SlideShare a Scribd company logo
1 of 16
The Topic of the Paper: The Problem and
Solution
for Improving Customer Services for a Restaurant
Purpose/scope - The final paper/project is intended to engage
students in a real-world issue pertaining to your respective
internship. The paper topic will be determined and agreed to by
the intern supervisor and student. The topic should be beneficial
to the company and educational to the student. Once the topic is
determined, the student is expected to define the research
problem (problem statement), collect the necessary data, and
report on the findings. The length of the paper is not specified;
however, quality is preferred over quantity. It is expected that
papers should be at least 10+ pages long. Finally, it is required
that the paper/project and findings will be presented to the
internship supervisor by the student
The final paper/project format should be double-spaced using
12-point Times New Roman font with 1” margins.Content,
writing logic/flow, spelling and grammar will be graded as part
of your final grade. The final paper MUST include the bolded
section headings as directed and be organized in the following
manner:
1. Final Paper Format – Your paper must follow the following
format.
a. Cover Page – Title of the paper, course name and number,
semester year, student name and identification number and
instructor’s name
b. Table of Contents – Prepare a detailed table of contents,
which includes the following section below
c. Executive Summary – The executive summary should be a
summary of the report in 1-2 pages with the following captions:
i. Parameters of the report – purpose/objective of the study,
type of company, etc.
ii. Description of the problem – describe the problem and how
your project will be beneficial to the company.
iii. Methodology – describe how you went about solving the
problem. What type of survey did you do? How did you collect
data?, etc.
iv. Summary of findings and conclusions – summary of the facts
you found surrounding the problem or situation being
researched and your conclusions based upon those facts.
v. Recommendations – summarize the specific recommendations
you are making to the company to solve the problem or respond
to the research project.
d. Section I – Introduction/Background – Provide the reader
with a description/ background of the topic that is being
researched. Give a contextual backdrop to why this is an
important issue to be addressed (e.g., What are competitors
doing? What is the marketplace currently doing or headed?
What happens if this isn’t addressed?).
e. Section II – Statement of the Problem/Research Project – A
brief discussion of the specific topic that will be investigated
and addressed and why it is important. (e.g., What is the
problem? Why is this problem worth my attention? How
important, influential, or popular is this problem? Would
research findings lead to some useful change in best practice?)
f. Section III – Methodology – A discussion of how you went
about approaching and solving the problem or research project.
In other words, how did you collect the data you needed to
analyze for the project? This section, for example, should
included details on what type of survey you did including where
you found the survey and/or how you collected data, etc.
g. Section IV – Findings – A presentation of the factual (truth
and facts – not opinion) information you found regarding the
problem to be solved or the research project. What were the
strategic alternatives that might have been used to solve the
problem or research project? What alternative(s) did you decide
to use and why?
h. Section V– Conclusions - Given your findings of fact, what
are your conclusions as to what the underlying problems are, or
conclusions as to the research project?
i. Section VI – Recommendations - Given your findings and
conclusions, what are your specific recommendations to solve
the problems or achieve the objective of the research study?
j. References – 2-3 references minimum but more are expected.
Please provide a reference section when you cite any source in
your paper. Remember plagiarism is not acceptable and is
grounds for failure. All citation and references should follow
the APA format. Please see
(http://owl.english.purdue.edu/owl/resource/560/01) or
(www.apastyle.org) for exact specifications.
2. Final Paper Grading Criteria – The final paper will be graded
subjectively with the following items of critical importance:
a. Quality and depth of analysis of the problem or subject of the
research.
b. Quality and depth of the findings and conclusions.
c. Quality and depth of recommendations.
d. Organization and presentation of the report, including
grammar, spelling, content, use of sub-captions, exhibits,
numbering systems, and graphics.
e. Feedback (comments and grade A, B, etc.) by your supervisor
will also be used to determine your grade. Students are required
to present their findings to their supervisor during the semester.
Turnitin.com Requirement
· All final papers must be uploaded and submitted through
Turnitin.com link on iLearn for plagiarism and grammar checks.
· Directions and feedback: http://at.sfsu.edu/support/how-
submit-turnitin-assignment
· The paper must be uploaded and submitted to Turnitin.com no
later than the final packet due date outlined on the course
schedule. You can review the Turnitin feedback and make
changes to your paper.
· Turnitin Helpful links:
· To view you Turnitin Originality Report clink on the
directions link: http://at.sfsu.edu/support/how-view-your-
turnitin-originality-report
· Student Training – About Originality PDF -
http://turnitin.com/en_us/training/student-training/about-
originalitycheck
· Viewing originality reports:
http://turnitin.com/en_us/training/student-training/viewing-
originality-reports
Running Head: THE SCIENTIFIC METHOD APPLIED TO
DIGITAL FORENSICS 1
THE SCIENTIFIC METHOD APPLIED TO DIGITAL
FORENSICS 7
The Scientific Method Applied To Digital Forensics
by student name
Professor D. Barrett
University
Course
Todays date
Abstract
Computer forensics is the process of digital investigation
combining technology, the science of discovery and the
methodical application of legal procedures. Judges and jurors
often do not understand the inner workings of computers and
rely on digital forensics experts to seek evidence and provide
reliable, irrefutable testimony based on their findings. The
scientific method is the process of diligent, disciplined
discovery where a hypothesis is formed without bias, and
analysis and testing is performed with the goal of effectively
proving or disproving a sound hypothesis. When investigative
teams do not follow standard investigative procedures it can
lead to inappropriate and inaccurate evidentiary presentations
that are extremely difficult for non-technical participants to
refute. The practitioners of digital forensics can make strides to
measure and improve the accuracy of their findings using the
scientific method. This paper includes a summary of the
scientific method as applied to the emerging and growing field
of digital forensics and presents details of a specific case where
both the prosecution and defense would have benefitted greatly
from the use of this proven method of discovery and analysis.
Findings can only be deemed reasonably conclusive when the
scientific process is correctly applied to an investigation,
findings are repeatable and verifiable, and where both the
evidence collected and the tools used are subject to the utmost
scrutiny.
The Scientific Method Applied To Digital Forensics
The forensic analyst and investigator must use a unique
combination of technical, investigative, and scientific skills
when approaching a forensic case. Most adults remember the
Scientific Method from their middle school science class as a
set of six steps beginning with stating a problem, gathering
information, forming a hypothesis, testing the hypothesis,
analyzing the data and drawing conclusions that either support
or do not support the hypothesis. Peisert, Bishop, & Marzullo
(2008) note that the term computer forensics has evolved to
mean “scientific tests of techniques used with the detection of
crime” yet note that many academic computer scientists also use
the term to refer to the “process of logging, collecting, auditing
or analyzing data in a post hoc investigation”. The necessity to
maintain chain of custody requires methodical and detailed
procedures, as does the formulation of a legitimate and unbiased
hypothesis and conclusion using the scientific method. Since
many judges and jurors assume that computer forensic evidence
is as “reliable and conclusive” as it is depicted on television,
the legal system is unaware of the volatile nature of computer
forensics investigations and the significance of a scientific
approach to evidence gathering and analysis (Peisert et al.,
2008).
The Scientific Process as Applied to Computer Forensics
Peisert et al. (2008) discuss in detail the need for the use of the
scientific method in forensic investigations, not only for the
process of discovery and analysis of evidence, but for
measuring the accuracy of the forensic tools used in an
investigation. Casey (2010) agrees, and cautions that evidence
must be compared to known samples so that investigators better
understand the scope and context of the evidence that is
discovered or presented and to better understand the output of
forensic tools. Casey (2010) further elaborates that the
scientific method is a powerful tool for forensic investigators
who must be neutral fact finders rather than advocates for one
side of a case or the other.
The process of creating a hypothesis and completing
experiments to prove or disprove them allows an investigator to
gain a concrete understanding of the digital evidence or mere
traces of evidence under analysis. Casey (2010) also notes that
while there is no ethical requirement to do so and may be
impractical, a thorough investigative practice would consider
investigation of alternate scenarios presented by defense.
Forensic examination tools can contain bugs, or behave
differently with various types of data and forensic images.
Casey (2010) recommends that investigators examine evidence
at both the physical and logical layers since both methods can
provide unique perspectives, and the physical layer may not
yield deleted, corrupted or hidden data. Suspects with limited
technical experience can rename image files with different
extensions not used for images, and those with more technical
knowledge can use advanced steganography techniques to
embed data within other data in an attempt to defy detection.
The 2004 case of State of Connecticut v. Julie Amero in
Norwich, Connecticut is one where the scientific method was
clearly missing from both the defense and prosecution.
Eckelberry, Dardick, Folkerts, Shipp, Sites, Stewart, & Stuart
(2007) completed a comprehensive post-trial analysis of the
evidence as provided to the defense and discovered very
different evidentiary results using a structured scientific
approach to their investigation. Amero was a substitute
elementary teacher accused of displaying pornographic images
that appeared on pop-up’s to her students from what ultimately
was proven to be a spyware-infected school computer. The
credibility of the legal system was compromised and the
prosecution made a numerous incorrect assumptions based on
results provided from inadequate forensic tools and poor
investigative techniques (Eckelberry et al., 2007).
The computer that Amero was using in her classroom was a
Windows 98 machine running Internet Explorer 6.0.2800 and a
trial version of Cheyenne AntiVirus that had not received an
update in several years. The content filtering at the school had
expired several months prior to the incident. The prosecution
presented non-factual statements that may easily have been
misconstrued by a non-technical jury and that likely caused a
guilty verdict. The false testimony made by the school IT
specialist indicated that the virus protection was updated
weekly when in fact they were not since computer logs and the
signatures clearly showed that virus updates were no longer
supported by the vendor. The updates may have been performed
but against files that had no new updates for many months. The
IT Manager who testified also incorrectly claimed that adware
was not able to generate pornography and especially not
“endless loop pornography”. This information was received as
a fact by the non-technical jury and incredibly not refuted by
the defense. The detective for the prosecution also stated that
his testimony was based completely on the product
ComputerCop which the vendor admits is incapable of
determining if a website was visited purposefully or
unintentionally. The forensic detective astoundingly admitted
that he did not examine the computer for the presence of adware
(Eckelberry et al., 2007, p. 7-10).
The case against Amero was largely based on testimony stating
that she deliberately visited the offensive pornographic websites
and that the sites visited subsequently showed the links in red.
The post-trial investigative team quickly verified that the ‘sites
visited’ color setting in Internet Explorer on the suspect
machine was set to “96,100,32” which is a greenish-gray color.
One of the web pages that the defendant allegedly visited had an
HTML override to highlight one of the links presented in red
and was not colored based on a deliberate visit to the site.
According to Eckelberry et al. (2007) the page in question was
not discovered in “any of the caches or Internet history files or
the Internet History DAT files. The post-trial investigative
team through meticulous investigation and use of the scientific
method were able to present facts that were “exculpatory
evidence showing that the link was never clicked on by the
defendant” or any other person, and disproved most of the
statements made by the forensics examiner and the witnesses for
the prosecution (Eckelberry et al., 2007, p. 12-14).
The prosecution testimony stated that there was no evidence of
uncontrollable pop ups found on the suspect machine, however,
the post-trial investigative team discovered irrefutable evidence
that the page in question was loaded twenty-one times in one
second using a computer forensics tool called X-Ways Trace.
Eckleberry et al. (2007) detail many other instances where
testimony was haphazard and discovered that a Halloween
screen saver was the source of the adware that presented the
continuous stream of pornographic sites. The chain of custody
was also compromised in that the disk image was from a Dell
PC but the defense witness saw a Gateway PC stored at the
police station. The officer reportedly seized a computer but the
police report contradicts this and states that only a drive was
taken (Eckelberry et al., 2007, p. 14-17).
The case described and investigated by Eckelberry et al. (2007)
resembles a staged blunder designed as a humorous sample case
for beginning forensic students to discuss. The case was
however very real and even though the defendant was
eventually acquitted she suffered lasting harm from the
notoriety based on the initial conviction of contributing to the
delinquency of minors. If the prosecution or defense had
investigated the evidence using the scientific method and
maintained a credible chain of custody, or at least used clear
critical thinking while performing a thorough forensic
investigation this case may never have gone to trial. It wasted
the time and resources of judge, jury, and countless other
participants in the trial and permanently damaged an innocent
victim (Eckelberry et al., 2007).
Conclusion
The scientific method is a process that allows confidence in a
hypothesis when it can be subjected to repeated identical tests.
The use of the scientific method not only provides a methodical
structure to a forensic investigation, it lends credibility to a
case in the very nature of the steps used to document and
diligently test any given hypothesis. The case independently
investigated post-trial by Eckelberry et al. (2007) was
performed by a team of trained experts who were well aware of
the necessity of the methodical requirements and necessity of
the scientific method of discovery. Their findings proved that
the suspect was in fact a victim of poorly maintained computers
by a local Connecticut school system, that the forensic expert
and witnesses who testified in the case were untrained and
uninformed and used inadequate tools for the investigation.
Cases such as State of Connecticut v. Julie Amero illustrate the
importance of using the scientific method, and the necessity of
proper training in the art and science of digital forensics.
References
Carrier, B. (2002, October). Open Source Digital Forensics
Tools: The Legal Argument. In @ Stake Inc. Retrieved
September 8, 2011, from
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.78
99&rep=rep1&type=pdf
Casey, E. (Ed.). (2010). Handbook of Digital Forensics and
Investigation (Kindle ed.). Burlington, MA: Elsevier, Inc.
Eckelberry, A., Dardick, G., Folkerts, J., Shipp, A., Sites, E.,
Stewart, J., & Stuart, R. (2007, March 21). Technical Review of
the Trial Testimony of State of Connecticut vs. Julie Amero.
Retrieved September 9, 2011, from http://www.sunbelt-
software.com/ihs/alex/julieamerosummary.pdf
Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to
Computer Forensics and Investigations (4th ed.). Boston, MA:
Course Technology, Cengage Learning.
Peisert, S., Bishop, M., & Marzullo, K. (2008, April).
Computer Forensics in Forensis. Retrieved September 8, 2011,
from
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.140.3
949&rep=rep1&type=pdf

More Related Content

Similar to The Topic of the Paper The Problem and Solution for Improving Cus.docx

Reading and Writing Skills Q4 LAS 6.docx
Reading and Writing Skills Q4 LAS 6.docxReading and Writing Skills Q4 LAS 6.docx
Reading and Writing Skills Q4 LAS 6.docxBlueBarrido
 
development of a research proposal
development of a research proposaldevelopment of a research proposal
development of a research proposalleena l
 
FRAMEWORK OF RESEARCH PROPOSAL
FRAMEWORK OF RESEARCH PROPOSALFRAMEWORK OF RESEARCH PROPOSAL
FRAMEWORK OF RESEARCH PROPOSALSANA FATIMA
 
How_to_write_a_research_proposal for master
How_to_write_a_research_proposal for masterHow_to_write_a_research_proposal for master
How_to_write_a_research_proposal for masterNorhissamMustafa1
 
reading and writing RESEARCH REPORT.pptx
reading and writing RESEARCH REPORT.pptxreading and writing RESEARCH REPORT.pptx
reading and writing RESEARCH REPORT.pptxevafecampanado1
 
1 HOW TO LAY OUT A RESEARCH PROPOSAL Title Page .docx
1 HOW TO LAY OUT A RESEARCH PROPOSAL  Title Page .docx1 HOW TO LAY OUT A RESEARCH PROPOSAL  Title Page .docx
1 HOW TO LAY OUT A RESEARCH PROPOSAL Title Page .docxoswald1horne84988
 
TOPIC Write an original research report consisting of one of the .docx
TOPIC Write an original research report consisting of one of the .docxTOPIC Write an original research report consisting of one of the .docx
TOPIC Write an original research report consisting of one of the .docxturveycharlyn
 
research proposal.pptx
research proposal.pptxresearch proposal.pptx
research proposal.pptxmusfirafatima3
 
research proposal.pptx
research proposal.pptxresearch proposal.pptx
research proposal.pptxmusfirafatima3
 
Dr. Balamurugan_Research Process_Bala.pdf
Dr. Balamurugan_Research Process_Bala.pdfDr. Balamurugan_Research Process_Bala.pdf
Dr. Balamurugan_Research Process_Bala.pdfBalamurugan M
 
research process in nursing nursing process.ppsx
research process in nursing  nursing process.ppsxresearch process in nursing  nursing process.ppsx
research process in nursing nursing process.ppsxlovedhaliwal1
 
Research Methods The project is to involve an investigation of a.docx
Research Methods The project is to involve an investigation of a.docxResearch Methods The project is to involve an investigation of a.docx
Research Methods The project is to involve an investigation of a.docxronak56
 
Module 3.2Review the Prospectus Template, Dissertation Proposa.docx
Module 3.2Review the Prospectus Template, Dissertation Proposa.docxModule 3.2Review the Prospectus Template, Dissertation Proposa.docx
Module 3.2Review the Prospectus Template, Dissertation Proposa.docxraju957290
 
designing proposal for research projects budget and funding schemes
designing proposal for research projects budget and funding schemesdesigning proposal for research projects budget and funding schemes
designing proposal for research projects budget and funding schemesabhisrivastava11
 
Rearch methodology
Rearch methodologyRearch methodology
Rearch methodologyYedu Dharan
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptxFitsumKS
 
Overview of research methodology.pptx
Overview of research methodology.pptxOverview of research methodology.pptx
Overview of research methodology.pptxYogeshPatel28169
 

Similar to The Topic of the Paper The Problem and Solution for Improving Cus.docx (20)

Reading and Writing Skills Q4 LAS 6.docx
Reading and Writing Skills Q4 LAS 6.docxReading and Writing Skills Q4 LAS 6.docx
Reading and Writing Skills Q4 LAS 6.docx
 
development of a research proposal
development of a research proposaldevelopment of a research proposal
development of a research proposal
 
FRAMEWORK OF RESEARCH PROPOSAL
FRAMEWORK OF RESEARCH PROPOSALFRAMEWORK OF RESEARCH PROPOSAL
FRAMEWORK OF RESEARCH PROPOSAL
 
How_to_write_a_research_proposal.pdf
How_to_write_a_research_proposal.pdfHow_to_write_a_research_proposal.pdf
How_to_write_a_research_proposal.pdf
 
How_to_write_a_research_proposal.pdf
How_to_write_a_research_proposal.pdfHow_to_write_a_research_proposal.pdf
How_to_write_a_research_proposal.pdf
 
How_to_write_a_research_proposal for master
How_to_write_a_research_proposal for masterHow_to_write_a_research_proposal for master
How_to_write_a_research_proposal for master
 
reading and writing RESEARCH REPORT.pptx
reading and writing RESEARCH REPORT.pptxreading and writing RESEARCH REPORT.pptx
reading and writing RESEARCH REPORT.pptx
 
1 HOW TO LAY OUT A RESEARCH PROPOSAL Title Page .docx
1 HOW TO LAY OUT A RESEARCH PROPOSAL  Title Page .docx1 HOW TO LAY OUT A RESEARCH PROPOSAL  Title Page .docx
1 HOW TO LAY OUT A RESEARCH PROPOSAL Title Page .docx
 
TOPIC Write an original research report consisting of one of the .docx
TOPIC Write an original research report consisting of one of the .docxTOPIC Write an original research report consisting of one of the .docx
TOPIC Write an original research report consisting of one of the .docx
 
research proposal.pptx
research proposal.pptxresearch proposal.pptx
research proposal.pptx
 
research proposal.pptx
research proposal.pptxresearch proposal.pptx
research proposal.pptx
 
Dr. Balamurugan_Research Process_Bala.pdf
Dr. Balamurugan_Research Process_Bala.pdfDr. Balamurugan_Research Process_Bala.pdf
Dr. Balamurugan_Research Process_Bala.pdf
 
research process in nursing nursing process.ppsx
research process in nursing  nursing process.ppsxresearch process in nursing  nursing process.ppsx
research process in nursing nursing process.ppsx
 
Research Methods The project is to involve an investigation of a.docx
Research Methods The project is to involve an investigation of a.docxResearch Methods The project is to involve an investigation of a.docx
Research Methods The project is to involve an investigation of a.docx
 
Module 3.2Review the Prospectus Template, Dissertation Proposa.docx
Module 3.2Review the Prospectus Template, Dissertation Proposa.docxModule 3.2Review the Prospectus Template, Dissertation Proposa.docx
Module 3.2Review the Prospectus Template, Dissertation Proposa.docx
 
designing proposal for research projects budget and funding schemes
designing proposal for research projects budget and funding schemesdesigning proposal for research projects budget and funding schemes
designing proposal for research projects budget and funding schemes
 
Rearch methodology
Rearch methodologyRearch methodology
Rearch methodology
 
Research Essay Proposal Sample
Research Essay Proposal SampleResearch Essay Proposal Sample
Research Essay Proposal Sample
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
 
Overview of research methodology.pptx
Overview of research methodology.pptxOverview of research methodology.pptx
Overview of research methodology.pptx
 

More from wsusan1

The Truman Doctrine primarily aided which two countries (Points.docx
The Truman Doctrine primarily aided which two countries (Points.docxThe Truman Doctrine primarily aided which two countries (Points.docx
The Truman Doctrine primarily aided which two countries (Points.docxwsusan1
 
The Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docx
The Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docxThe Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docx
The Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docxwsusan1
 
The trial balance columns of the worksheet for Nanduri Company at Ju.docx
The trial balance columns of the worksheet for Nanduri Company at Ju.docxThe trial balance columns of the worksheet for Nanduri Company at Ju.docx
The trial balance columns of the worksheet for Nanduri Company at Ju.docxwsusan1
 
The treaty of Paris of 1783sold the territory around the Great La.docx
The treaty of Paris of 1783sold the territory around the Great La.docxThe treaty of Paris of 1783sold the territory around the Great La.docx
The treaty of Paris of 1783sold the territory around the Great La.docxwsusan1
 
The transition into adulthood may differ depending on cultural t.docx
The transition into adulthood may differ depending on cultural t.docxThe transition into adulthood may differ depending on cultural t.docx
The transition into adulthood may differ depending on cultural t.docxwsusan1
 
The transition of India from a Hindu to a Muslim state was not a sea.docx
The transition of India from a Hindu to a Muslim state was not a sea.docxThe transition of India from a Hindu to a Muslim state was not a sea.docx
The transition of India from a Hindu to a Muslim state was not a sea.docxwsusan1
 
The transition from a traditional society organized along feudal lin.docx
The transition from a traditional society organized along feudal lin.docxThe transition from a traditional society organized along feudal lin.docx
The transition from a traditional society organized along feudal lin.docxwsusan1
 
The transition from management to governance in international econom.docx
The transition from management to governance in international econom.docxThe transition from management to governance in international econom.docx
The transition from management to governance in international econom.docxwsusan1
 
The transition into adulthood may differ depending on cultural tradi.docx
The transition into adulthood may differ depending on cultural tradi.docxThe transition into adulthood may differ depending on cultural tradi.docx
The transition into adulthood may differ depending on cultural tradi.docxwsusan1
 
The Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docx
The Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docxThe Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docx
The Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docxwsusan1
 
The Tragedy of the CommonsChoose and respond to one of the fol.docx
The Tragedy of the CommonsChoose and respond to one of the fol.docxThe Tragedy of the CommonsChoose and respond to one of the fol.docx
The Tragedy of the CommonsChoose and respond to one of the fol.docxwsusan1
 
The tragedies of 911 marked a turning point in the perception o.docx
The tragedies of 911 marked a turning point in the perception o.docxThe tragedies of 911 marked a turning point in the perception o.docx
The tragedies of 911 marked a turning point in the perception o.docxwsusan1
 
The Tragical History of Doctor Faustus by Christopher Marl.docx
The Tragical History of Doctor Faustus by Christopher Marl.docxThe Tragical History of Doctor Faustus by Christopher Marl.docx
The Tragical History of Doctor Faustus by Christopher Marl.docxwsusan1
 
The toxic gases that can be associated with smoke can be grouped int.docx
The toxic gases that can be associated with smoke can be grouped int.docxThe toxic gases that can be associated with smoke can be grouped int.docx
The toxic gases that can be associated with smoke can be grouped int.docxwsusan1
 
The topics must be aligned to the weekly learning outcomes speci.docx
The topics must be aligned to the weekly learning outcomes speci.docxThe topics must be aligned to the weekly learning outcomes speci.docx
The topics must be aligned to the weekly learning outcomes speci.docxwsusan1
 
The Topic The United States adopts English as its official language.docx
The Topic The United States adopts English as its official language.docxThe Topic The United States adopts English as its official language.docx
The Topic The United States adopts English as its official language.docxwsusan1
 
The topic   Distance learning degree and accredidationThe Boo.docx
The topic   Distance learning degree and accredidationThe Boo.docxThe topic   Distance learning degree and accredidationThe Boo.docx
The topic   Distance learning degree and accredidationThe Boo.docxwsusan1
 
the topic The American poet, Emily Dickinson, had a sad life in .docx
the topic The American poet, Emily Dickinson, had a sad life in .docxthe topic The American poet, Emily Dickinson, had a sad life in .docx
the topic The American poet, Emily Dickinson, had a sad life in .docxwsusan1
 
The topic of your presentation is your research paper. Create a pres.docx
The topic of your presentation is your research paper. Create a pres.docxThe topic of your presentation is your research paper. Create a pres.docx
The topic of your presentation is your research paper. Create a pres.docxwsusan1
 
The topic of your research paper is texting and driving.Assi.docx
The topic of your research paper is texting and driving.Assi.docxThe topic of your research paper is texting and driving.Assi.docx
The topic of your research paper is texting and driving.Assi.docxwsusan1
 

More from wsusan1 (20)

The Truman Doctrine primarily aided which two countries (Points.docx
The Truman Doctrine primarily aided which two countries (Points.docxThe Truman Doctrine primarily aided which two countries (Points.docx
The Truman Doctrine primarily aided which two countries (Points.docx
 
The Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docx
The Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docxThe Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docx
The Trouble with (The Term) ArtAuthor(s) Carolyn DeanSour.docx
 
The trial balance columns of the worksheet for Nanduri Company at Ju.docx
The trial balance columns of the worksheet for Nanduri Company at Ju.docxThe trial balance columns of the worksheet for Nanduri Company at Ju.docx
The trial balance columns of the worksheet for Nanduri Company at Ju.docx
 
The treaty of Paris of 1783sold the territory around the Great La.docx
The treaty of Paris of 1783sold the territory around the Great La.docxThe treaty of Paris of 1783sold the territory around the Great La.docx
The treaty of Paris of 1783sold the territory around the Great La.docx
 
The transition into adulthood may differ depending on cultural t.docx
The transition into adulthood may differ depending on cultural t.docxThe transition into adulthood may differ depending on cultural t.docx
The transition into adulthood may differ depending on cultural t.docx
 
The transition of India from a Hindu to a Muslim state was not a sea.docx
The transition of India from a Hindu to a Muslim state was not a sea.docxThe transition of India from a Hindu to a Muslim state was not a sea.docx
The transition of India from a Hindu to a Muslim state was not a sea.docx
 
The transition from a traditional society organized along feudal lin.docx
The transition from a traditional society organized along feudal lin.docxThe transition from a traditional society organized along feudal lin.docx
The transition from a traditional society organized along feudal lin.docx
 
The transition from management to governance in international econom.docx
The transition from management to governance in international econom.docxThe transition from management to governance in international econom.docx
The transition from management to governance in international econom.docx
 
The transition into adulthood may differ depending on cultural tradi.docx
The transition into adulthood may differ depending on cultural tradi.docxThe transition into adulthood may differ depending on cultural tradi.docx
The transition into adulthood may differ depending on cultural tradi.docx
 
The Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docx
The Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docxThe Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docx
The Trait Model of Personality[WLOs 2, 3] [CLOs 1, 5] .docx
 
The Tragedy of the CommonsChoose and respond to one of the fol.docx
The Tragedy of the CommonsChoose and respond to one of the fol.docxThe Tragedy of the CommonsChoose and respond to one of the fol.docx
The Tragedy of the CommonsChoose and respond to one of the fol.docx
 
The tragedies of 911 marked a turning point in the perception o.docx
The tragedies of 911 marked a turning point in the perception o.docxThe tragedies of 911 marked a turning point in the perception o.docx
The tragedies of 911 marked a turning point in the perception o.docx
 
The Tragical History of Doctor Faustus by Christopher Marl.docx
The Tragical History of Doctor Faustus by Christopher Marl.docxThe Tragical History of Doctor Faustus by Christopher Marl.docx
The Tragical History of Doctor Faustus by Christopher Marl.docx
 
The toxic gases that can be associated with smoke can be grouped int.docx
The toxic gases that can be associated with smoke can be grouped int.docxThe toxic gases that can be associated with smoke can be grouped int.docx
The toxic gases that can be associated with smoke can be grouped int.docx
 
The topics must be aligned to the weekly learning outcomes speci.docx
The topics must be aligned to the weekly learning outcomes speci.docxThe topics must be aligned to the weekly learning outcomes speci.docx
The topics must be aligned to the weekly learning outcomes speci.docx
 
The Topic The United States adopts English as its official language.docx
The Topic The United States adopts English as its official language.docxThe Topic The United States adopts English as its official language.docx
The Topic The United States adopts English as its official language.docx
 
The topic   Distance learning degree and accredidationThe Boo.docx
The topic   Distance learning degree and accredidationThe Boo.docxThe topic   Distance learning degree and accredidationThe Boo.docx
The topic   Distance learning degree and accredidationThe Boo.docx
 
the topic The American poet, Emily Dickinson, had a sad life in .docx
the topic The American poet, Emily Dickinson, had a sad life in .docxthe topic The American poet, Emily Dickinson, had a sad life in .docx
the topic The American poet, Emily Dickinson, had a sad life in .docx
 
The topic of your presentation is your research paper. Create a pres.docx
The topic of your presentation is your research paper. Create a pres.docxThe topic of your presentation is your research paper. Create a pres.docx
The topic of your presentation is your research paper. Create a pres.docx
 
The topic of your research paper is texting and driving.Assi.docx
The topic of your research paper is texting and driving.Assi.docxThe topic of your research paper is texting and driving.Assi.docx
The topic of your research paper is texting and driving.Assi.docx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

The Topic of the Paper The Problem and Solution for Improving Cus.docx

  • 1. The Topic of the Paper: The Problem and Solution for Improving Customer Services for a Restaurant Purpose/scope - The final paper/project is intended to engage students in a real-world issue pertaining to your respective internship. The paper topic will be determined and agreed to by the intern supervisor and student. The topic should be beneficial to the company and educational to the student. Once the topic is determined, the student is expected to define the research problem (problem statement), collect the necessary data, and report on the findings. The length of the paper is not specified; however, quality is preferred over quantity. It is expected that papers should be at least 10+ pages long. Finally, it is required that the paper/project and findings will be presented to the internship supervisor by the student The final paper/project format should be double-spaced using 12-point Times New Roman font with 1” margins.Content, writing logic/flow, spelling and grammar will be graded as part of your final grade. The final paper MUST include the bolded section headings as directed and be organized in the following
  • 2. manner: 1. Final Paper Format – Your paper must follow the following format. a. Cover Page – Title of the paper, course name and number, semester year, student name and identification number and instructor’s name b. Table of Contents – Prepare a detailed table of contents, which includes the following section below c. Executive Summary – The executive summary should be a summary of the report in 1-2 pages with the following captions: i. Parameters of the report – purpose/objective of the study, type of company, etc. ii. Description of the problem – describe the problem and how your project will be beneficial to the company. iii. Methodology – describe how you went about solving the problem. What type of survey did you do? How did you collect data?, etc. iv. Summary of findings and conclusions – summary of the facts you found surrounding the problem or situation being researched and your conclusions based upon those facts. v. Recommendations – summarize the specific recommendations
  • 3. you are making to the company to solve the problem or respond to the research project. d. Section I – Introduction/Background – Provide the reader with a description/ background of the topic that is being researched. Give a contextual backdrop to why this is an important issue to be addressed (e.g., What are competitors doing? What is the marketplace currently doing or headed? What happens if this isn’t addressed?). e. Section II – Statement of the Problem/Research Project – A brief discussion of the specific topic that will be investigated and addressed and why it is important. (e.g., What is the problem? Why is this problem worth my attention? How important, influential, or popular is this problem? Would research findings lead to some useful change in best practice?) f. Section III – Methodology – A discussion of how you went about approaching and solving the problem or research project. In other words, how did you collect the data you needed to analyze for the project? This section, for example, should included details on what type of survey you did including where you found the survey and/or how you collected data, etc. g. Section IV – Findings – A presentation of the factual (truth and facts – not opinion) information you found regarding the
  • 4. problem to be solved or the research project. What were the strategic alternatives that might have been used to solve the problem or research project? What alternative(s) did you decide to use and why? h. Section V– Conclusions - Given your findings of fact, what are your conclusions as to what the underlying problems are, or conclusions as to the research project? i. Section VI – Recommendations - Given your findings and conclusions, what are your specific recommendations to solve the problems or achieve the objective of the research study? j. References – 2-3 references minimum but more are expected. Please provide a reference section when you cite any source in your paper. Remember plagiarism is not acceptable and is grounds for failure. All citation and references should follow the APA format. Please see (http://owl.english.purdue.edu/owl/resource/560/01) or (www.apastyle.org) for exact specifications. 2. Final Paper Grading Criteria – The final paper will be graded subjectively with the following items of critical importance: a. Quality and depth of analysis of the problem or subject of the research. b. Quality and depth of the findings and conclusions. c. Quality and depth of recommendations. d. Organization and presentation of the report, including
  • 5. grammar, spelling, content, use of sub-captions, exhibits, numbering systems, and graphics. e. Feedback (comments and grade A, B, etc.) by your supervisor will also be used to determine your grade. Students are required to present their findings to their supervisor during the semester. Turnitin.com Requirement · All final papers must be uploaded and submitted through Turnitin.com link on iLearn for plagiarism and grammar checks. · Directions and feedback: http://at.sfsu.edu/support/how- submit-turnitin-assignment · The paper must be uploaded and submitted to Turnitin.com no later than the final packet due date outlined on the course schedule. You can review the Turnitin feedback and make changes to your paper. · Turnitin Helpful links: · To view you Turnitin Originality Report clink on the directions link: http://at.sfsu.edu/support/how-view-your- turnitin-originality-report · Student Training – About Originality PDF - http://turnitin.com/en_us/training/student-training/about- originalitycheck · Viewing originality reports: http://turnitin.com/en_us/training/student-training/viewing-
  • 6. originality-reports Running Head: THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS 1 THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS 7 The Scientific Method Applied To Digital Forensics by student name
  • 7. Professor D. Barrett University Course Todays date Abstract Computer forensics is the process of digital investigation combining technology, the science of discovery and the methodical application of legal procedures. Judges and jurors often do not understand the inner workings of computers and
  • 8. rely on digital forensics experts to seek evidence and provide reliable, irrefutable testimony based on their findings. The scientific method is the process of diligent, disciplined discovery where a hypothesis is formed without bias, and analysis and testing is performed with the goal of effectively proving or disproving a sound hypothesis. When investigative teams do not follow standard investigative procedures it can lead to inappropriate and inaccurate evidentiary presentations that are extremely difficult for non-technical participants to refute. The practitioners of digital forensics can make strides to measure and improve the accuracy of their findings using the scientific method. This paper includes a summary of the scientific method as applied to the emerging and growing field of digital forensics and presents details of a specific case where both the prosecution and defense would have benefitted greatly from the use of this proven method of discovery and analysis. Findings can only be deemed reasonably conclusive when the scientific process is correctly applied to an investigation, findings are repeatable and verifiable, and where both the evidence collected and the tools used are subject to the utmost scrutiny. The Scientific Method Applied To Digital Forensics The forensic analyst and investigator must use a unique
  • 9. combination of technical, investigative, and scientific skills when approaching a forensic case. Most adults remember the Scientific Method from their middle school science class as a set of six steps beginning with stating a problem, gathering information, forming a hypothesis, testing the hypothesis, analyzing the data and drawing conclusions that either support or do not support the hypothesis. Peisert, Bishop, & Marzullo (2008) note that the term computer forensics has evolved to mean “scientific tests of techniques used with the detection of crime” yet note that many academic computer scientists also use the term to refer to the “process of logging, collecting, auditing or analyzing data in a post hoc investigation”. The necessity to maintain chain of custody requires methodical and detailed procedures, as does the formulation of a legitimate and unbiased hypothesis and conclusion using the scientific method. Since many judges and jurors assume that computer forensic evidence is as “reliable and conclusive” as it is depicted on television, the legal system is unaware of the volatile nature of computer forensics investigations and the significance of a scientific approach to evidence gathering and analysis (Peisert et al., 2008). The Scientific Process as Applied to Computer Forensics Peisert et al. (2008) discuss in detail the need for the use of the scientific method in forensic investigations, not only for the process of discovery and analysis of evidence, but for
  • 10. measuring the accuracy of the forensic tools used in an investigation. Casey (2010) agrees, and cautions that evidence must be compared to known samples so that investigators better understand the scope and context of the evidence that is discovered or presented and to better understand the output of forensic tools. Casey (2010) further elaborates that the scientific method is a powerful tool for forensic investigators who must be neutral fact finders rather than advocates for one side of a case or the other. The process of creating a hypothesis and completing experiments to prove or disprove them allows an investigator to gain a concrete understanding of the digital evidence or mere traces of evidence under analysis. Casey (2010) also notes that while there is no ethical requirement to do so and may be impractical, a thorough investigative practice would consider investigation of alternate scenarios presented by defense. Forensic examination tools can contain bugs, or behave differently with various types of data and forensic images. Casey (2010) recommends that investigators examine evidence at both the physical and logical layers since both methods can provide unique perspectives, and the physical layer may not yield deleted, corrupted or hidden data. Suspects with limited technical experience can rename image files with different extensions not used for images, and those with more technical knowledge can use advanced steganography techniques to
  • 11. embed data within other data in an attempt to defy detection. The 2004 case of State of Connecticut v. Julie Amero in Norwich, Connecticut is one where the scientific method was clearly missing from both the defense and prosecution. Eckelberry, Dardick, Folkerts, Shipp, Sites, Stewart, & Stuart (2007) completed a comprehensive post-trial analysis of the evidence as provided to the defense and discovered very different evidentiary results using a structured scientific approach to their investigation. Amero was a substitute elementary teacher accused of displaying pornographic images that appeared on pop-up’s to her students from what ultimately was proven to be a spyware-infected school computer. The credibility of the legal system was compromised and the prosecution made a numerous incorrect assumptions based on results provided from inadequate forensic tools and poor investigative techniques (Eckelberry et al., 2007). The computer that Amero was using in her classroom was a Windows 98 machine running Internet Explorer 6.0.2800 and a trial version of Cheyenne AntiVirus that had not received an update in several years. The content filtering at the school had expired several months prior to the incident. The prosecution presented non-factual statements that may easily have been misconstrued by a non-technical jury and that likely caused a guilty verdict. The false testimony made by the school IT specialist indicated that the virus protection was updated
  • 12. weekly when in fact they were not since computer logs and the signatures clearly showed that virus updates were no longer supported by the vendor. The updates may have been performed but against files that had no new updates for many months. The IT Manager who testified also incorrectly claimed that adware was not able to generate pornography and especially not “endless loop pornography”. This information was received as a fact by the non-technical jury and incredibly not refuted by the defense. The detective for the prosecution also stated that his testimony was based completely on the product ComputerCop which the vendor admits is incapable of determining if a website was visited purposefully or unintentionally. The forensic detective astoundingly admitted that he did not examine the computer for the presence of adware (Eckelberry et al., 2007, p. 7-10). The case against Amero was largely based on testimony stating that she deliberately visited the offensive pornographic websites and that the sites visited subsequently showed the links in red. The post-trial investigative team quickly verified that the ‘sites visited’ color setting in Internet Explorer on the suspect machine was set to “96,100,32” which is a greenish-gray color. One of the web pages that the defendant allegedly visited had an HTML override to highlight one of the links presented in red and was not colored based on a deliberate visit to the site. According to Eckelberry et al. (2007) the page in question was
  • 13. not discovered in “any of the caches or Internet history files or the Internet History DAT files. The post-trial investigative team through meticulous investigation and use of the scientific method were able to present facts that were “exculpatory evidence showing that the link was never clicked on by the defendant” or any other person, and disproved most of the statements made by the forensics examiner and the witnesses for the prosecution (Eckelberry et al., 2007, p. 12-14). The prosecution testimony stated that there was no evidence of uncontrollable pop ups found on the suspect machine, however, the post-trial investigative team discovered irrefutable evidence that the page in question was loaded twenty-one times in one second using a computer forensics tool called X-Ways Trace. Eckleberry et al. (2007) detail many other instances where testimony was haphazard and discovered that a Halloween screen saver was the source of the adware that presented the continuous stream of pornographic sites. The chain of custody was also compromised in that the disk image was from a Dell PC but the defense witness saw a Gateway PC stored at the police station. The officer reportedly seized a computer but the police report contradicts this and states that only a drive was taken (Eckelberry et al., 2007, p. 14-17). The case described and investigated by Eckelberry et al. (2007) resembles a staged blunder designed as a humorous sample case for beginning forensic students to discuss. The case was
  • 14. however very real and even though the defendant was eventually acquitted she suffered lasting harm from the notoriety based on the initial conviction of contributing to the delinquency of minors. If the prosecution or defense had investigated the evidence using the scientific method and maintained a credible chain of custody, or at least used clear critical thinking while performing a thorough forensic investigation this case may never have gone to trial. It wasted the time and resources of judge, jury, and countless other participants in the trial and permanently damaged an innocent victim (Eckelberry et al., 2007). Conclusion The scientific method is a process that allows confidence in a hypothesis when it can be subjected to repeated identical tests. The use of the scientific method not only provides a methodical structure to a forensic investigation, it lends credibility to a case in the very nature of the steps used to document and diligently test any given hypothesis. The case independently investigated post-trial by Eckelberry et al. (2007) was performed by a team of trained experts who were well aware of the necessity of the methodical requirements and necessity of the scientific method of discovery. Their findings proved that the suspect was in fact a victim of poorly maintained computers by a local Connecticut school system, that the forensic expert and witnesses who testified in the case were untrained and
  • 15. uninformed and used inadequate tools for the investigation. Cases such as State of Connecticut v. Julie Amero illustrate the importance of using the scientific method, and the necessity of proper training in the art and science of digital forensics. References Carrier, B. (2002, October). Open Source Digital Forensics Tools: The Legal Argument. In @ Stake Inc. Retrieved September 8, 2011, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.78 99&rep=rep1&type=pdf Casey, E. (Ed.). (2010). Handbook of Digital Forensics and Investigation (Kindle ed.). Burlington, MA: Elsevier, Inc. Eckelberry, A., Dardick, G., Folkerts, J., Shipp, A., Sites, E., Stewart, J., & Stuart, R. (2007, March 21). Technical Review of the Trial Testimony of State of Connecticut vs. Julie Amero. Retrieved September 9, 2011, from http://www.sunbelt- software.com/ihs/alex/julieamerosummary.pdf Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to Computer Forensics and Investigations (4th ed.). Boston, MA: Course Technology, Cengage Learning. Peisert, S., Bishop, M., & Marzullo, K. (2008, April). Computer Forensics in Forensis. Retrieved September 8, 2011, from