Browse > Article
http://dx.doi.org/10.15722/jds.20.07.202207.107

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic  

HWANG, Jin-Hee (Forensics, Sungkyunkwan University)
Publication Information
Journal of Distribution Science / v.20, no.7, 2022 , pp. 107-117 More about this Journal
Abstract
Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.
Keywords
Digital Forensic; Supply Chain Management; Distribution Channel; Qualitative Approach;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Vavilis, S., Petkovic, M., & Zannone, N. (2016). A severity-based quantification of data leakages in database systems. Journal of Computer Security, 24(3), 321-345.   DOI
2 Yuan, J., & Yu, S. (2015). Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Transactions on Information Forensics and Security, 10(8), 1717-1726.   DOI
3 Kruse II, W. G., & Heiser, J. G. (2001). Computer forensics: incident response essentials. London, United Kingdom: Pearson Education.
4 Skalak, S. L., Golden, T. W., Clayton, M. M., & Pill, J. S. (2011). A guide to forensic accounting investigation. Hoboken, NJ : John Wiley & Sons.
5 Losavio, M. M., Chow, K. P., Koltay, A., & James, J. (2018). The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Security and Privacy, 1(3), 1-11.
6 Karie, N. M., & Venter, H. S. (2015). Taxonomy of challenges for digital forensics. Journal of forensic sciences, 60(4), 885-893.   DOI
7 Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2014). Cloud forensics: identifying the major issues and challenges. In International conference on advanced information systems engineering (pp. 271-284). Cham, Switzerland: Springer.
8 Okereafor, K., & Djehaiche, R. (2020). A Review of Application Challenges of Digital Forensics. International Journal of Simulation Systems Science and Technology, 21(2), 351-357.
9 Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital investigation, 13(June), 38-57.   DOI
10 Ribeiro, L. E. (2019). High-profile data breaches: Designing the right data protection architecture based on the law, ethics and trust. Applied Marketing Analytics, 5(2), 146-158.
11 Nelson, B., Phillips, A., & Steuart, C. (2014). Guide to computer forensics and investigations. Boston, MA: Cengage Learning.
12 Lee, J. H. (2021). Effect of Sports Psychology on Enhancing Consumer Purchase Intention for Retailers of Sports Shops: Literature Content Analysis. Journal of Distribution Science, 19(4), 5-13.   DOI
13 Liu, S., & Kuhn, R. (2010). Data loss prevention. IT professional, 12(2), 10-13.   DOI
14 Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports, 23(4), 1-9.   DOI
15 Park, S., Kim, Y., Park, G., Na, O., & Chang, H. (2018). Research on digital forensic readiness design in a cloud computing-based smart work environment. Sustainability, 10(4), 1203.   DOI
16 Poyraz, O. I., Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020). Cyber assets at risk: monetary impact of US personally identifiable information mega data breaches. The Geneva Papers on Risk and Insurance-Issues and Practice, 45(4), 616-638.   DOI
17 Chen, H., Huang, X., & Li, Z. (2022). A content analysis of Chinese news coverage on COVID-19 and tourism. Current Issues in Tourism, 25(2), 198-205.   DOI
18 Dezfoli, F. N., Dehghantanha, A., Mahmoud, R., Sani, N. F. B. M., & Daryabar, F. (2013). Digital forensic trends and future. International Journal of Cyber-Security and Digital Forensics, 2(2), 48-77.
19 Adams, R. B., Hobbs, V., & Mann, G. (2013). The advanced data acquisition model (ADAM): A process model for digital forensic practice. JDFSL: The Journal of Digital Forensics, Security and Law, 8(4), 25-48.
20 Patrucco, A. S., Luzzini, D., & Ronchi, S. (2017). Research perspectives on public procurement: Content analysis of 14 years of publications in the journal of public procurement. Journal of Public Procurement, 17(2), 229-269.   DOI
21 Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), 723-740.   DOI
22 Shabtai, A., Elovici, Y., & Rokach, L. (2012). Data leakage detection/prevention solutions. In A Survey of Data Leakage Detection and Prevention Solutions (pp. 17-37). Boston, MA: Springer.
23 Sung, I. (2021). Interdisciplinary Literaure Analysis between Cosmetic Container Design and Customer Purchasing Intention. The Journal of Industrial Distribution & Business, 12(3), 21-29.   DOI
24 Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.   DOI
25 Wang, H., Wang, W., Sun, H., Cui, Z., Rahnamayan, S., & Zeng, S. (2017). A new cuckoo search algorithm with hybrid strategies for flow shop scheduling problems. Soft Computing, 21(15), 4297-4307.   DOI
26 Woo, E. J., & Kang, E. (2021). The effect of environmental factors on customer's environmental protection pattern: An empirical text analysis in the literature. International Journal of Environmental Sciences, 7(1), 1-15.
27 Zawoad, S., & Hasan, R. (2016). Trustworthy digital forensics in the cloud. Computer, 49(3), 78-81.   DOI
28 Bollam, N., & Malsoru, M. V. (2011). Review on Data Leakage Detection. International Journal of Engineering Research and Applications, 1(3), 1088-1091.
29 Ali, M. D., & Kaur, D. (2020). Byod cyber forensic eco-system. International Journal of Advanced Research in Engineering and Technology, 11(9), 417-437.
30 Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62(February), 137-152.   DOI
31 Assarroudi, A., Heshmati Nabavi, F., Armat, M. R., Ebadi, A., & Vaismoradi, M. (2018). Directed qualitative content analysis: the description and elaboration of its underpinning methods and data analysis process. Journal of Research in Nursing, 23(1), 42-55.   DOI
32 Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: an analytical crime scene procedure model (ACSPM). Forensic science international, 233(1-3), 244-256.   DOI
33 Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1-14.
34 Jain, M., & Lenka, S. K. (2016). A review on data leakage prevention using image steganography. International Journal of Computer Science Engineering, 5(2), 56-59.
35 Daryabar, F., Dehghantanha, A., Udzir, N. I., bin Shamsuddin, S., & Norouzizadeh, F. (2013). A survey about impacts of cloud computing on digital forensics. International Journal of Cyber-Security and Digital Forensics, 2(2), 77-95.
36 Gaur, A., & Kumar, M. (2018). A systematic approach to conducting review studies: An assessment of content analysis in 25 years of IB research. Journal of World Business, 53(2), 280-289.   DOI
37 Guevara, C., Santos, M., & Lopez, V. (2017). Data leakage detection algorithm based on task sequences and probabilities. Knowledge-Based Systems, 120(March), 236-246.   DOI
38 Kang, E. (2021). Qualitative Content Approach: Impact of Organizational Climate on Employee Capability. East Asian Journal of Business Economics, 9(4), 57-67.   DOI
39 Katz, G., Elovici, Y., & Shapira, B. (2014). CoBAn: A context-based model for data leakage prevention. Information sciences, 262(March), 137-158.   DOI
40 Khan, S., Gani, A., Wahab, A. W. A., Shiraz, M., & Ahmad. I. (2016). Network forensics: Review, taxonomy, and open challenges. Journal of Network and Computer Applications, 66(May), 214-235.   DOI
41 Kebande, V. R., & Venter, H. S. (2018). Novel digital forensic readiness technique in the cloud environment. Australian Journal of Forensic Sciences, 50(5), 552-591.   DOI
42 Kim, J., Lee, C., & Chang, H. (2020). The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth. Sustainability, 12(24), 10639.   DOI
43 Krishnan, S., & Shashidhar, N. (2021). Interplay of Digital Forensics in eDiscovery. International Journal of Computer Science and Security, 15(2), 19-44.
44 Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16-22.   DOI
45 Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., & Peacock, M. (2017). Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22(September), 3-13.   DOI
46 Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The future of digital forensics: Challenges and the road ahead. IEEE Security & Privacy, 15(6), 12-17.   DOI
47 Collie, J. (2018). A strategic model for forensic readiness. Athens Journal of Sciences, 5(2), 167-182.   DOI
48 Hong, J. H. (2021). A Global Strategy of a Company that Uses Culture Content as its Core Business. The Journal of Industrial Distribution & Business, 12(6), 37-46.   DOI