help you publish your book online and this would have not only contributed to the knowledge bank, but also help you get something
in terms of royalties.
If you think you have something useful for online
publishing, just contact us and share with us your manuscript today and we
will help you translate it into that wonderful book that everybody would love
to lay hands on!
You Can Contacts Us.
You use our website for feedback or the following
contacts: rmonyakundi@gmail.com;khaembakevin2010@gmail.com
Tuesday, 8 October 2013
Interpersonal Communication in Nursing:Sample Reflection Paper
Title Page Intentionally Left Blank
Introduction
Reflection is turning experience into learning (Boud, 1985). This is more applicable in the
health service provision and care for it forms the core of a healing and
therapeutic process. Reflection in nursing practice enhances effective care and
therapeutic process (Parker, 2006).In line with this thought I shall
reflect on an experience and discuss the communication skills used or should
have been used during the encounter. In this context two of the five caring
processes which are knowing and enabling/informing will be applied (Swanson, 1993). Communication forms the core part
of our day to day life and is an integral part of human survival and growth.
Communication is important in nursing practice for
it is said to weave together practice to ensure that care is continuous,
consistent and congruous within and across practice settings(Johns, 2004). Communication is one of the
essential factors to maintain a good quality of life because it allows humans to
interact and provide comfort (Ashurst, 2010). The nature of the nursing
profession makes it indivisible with communication for an effective nurse
practitioner must get involved in daily communication. In this context I will
adopt the five stages of reflective cycle as given by Gibbs(Jasper, 2003)
Description
I had just reported to duty at the hospital and
since I was the shift leader I commenced the routine ward rounds. I was the
shift leader and we were together with the other shift team. Suddenly, we heard
an unusual noise from one of the wards on the adjacent block. This was unusual
because wards are known to be somewhat quiet and serene because the occupants
are sick and unable to shout.
We headed straight to the ward in question and on
arrival witnessed a horrifying scenario. Two patients were lying on the floor,
one unconscious and the other with a deep cut on the forehead and was profusely
bleeding.
Certainly, there was no patient with a psychiatric
case and the scene witnessed must have been caused by something. There were
some relatives who had come to see their patients and some patients were
shouting hysterically. Obviously, the relatives were in the wards at a wrong
time for visiting time was far gone. There were many obvious lapses in this
incident and the most conspicuous one was lack of proper communication and
direction from those in charge for this would have brought sanity to the wards
Outcome
We tried to calm them down in order to ascertain the
cause of the commotion but our pleas fell on deaf ears. Some became abusive and
even threatened violence. When I found out that our efforts were not yielding
fruit and we were actually unable to communicate, I called for assistance from
the security who threw the relatives out. The ward was in a total mess hence we
embarked on resettling the patient. We called in the doctors who attended to the
unconscious patient who later stabilized after six hours.
When dust had settled the hospital administration
had to get to the bottom of the matter by ascertaining the cause of that ugly
incident and immediate investigations were launched. The immediate outcome was that
since it was Christmas season and the festivities were on, the patients’ relatives smuggled alcohol to the
ward to celebrate with the their kin!. The matter was reported to the hospital
administration and all those patients involved as a disciplinary measure.
Feelings
I was angry with the patients and their relatives
for such irresponsible act, but also remembered that the patients were ignorant
of the consequences of their actions. Apparently the patients were left alone
with their relatives for far too long and this must have greatly contributed to
the said incident. It is a risk to have the patients all alone without any caregiver
around to attend to their needs. These developments demonstrated total
breakdown of communication and coordination of the healthcare services. The
hospital administration had done little in communicating their protocol to both
the patients and relatives.
What happened
in the ward was a portrayal of lack of information on the part of the client on
what is expected of him or her while in hospital admission. A clear outline is
given on patient-centered approaches to communication with patients and
families in order to realize best results (Planetree, 2008). There are various practical tools
that are supposed to guide both staff in all cadres, patients and families in
order to maintain both best practices and obtain optimum results in healthcare
provision.
In this given case the patients and relatives would
have been given sufficient information upon admission and also be committed to
sign some agreement to the code of conduct whilst in admission. There shouldn’t
have been any assumption regarding the conduct of the patients and relatives
hence proper guidance would have been communicated. Effective communication
with the patients and families forms a cornerstone for providing quality
healthcare (Planetree, 2008, p.78). This means that effective partnership is
important between the caregiver, patients and families for effective and efficient
healthcare delivery.
I felt that there were serious omissions both on the
part of hospital management for lack of proper communication between patients
and relatives on protocol to be followed whilst in admission.
Evaluation
There a number of lessons I learned from the
experience which include establishment of a communicative relationship between
the patient, the hospital administration and families right from the onset to
know how to handle any emerging situations during admission. The patient has a
right to any information that will help him/her get along well with the
caregivers while at the hospital. It is imperative to inform the patient about
his/her obligations and the expectation of the care giver while in admission.
There should be a well-documented patient/client and
the hospital and health care givers relationship which is brought to the
attention of the client before admission.
Also there was apparent security lapse for the
relatives to the patients were left in the wards for unnecessarily long time.
This means that no one cared so much about the state of the patients for that
long hence a leeway for the incident. There must be proper security and
surveillance checks to ensure that the patients are safe in the wards.
The hospital’s policy on visiting relatives should
be availed to and boundaries for interaction to be clearly marked and observed.
All forms of communication both verbal and non-verbal should be observed in
order to ascertain the level and extent of intervention.
Last but not
least as a caregiver I should be more sensitive and try to approach issues at
an early stage before they get out of hand. This also important for it is only
when practitioners can communicate consistently that communication is effective
(Johns 2004, p.204).
Analysis
After the discharge of all the patients in the ward,
I was left wondering whether there was anything I would have done as a
caregiver that would have led to different results for this would have at least
made me contented with my services. Definitely there’s something I would have
done that would have enabled the hospital administration to make a different
decision concerning the misbehaved patients and relatives. There was a great
burden in my heart because the patients were discharged without having both
their problems addressed.
Apparently the hospital management did not supply
the patients and families with adequate information upon admission. On the
other hand, as a caregiver, I would have interrogated the patients after they
had calmed down in order to understand the background of the incident and try
to assist in recovery and rehabilitation from alcoholism. Some patients had
ailments that would be more severe if they would take alcohol, while others
were under some type of medication that could not be mixed with any alcohol
content.
In my opinion there was a rushed decision by the
management in discharging the patients again failing to give them proper
information to help them avoid such actions in future.
As a caregiver
I would have endeavoured to understand the background of the patients and their
relatives in order to help them overcome such tendencies and take their health
seriously. I would have also advised the hospital management to interrogate the
patients and their families in order to give them necessary support.
It is at the hospital that a patient gets all-round
health care services, and it is rather odd to have an ill-informed patient like
the case above getting punished for lack of proper information which is to be
given by the health provider.
As a health care giver I should have used the
client-centered approach for it forms the cornerstone of collaborative
association between the nurse and client in the quest to resolve healthcare
problems (Arnold, 2003). By discharging all the patients
without helping them solve their health problems, the management demonstrated
an uncaring attitude and lack of sensitivity to their health needs. This is
quite a contrast of what should be expected of a health care provider.
The event was an eye opener and it made me endeavour
to be a good communicator in future and be a strong leader who can handle
organizational policies without a hitch. I also learnt that I would initiate
and implement a health education program in the hospital.
In this scenario there a clear demonstration that
there’s total lack of communication or proper communication between a caregiver
and the client or patient. It is much easier to manage a well-informed patient
than the one who is not informed of both patient rights and obligation whilst
in treatment. Good communication helps to build a therapeutic relationship
which is central to nursing(Collins, 2009). It is further emphasized that
effective communication is a tool that would allow the nurse to reassure a
patient, empower the patient, motivate the patient, put a patient at ease, and
convey understanding of the patient’s concerns(Webb, 2011)
Conclusion
Nurses play an important role in communicating with
patients because they are always in close contact.
It is apparent that a nurse can play a key role in
improving healthcare services by improving the relationship by communication
(Wright, 2012). Having effective communication skills is therefore an
imperative. Through the above experience I have learned that developing my
skills in leading and confronting patient-related challenges through effective
communication is a must. I must endeavour to acquire new communication skills
and employ them effectively for best results in my practice. I would practice
the key communication skills in order to be able to control the complex tasks
that require high level negotiation(Bach, 2009)
We learn through experience and it is through
reflection on such incidents like the above that we are able to develop better
skills for effective performance. Effective communication is an imperative in
the health practice for research has shown that ineffective communication among
healthcare professionals is one of the leading causes of medical errors and
patient harm(Leonard, 2004)
As observed
earlier, through reflection we discover different learning needs and this helps
us become better practitioners. Unless given proper attention, communication
aspect would either build or destroy a career(Pierre, 2012)
References
Ashurst, A. T., S.
(2010). Communication, communication, communication. Nursing and Residential Care, 12(3),
140-142.
Bach, S. a. G.,
Alec. (2009). Communication and
interpersonal skills for nurses. Exeter: Learning Matters.
Boud, D., Keogh,
R, Walker D. (1985). Reflection: Turning
experience into learning. London: Kogan Page
Collins, S. (2009). Good communication
helps to build a therapeutic relationship. Retrieved from http://www.nursingtimes.net/nusring-practice/clinical-specialisms/educators doi:5003004
Jasper, M. (2003). Beginning reflective practice: Foundations in nursing and healtcare.
Cheltenham: Nelson Thornes.
Johns, C. (2004). Becoming a reflective practitioner (2nd ed.). Oxford: Blackwell
Publishing.
Leonard, M.,
Graham, S.,Bonacum D. (2004). The human factor: The critical importance of effective
teamwork and communication in providing safe care. Qual Saf Health Care, 13, 85-90.
Parker, M. (2006). Aesthetic ways in day-to-day nursing. London: Sage Publications.
Pierre, A.-J.
(2012). Transitions in nursing: Up-level your career, your income,
your life. Retrieved from http://transitionsinnursing.com/9-ways-to-boost-your-confidence-as-a-nurse/
Planetree. (2008). Practical approaches
for building a patient-centered culture. Patient-Centered
Care Improvement Guide. Retrieved from www.planetree.org, www.pickerinstitute.org
Swanson, K.
(1993). Nursing as informed caring for the well-being of others. Journal of nursing scholarship, 25(4),
352-357.
Webb, L. (2011). Introduction to
communication skills for nursing practice. Oxford: Oxford University Press.
Sunday, 6 October 2013
Sample paper Digital Forensics Examination
Digital Forensics
Examination
Introduction
The process of digital
forensics examination involves identifiable steps of identifying, preserving,
interpreting, and documenting evidences in computer crimes. Digital forensics
has a variety of aspects and therefore has several procedures depending on the aspect
being investigated. Basically, the process of digital forensics examination
involves the analysis of the data and information residing on computer systems
with the view of identifying what, when, who, and how the incident happened.
Occasionally, the information to be gathered in not readily accessible or
viewable to the usual computer users and includes things like files which were
deleted or simply pieces of data located in the slack space together with the
existing files. As such, it is important that the forensics examiner possesses
special skills and techniques in the process so as to obtain such information
which is normally hidden from the average user. This paper describes the
methodology and outline instructions for the examiner incorporating aspects of
the process of interview which is specific to the digital forensics
examination.
Overview
of the Digital Forensics Examination Process
The digital forensics examination is a process with
identifiable steps which the examiner must follow through to accomplish it. The
process begins with identification of the incident to be examined and determine
its type. It also involves preparation for the process where the examiner
collects all the tools needed for the examination, the techniques and approaches
to be used, acquisition of search warrants and authorizations, and the
management support from the relevant people (Tipton & Krause, 2000). A strategy of
approach should also be identified so as exploit the collection of the
uncontaminated evidence and reduce the effects associated with the process.
After the collection of the evidence, the examiner need to have proper
preservation approach of the evidence and may require isolating, securing, and
preserving the physical and as well as the digital evidencing to be examined.
The actual process of examining the evidence follows a systematic and in-depth
search of evidence that leads to the suspected crime. The other step is the
analysis of the collected information or data to determine the significance and
may involve reconstructing fragmented data while making incisive decisions
based on the collected exhibits. Presentation of the evidence is done on the
summary while explaining the conclusions reached during the examination process (Global Digital Forensics, 2013).
The work of forensic
experts would be in vain if their findings were not used in a court of law to
incriminate of discharge someone facing a case. Thus, testimonies and reports
by computer forensics experts are important elements that have great important
on the decisions that the judge is going to take in a case. However, testifying
in a court is not an easy task as the witness is subjected to sustained
personal attack that during the process of cross-examination (Ciolino &
Castle 2000). Testifying and writing a
report from the work of computer forensic analysis then is important critical
because of the attention that it receives from the defense lawyers and judges.
A computer forensic expert may have done a good job and come up with evidences
beyond doubt that a crime did or did not actually occur, but the method of
presentation of this information to the jury becomes challenging because of the
hostile environment in courts. In giving testimony, the computer forensic
expert should be articulate with clear and well expressed terms that will leave
no doubt in the minds of defense lawyers. This will avoid defense lawyers from
accusing the forensic expert of inarticulate, incompetent, and
ultimately not worthy of belief (Nelson, Olson & Simek, 2006). The expert has
the burden of ensuring that the defense lawyers and the judge comprehend every
terminology and phrases that are used during testifying.
Further testifying or
writing a forensic report is critical because of the requirements that computer
forensic experts are required to adhere to before they present their evidences
to the attorney or defense lawyers. Expert testimony or reports must contain
information that goes beyond personal knowledge and observation in order to
give technical opinion on the issues in hand. Computer
forensic experts are thus mandated to testify and write reports that present
their findings “on a very technical discipline in a simplistic manner” (Smith & Bace,
2002). All in all a computer forensics
examiner testimony or report must meet the admissibility threshold that is set
by law if there is any hope that it will be acceptable in a civil or criminal
case. In some cases, the reliability of the report that the examiner presents
must be founded on sufficient facts and follow laid down principles and
methodologies of collecting the data which is also a prerequisite for the
acceptance of the evidence presented by the examiner.
Methodology for digital evidence collection, preservation, and
analysis
The first step in
embarking on a digital forensics analysis is to identify the type of data which
is going to be investigated by the examiner. Three types of data exist for
forensics examiner including the latent data, archival, and active data.
Identifying and evaluating the type of data involved in the forensics analysis
is an important step that will help the examiner to have specific target areas
during the process of analysis. Active data is easy to investigate because the
examiner can actually see the information without the need to use sophisticated
tools and techniques. Examples of active data include simple data files used by
the operating system of the computer and programs that are used to run
applications on the computer. Nevertheless, the examiner should exercise
precautions and care while handling active data because it can be misleading
and therefore hinder access to the actual information which is being
investigated. The other type of data is the archival data which is normally
backed and stored up on various storage files on the computer. Some of the
storage spaces may be located inside the computer while others are accessories
which are removed from the computer and stored in another place like the CDs,
backup tapes, floppy drives, or even removable hard drives (Reith, Carr &
Gunsch, 2002).
Where such storage
facilities are suspected to exist, it is advisable for the examiner to carry
out investigation and ensure that all relevant and necessary storage facilities
are gathered before embarking on the actual process of examining the computer.
This will ensure that no relevant information or data is left out in the
process of examining the exhibit. In the
case of latent data, the examiner must have special tools so as access the
information or data required. In most cases, latent data include deleted files
and partially overwritten documents on the memory of the computer. Essentially
a whole process of digital forensics examination encompasses the three types of
data but it is the latent data which can be time consuming and expensive
especially in terms of expertise needed and the tools to retrieve that
particular information. During this process the examiner must keep in mind the
overall function of digital forensics examination which is to detect and proof
a crime (Nelson, Olson & Simek, 2006). Therefore, the focus must remain on obtaining the
evidence for the unlawful use of computer so that the perpetrators can be
nabbed and prosecuted. It is important to keep in mind that perpetrators of
forensics crime are highly intelligent individuals who try as much as possible
to hide the evidence since most of them are actively aware that they are
committing a crime on the computer.
The process of digital
forensics examination must thus be planned before embarking on it. This can be
done in the following steps (Nelson, Olson
& Simek,
2006): Discuss the suspected
incident to be investigated and examined by the concerned persons to establish
potential areas of abuse or illegal acts. This is an important step because it
actually sets the examiner in the whole process of digital forensics
examination. It is an entry point in the examination process and must therefore
provide gathering of sufficient information to allow the process to take off.
ii.
Collecting of all
electronic equipment including the computers and all external storage media to
be examined. some of the tools to be examined may be located in different
places and therefore the examiner must make arrangements to ensure that all
required electronic equipment are in one place before starting to examine them
iii.
The next process is the
actual identification of violations or unlawful activities on the electronic
equipments are identified in the first step. During this step, the examiner
must pay attention to the emerging and new evidence which were not identified
in the initial stage with the concerned persons.
iv.
The next step is to
ensure that the identified evidence is protected from harm or destruction by
the perpetrator or the examiner himself. The examiner must be aware that
suspected perpetrator can embark on destructing further evidence upon discovery
that their activities are being forensically investigated.
v.
After a thorough
evaluation of the evidences, the examiner must confirm that actually they are
the evidences which are required in proofing the suspected illegal activity by
the perpetrator. Confirmation is an important step because it actually sets the
pace of the collection of tools to be used in the gathering of latent data
which may have been deleted by the perpetrator of partially contained on the
hard drives of the computer to be used in the examination. The examiner must
act quickly especially with active files because most of them are volatile and
are prone to destruction by the suspect where they discover the examination
process.
vi.
The final step is the
preparation of a written report and comments of the examiner which will be used
for prosecution especially where it is established that a crime was committed
using the electronic equipments which were examined forensically.
Documenting of Information obtained from an Interview
A digital forensics
examiner must possess sufficient knowledge and skills to be able to acquire
reliable information which can be used to prosecute crime perpetrators in a
court of law. As such, the examiner needs to approach digital forensics
examination process with a proper plan to be able to build and follow the
target workflow guidelines as a way of minimizing on the time required for the
process, reduce the costs of the process as well as increase the amount of
relevant data collected as a way of ensuring that undisputable information is
collected during the process. To this
end, the examiner must work with relevant authorities including security
personnel and forensics examination investigators to identify and follow
through particular sources of evidence while applying acceptable digital
forensics examination procedures. The essence must always to come up with
evidences which will be presented in a form of a report which will be
acceptable in a court of law and which can be defended when called upon to do
so by the prosecutors (Casey, 2011).
It is also important
that the acquisition procedures are well executed and involves all equipments
and evidences identified in the plan and involves complete disk imaging and
also gathering of information and data from sources such as servers while
adhering to the best practice in digital forensics examination procedure and
the guidelines. As such, the examiner
must ensure a secure and sound chain of custody and assure the admissibility of
the acquired evidences in a court of law for the purposes of prosecuting the
perpetrators. It would be a waste of time and resources when the examiner’s
report cannot be acceptable in the court of law simply because the admissibility
of the process of examination is not acceptable or did not adhere to the laid
down guidelines and rules. Evidently, the person to be prosecuted can challenge
the admissibility of the evidence based on the procedures that were used to
collect that evidence (Tipton & Krause,
2000).
Another area of concern
is the extraction of the evidence which must be precise and acceptable. The
examiner needs to know where to look for evidence, who to ask, and when to
approach a suspected source of evidence. More importantly are the actual
extraction process which must be precise and not interfere with the operations
of the client’s activities or create unwanted disruptions to the workflow. This
calls for specificity in the approach to sources of evidence but also not leaving
out any important area or source which can provide the much needed evidences.
The collected evidences must be analyzed objectively from the smallest
electronic media using approved techniques and tools with a view of coming up
with condensed conclusions. The examiner must realize that a proper digital
forensics examination is one which yields manageable evidences in terms of the
volume of the actual evidence given that the process can refer to hundreds of
files which can be difficult to analyze if they were all presented as evidence.
The other important and final technique that a digital forensics examiner needs
to have is the reporting skills which allow the examiner to report the
evidences of examination in an understandable, defendable and complete format
to the client. It should be understood that the client is not versed with
digital forensics jargons and terms and therefore the examiner must use an easy
to understand language in the report and give important aspects which are
helpful to the client. Reporting can incorporate figures like charts, tables,
timelines, and entity relationships to give a clear picture to the client on
what happened in the process of examining the electronic equipments. It is good
to keep in mind that figures and tables are easy to understand and can
therefore be used in the interview process to enable the concerned parties to
easily understand what is required of them (Ciolino & Castle, 2000).
Base Interview
Script for Interviewing Victims, Potential
Perpetrators, and Other Sources
According to Tipton & Krause (2000), a successful digital forensics examination interview
must consider all stakeholders involved in the investigation before commencing.
An essential part of the interview is the inclusion of the legal counsel because
not all circumstances under investigation require the services of a legal
counsel. But in cases where evidences point to the breaking of an established
law, the examiner must involve the legal counsel mainly because he or she is
not a legal expert. Digital forensics examiners must not initiate an interview
with the victims or potential perpetrators without pondering on the legal
implications of their interviews as this may act against their conclusions when
they are finally presented to the client for further actions. Additionally,
interview questions may deviate from the usual straight forward, fact-finding
process to legal standards that require wide consultations and guidance from
the legal experts. Issues of confidentiality also need to be addressed first
before embarking on the interview because some information gathered may be
incriminating to the people involved in the whole process of gathering data.
Where the potential source of data feels that this has not been sufficiently
addressed they may decline to give the information being sought for the
purposes of investigation. They may also be forced to give inaccurate or even
slanderous information which can harm the people involved and thereby exposing
the examiner to legal consequences. The baseline is that digital forensics
examiners must ponder the legal implications of their interviews especially in
sensitive issues with high stakes to the stakeholders in the investigation
process (Sheetz, 2007).
The other standard to
measure the success of the process of interview is the security of data and all
equipments used in the interview. It is important for the examiner to identify
important documents and equipments to be used in the interview and which may
act as the evidences during the process so that they are not destroyed or
altered by the interviewees. This can always be done by ensuring that there is
a proper chain of custody of all materials which are going to be used during
the interview process in cases where the examiner is certain that the materials
used in the interview are going to be finally used in the process of initiating
legal actions. It is also important to keep in mind the kind of data and
information that the examiner is looking for so that he or she avoids asking
irrelevant questions which are not going to contribute anything to the final conclusions.
This means that the examiner must always have a clear picture of the results of
the investigation from the word go although it is not always certain that this
will be realized at the end of the investigation (Tipton & Krause,
2000).
The whole interview
process should guard against spoliation of evidences by the interviewees which
is conscious withholding of information, hiding important equipments and tools
important for investigation, or even total destruction of the evidences which
could be used in a legal process (Maras, 2011). The questions to be asked in the interview should
thus involve an aspect of detecting spoliation from the interviewees but this
should be done in a voluntary manner so that the process can be legally
acceptable during prosecution process.
This is because if it is established that spoliation occurred as a
result of lack of transparency or care by the examiner, then the evidences
presented in the legal process can be challenged by the potential perpetrator
as having been collected from them through coercive means. The process also
must provide controls to ensure that the examiner does not accidentally or
intentionally tamper with the information collected during the interview. It is
also important to consider the types of questions that the examiner is going to
ask. Certain questions like the double-negative questions or the attitude
questions should be avoided during the digital forensics examination especially
to a potential perpetrator because they are repulsive and can sometimes suggest
answers to the person being interviewed. The examiner should consider using
closed-ended questions, open-ended questions, and admission seeking questions.
For an effective
interview, the examiner should consider the following guidelines prior to the
interview (Global Digital Forensics, 2013);
i.
The examiner should
prepare after consultation an interview plan
ii.
Always seek
consultations in cases where allegations are involved
iii.
In cases where several
interviews are to be done, they must be done systematically, one after the
other
iv.
The location should be
conducive for maximum gathering of information
v.
The interview must
collect sufficient information about the person to be interviewed before the
actual interview
vi.
Relevant documents and
information to the subject of investigation including facts must be gathered
before the interview
vii.
The examiner must be
confident, courteous, and professional during the interview and avoid showing
attitudes to the interviewee and this should be done through maintenance of
control and exercise of restraint during the whole process of interview
viii.
The examiner must also
establish a rapport with the interviewee to build confident in them
ix.
The examiner must also
be ready to follow instincts in cases where he or she feels that the
interviewee is engaging in deception
x.
The examiner must also
prepare a summary report of the whole process of interview for future use.
In conclusion, the
process of digital forensics examinations requires the examiner to prepare
adequately to ensure that the gathered evidence can be used in the legal
process and that the evidence is reliable and admissible for the purposes of
prosecuting a crime.
Subscribe to:
Posts (Atom)