Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints

Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals.  This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ongoing investigation.   IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting offenders.

[1]  Jose J. Gonzalez,et al.  Vulnerability Black Markets: Empirical Evidence and Scenario Simulation , 2009 .

[2]  James G. Phillips,et al.  Shyness and Anxiety as Predictors of Patterns of Internet Usage , 2002, Cyberpsychology Behav. Soc. Netw..

[3]  Cormac Herley,et al.  Why do Nigerian Scammers Say They are From Nigeria? , 2012, WEIS.

[4]  Craig Ross,et al.  The Influence of Shyness on the Use of Facebook in an Undergraduate Sample , 2009, Cyberpsychology Behav. Soc. Netw..

[5]  Scott H. Decker,et al.  Criminal Expertise and Offender Decision Making: An Experimental Study of the Target Selection Process in Residential Burglary , 1995 .

[6]  Robert Taylor,et al.  Criminal profiling and insider cyber crime , 2005, Digit. Investig..

[7]  Kimberly Merritt,et al.  AN INVESTIGATION OF SELF-REPORTED COMPUTER LITERACY: IS IT RELIABLE? , 2005 .

[8]  Dorothy E. Denning,et al.  HIDING CRIMES IN CYBERSPACE , 1999 .

[9]  Edward W. Felten,et al.  Password management strategies for online accounts , 2006, SOUPS '06.

[10]  Tony Krone A typology of online child pornography offending , 2004 .

[11]  Fawn T. Ngo,et al.  Cybercrime Victimization : An examination of Individual and Situational level factors , 2011 .

[12]  Antonio Colella,et al.  Digital Profiling: A Computer Forensics Approach , 2011, ARES.

[13]  A. Buss,et al.  Shyness and sociability. , 1981 .

[14]  Mark Claypool,et al.  Implicit interest indicators , 2001, IUI '01.

[15]  J. A. Hamilton,et al.  An Examination of the Techniques and Implications of the Crowd-Sourced Collection of Forensic Data , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[16]  Antonio Colella,et al.  Digital scene of crime: technique of profiling users , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[17]  Marcus K. Rogers,et al.  A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..

[18]  Volkan Topalli,et al.  Criminal Expertise and Offender Decision-Making An Experimental Analysis of How Offenders and Non-Offenders Differentially Perceive Social Stimuli , 2005 .

[19]  Marcus K. Rogers,et al.  The Psyche of Cybercriminals: A Psycho-Social Perspective , 2011 .

[20]  Susan Wiedenbeck,et al.  PATTERNS OF INFORMATION SEEKING ON THE WEB: A QUALITATIVE STUDY OF DOMAIN EXPERTISE AND WEB EXPERTISE , 2003 .