Reference Hub8
Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents

Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents

Chia-Mei Chen, Zheng-Xun Cai, Dan-Wei (Marian) Wen
Copyright: © 2022 |Volume: 30 |Issue: 2 |Pages: 19
ISSN: 1062-7375|EISSN: 1533-7995|EISBN13: 9781799896760|DOI: 10.4018/JGIM.20220301.oa5
Cite Article Cite Article

MLA

Chen, Chia-Mei, et al. "Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents." JGIM vol.30, no.2 2022: pp.1-19. http://doi.org/10.4018/JGIM.20220301.oa5

APA

Chen, C., Cai, Z., & Dan-Wei (Marian) Wen. (2022). Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents. Journal of Global Information Management (JGIM), 30(2), 1-19. http://doi.org/10.4018/JGIM.20220301.oa5

Chicago

Chen, Chia-Mei, Zheng-Xun Cai, and Dan-Wei (Marian) Wen. "Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents," Journal of Global Information Management (JGIM) 30, no.2: 1-19. http://doi.org/10.4018/JGIM.20220301.oa5

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The rapid development of cross-border e-commerce over the past decade has accelerated the integration of the global economy. At the same time, cross-border e-commerce has increased the prevalence of cybercrime, and the future success of e-commerce depends on enhanced online privacy and security. However, investigating security incidents is time- and cost-intensive as identifying telltale anomalies and the source of attacks requires the use of multiple forensic tools and technologies and security domain knowledge. Prompt responses to cyber-attacks are important to reduce damage and loss and to improve the security of cross-border e-commerce. This article proposes a digital forensic model for first incident responders to identify suspicious system behaviors. A prototype system is developed and evaluated by incident response handlers. The model and system are proven to help reduce time and effort in investigating cyberattacks. The proposed model is expected to enhance security incident handling efficiency for cross-border e-commerce.