Recovery techniques for deleted email items in digital forensic context

Chorong Jeong, Keun Gi Lee, Sangjin Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Corporations use email as their primary method for internal communication and business processes. By their nature, the email messages are in general used for major business processes that contain large amounts of business information. Technological improvements also enable an email system to handle large amount of data. When there is a criminal activity like Technology leakage, an email message can be highly likely to become critical evidence; however, there is a high chance that a suspect will intentionally delete the message. Thus, the ability to recover deleted email will be very critical to prove the wrongdoing in this case. This paper analyzes how various email client applications adopt their deletion systems and any possible recovery methods are introduced accordingly.

    Original languageEnglish
    Title of host publicationFuture Information Technology - 6th International Conference, FutureTech 2011, Proceedings
    Pages115-122
    Number of pages8
    EditionPART 2
    DOIs
    Publication statusPublished - 2011
    Event6th International Conference on Future Information Technology, FutureTech 2011 - Loutraki, Greece
    Duration: 2011 Jun 282011 Jun 30

    Publication series

    NameCommunications in Computer and Information Science
    NumberPART 2
    Volume185 CCIS
    ISSN (Print)1865-0929

    Other

    Other6th International Conference on Future Information Technology, FutureTech 2011
    Country/TerritoryGreece
    CityLoutraki
    Period11/6/2811/6/30

    Keywords

    • email
    • email forensics
    • recovery
    • recovery email

    ASJC Scopus subject areas

    • General Computer Science
    • General Mathematics

    Fingerprint

    Dive into the research topics of 'Recovery techniques for deleted email items in digital forensic context'. Together they form a unique fingerprint.

    Cite this