This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.
|Title of host publication||Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security|
|Subtitle of host publication||10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings|
|Editors||H. Jahankhani, A. Carlile, B. Akhgar, A. Taal, A. G. Hessami, A. Hosseinian-Far|
|Number of pages||14|
|Publication status||Published - 4 Sep 2015|