Digital forensics and business management: The role of digital forensics in investigating cybercrimes affecting digital businesses

Rakibul Hasan Chowdhury 1, 2, 3, 4, 5, * and Annika Mostafa 6, 7

1 Business Analytics (2025), Trine University, USA.
2 Digital Business Management (2022), University of Portsmouth, UK
3 Accounting (2019), Army Institute of Business Administration, (Affiliated with the BUP), Bangladesh.
4 International Institute of Business Analysis
5 CCBA certified & Member
6 Criminal Justice (2022), University of Portsmouth, UK.
7 University of Asia pacific, Bangladesh
 
Review Article
World Journal of Advanced Research and Reviews, 2024, 23(02), 1060–1069
Article DOI: 10.30574/wjarr.2024.23.2.2438
 
Publication history: 
Received on 03 July 2024; revised on 08 August 2024; accepted on 10 August 2024
 
Abstract: 
As cybercrimes increasingly threaten digital businesses, the role of digital forensics has become crucial in investigating and mitigating these threats. This research explores the intersection of digital forensics and business management, focusing on how forensic techniques can support cybercrime investigations and enhance cybersecurity measures. By employing a mixed-methods approach, including literature reviews, surveys, interviews, and case studies, this study aims to elucidate the role of digital forensics in identifying, analyzing, and addressing cyber threats. The research also examines the challenges business managers face in collaborating with law enforcement and identifies best practices for improving such collaborations. Findings are expected to provide actionable insights for digital business managers, law enforcement officials, and cybersecurity professionals, highlighting effective strategies for integrating digital forensics into business management and enhancing overall cyber resilience.
 
Keywords: 
Digital Forensics; Cybercrime; Business Management; Cybersecurity; Law Enforcement Collaboration; Forensic Techniques; Incident Response; Cyber Threats; Digital Evidence; Forensic Analysis
 
Full text article in PDF: 
Share this