Recovery techniques for deleted email items in digital forensic context

Chorong Jeong, Keun G. Lee, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Corporations use email as their primary method for internal communication and business processes. By their nature, the email messages are in general used for major business processes that contain large amounts of business information. Technological improvements also enable an email system to handle large amount of data. When there is a criminal activity like Technology leakage, an email message can be highly likely to become critical evidence; however, there is a high chance that a suspect will intentionally delete the message. Thus, the ability to recover deleted email will be very critical to prove the wrongdoing in this case. This paper analyzes how various email client applications adopt their deletion systems and any possible recovery methods are introduced accordingly.

Original languageEnglish
Title of host publicationCommunications in Computer and Information Science
Pages115-122
Number of pages8
Volume185 CCIS
EditionPART 2
DOIs
Publication statusPublished - 2011 Jul 14
Event6th International Conference on Future Information Technology, FutureTech 2011 - Loutraki, Greece
Duration: 2011 Jun 282011 Jun 30

Publication series

NameCommunications in Computer and Information Science
NumberPART 2
Volume185 CCIS
ISSN (Print)18650929

Other

Other6th International Conference on Future Information Technology, FutureTech 2011
CountryGreece
CityLoutraki
Period11/6/2811/6/30

Fingerprint

Electronic mail
Recovery
Industry
Digital forensics
Communication

Keywords

  • email
  • email forensics
  • recovery
  • recovery email

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Jeong, C., Lee, K. G., & Lee, S. (2011). Recovery techniques for deleted email items in digital forensic context. In Communications in Computer and Information Science (PART 2 ed., Vol. 185 CCIS, pp. 115-122). (Communications in Computer and Information Science; Vol. 185 CCIS, No. PART 2). https://doi.org/10.1007/978-3-642-22309-9_14

Recovery techniques for deleted email items in digital forensic context. / Jeong, Chorong; Lee, Keun G.; Lee, Sangjin.

Communications in Computer and Information Science. Vol. 185 CCIS PART 2. ed. 2011. p. 115-122 (Communications in Computer and Information Science; Vol. 185 CCIS, No. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jeong, C, Lee, KG & Lee, S 2011, Recovery techniques for deleted email items in digital forensic context. in Communications in Computer and Information Science. PART 2 edn, vol. 185 CCIS, Communications in Computer and Information Science, no. PART 2, vol. 185 CCIS, pp. 115-122, 6th International Conference on Future Information Technology, FutureTech 2011, Loutraki, Greece, 11/6/28. https://doi.org/10.1007/978-3-642-22309-9_14
Jeong C, Lee KG, Lee S. Recovery techniques for deleted email items in digital forensic context. In Communications in Computer and Information Science. PART 2 ed. Vol. 185 CCIS. 2011. p. 115-122. (Communications in Computer and Information Science; PART 2). https://doi.org/10.1007/978-3-642-22309-9_14
Jeong, Chorong ; Lee, Keun G. ; Lee, Sangjin. / Recovery techniques for deleted email items in digital forensic context. Communications in Computer and Information Science. Vol. 185 CCIS PART 2. ed. 2011. pp. 115-122 (Communications in Computer and Information Science; PART 2).
@inproceedings{0424dbc958244a878e01d32f9abc3525,
title = "Recovery techniques for deleted email items in digital forensic context",
abstract = "Corporations use email as their primary method for internal communication and business processes. By their nature, the email messages are in general used for major business processes that contain large amounts of business information. Technological improvements also enable an email system to handle large amount of data. When there is a criminal activity like Technology leakage, an email message can be highly likely to become critical evidence; however, there is a high chance that a suspect will intentionally delete the message. Thus, the ability to recover deleted email will be very critical to prove the wrongdoing in this case. This paper analyzes how various email client applications adopt their deletion systems and any possible recovery methods are introduced accordingly.",
keywords = "email, email forensics, recovery, recovery email",
author = "Chorong Jeong and Lee, {Keun G.} and Sangjin Lee",
year = "2011",
month = "7",
day = "14",
doi = "10.1007/978-3-642-22309-9_14",
language = "English",
isbn = "9783642223082",
volume = "185 CCIS",
series = "Communications in Computer and Information Science",
number = "PART 2",
pages = "115--122",
booktitle = "Communications in Computer and Information Science",
edition = "PART 2",

}

TY - GEN

T1 - Recovery techniques for deleted email items in digital forensic context

AU - Jeong, Chorong

AU - Lee, Keun G.

AU - Lee, Sangjin

PY - 2011/7/14

Y1 - 2011/7/14

N2 - Corporations use email as their primary method for internal communication and business processes. By their nature, the email messages are in general used for major business processes that contain large amounts of business information. Technological improvements also enable an email system to handle large amount of data. When there is a criminal activity like Technology leakage, an email message can be highly likely to become critical evidence; however, there is a high chance that a suspect will intentionally delete the message. Thus, the ability to recover deleted email will be very critical to prove the wrongdoing in this case. This paper analyzes how various email client applications adopt their deletion systems and any possible recovery methods are introduced accordingly.

AB - Corporations use email as their primary method for internal communication and business processes. By their nature, the email messages are in general used for major business processes that contain large amounts of business information. Technological improvements also enable an email system to handle large amount of data. When there is a criminal activity like Technology leakage, an email message can be highly likely to become critical evidence; however, there is a high chance that a suspect will intentionally delete the message. Thus, the ability to recover deleted email will be very critical to prove the wrongdoing in this case. This paper analyzes how various email client applications adopt their deletion systems and any possible recovery methods are introduced accordingly.

KW - email

KW - email forensics

KW - recovery

KW - recovery email

UR - http://www.scopus.com/inward/record.url?scp=79960147854&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79960147854&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-22309-9_14

DO - 10.1007/978-3-642-22309-9_14

M3 - Conference contribution

SN - 9783642223082

VL - 185 CCIS

T3 - Communications in Computer and Information Science

SP - 115

EP - 122

BT - Communications in Computer and Information Science

ER -