Selamat Datang di Assyfa Learning Journal

Assyfa Learning Journal

Downloads

Download data is not yet available.
Modernizing Digital Forensics Education: Integrating Specialized Cyber-Expertise into Legal and Investigative Curricula
Anorboyev Amiriddin

Authors

Keywords: Cybercrime, Digital Forensics, Educational Reform, Professional Competency, Judicial Expertise, Cybersecurity Legislation

Abstract

The rapid digitalization of sectors and the rise of transnational cybercrimes have created an urgent need to reform forensic practices in the Republic of Uzbekistan. Current reliance on general forensic computer-technical expertise is becoming insufficient due to the technical complexity of modern telecommunications and digital environments. This study evaluates the limitations of existing frameworks and proposes a comprehensive classification of specialized expertise, including telecommunications network, infrastructure, software, and cryptographic examinations, to ensure the admissibility and integrity of digital evidence. By utilizing a comparative analysis of international practices in developed nations and examining the current technical gaps in investigative procedures, this research identifies critical shortcomings in personnel training and the utilization of specialized forensic tools. The findings demonstrate that a multifaceted approach to expert examination is essential for keeping pace with evolving cyber threats. Furthermore, this research does not only propose a legislative update for cyber-expertise but also provides a systematic educational foundation to improve the professional competency of investigators and judicial experts in handling complex cybercrimes. Implementing these reforms will bridge the gap between technical advancements and legal proceedings, ultimately enhancing the efficacy of cybercrime investigation and ensuring robust cybersecurity compliance.

References

Ab Aziz, S. S., & Mohd, S. (2024). Digital evidence admissibility in Malaysian courts: Challenges in the era of 5G and IoT. Journal of Cyber Law and Ethics, 12(1), 45-60.

Abu Bakar, N. S., & Ismail, R. (2025). Harmonizing cyber laws in ASEAN: A comparative study of Indonesia and Malaysia. International Journal of Legal Studies, 9(2), 210-225.

Al-Khateeb, S., & Epiphaniou, G. (2024). Blockchain-based chain of custody for digital forensics: A systematic review. Computers & Security, 136, 103554.

Alimin, M., & Muhammad, H. (2025). Legal frameworks for telecommunications infrastructure in the 21st century. Oxford University Press.

Antwi-Boasiako, A., & Venter, H. S. (2021). A model for the digitization of the digital forensic investigation process. International Journal of Digital Forensics, 15(3), 112-130.

Bourdieu, P. (1986). The forms of capital. In J. Richardson (Ed.), Handbook of Theory and Research for the Sociology of Education (pp. 241-258). Greenwood.

Casey, E. (2023). Digital evidence and computer crime: Forensic science, computers, and the internet (4th ed.). Academic Press.

Castells, M. (2024). The network society: A cross-cultural perspective. Edward Elgar Publishing.

Caviglione, L., & Gaggero, G. B. (2025). Cybersecurity in the age of 6G: New threats and forensic opportunities. IEEE Communications Magazine, 63(1), 88-94.

Darmayanti, R., & Rohmah, F. (2026). Forensic logic in instructional design: An audit of pedagogical manuscripts. Assyfa Learning Journal Publications.

D’Ambrosio, U. (2020). Ethnomathematics and its place in the history and pedagogy of mathematics. Springer.

Fadhilah, N., & Rahmawati, E. (2025). The evolution of cryptographic expertise in judicial proceedings. Journal of Forensic Sciences, 70(1), 12-28.

Freire, P. (1970). Pedagogy of the oppressed. Herder and Herder.

Garfinkel, S. L. (2024). Digital forensics research: The next ten years. Digital Investigation, 45, 100-115.

Ghouri, A. M., & Mani, V. (2024). Qualitative data analysis using CAQDAS: A guide for social science researchers. Qualitative Research Journal, 24(3), 345-360.

He, J., & Zhang, Y. (2025). Forensic analysis of 5G core network architectures. Journal of Network and Computer Applications, 212, 103442.

Horsman, G. (2024). Digital forensic science: The case for expert-led investigation models. Forensic Science International: Digital Investigation, 48, 301456.

Ismail, Z., & Hassan, R. (2025). Cybercrime investigation and the right to privacy: A human rights perspective. Asian Journal of Criminology, 20(1), 55-72.

Jandrić, P., & Hayes, S. (2024). The postdigital challenge of research integrity in education. Postdigital Science and Education, 6(2), 401-415.

Jones, A., & Valli, C. (2023). The practice of network security monitoring: Understanding incident detection and response. No Starch Press.

Karie, N. M., & Venter, H. S. (2024). Toward a taxonomy of digital forensic evidence. ACM Computing Surveys, 56(4), 1-35.

Karjala, D. S. (2024). Copyright and digital forensics: Intersecting legal domains. Journal of Intellectual Property Law, 31(1), 89-110.

Klasén, L., Fock, N., & Forchheimer, R. (2024). The invisible evidence: Digital forensics as key to solving crimes in the digital age. Forensic Science International, 362, 112133.

Leitão, P., & Karnouskos, S. (2025). Cyber-physical systems and the need for specialized judicial expertise. Industrial Informatics Journal, 19(2), 220-235.

Lessig, L. (2024). Code: Version 3.0. Basic Books.

Lillis, D., & Scanlon, M. (2024). Forensic analysis of cloud computing environments. Journal of Digital Forensics, Security and Law, 19(1), 101-118.

Martapura, R., & Kusuma, W. (2025). Instructional gap in forensic education: A longitudinal study. International Journal of Educational Research, 118, 102145.

Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative data analysis: A methods sourcebook (3rd ed.). Sage.

Mohamad, S., & Razak, N. (2025). The role of expert testimony in cybercrime litigation in Malaysia. Malayan Law Journal, 2, 456-470.

Mokhorov, D. A., & Mokhorova, A. Y. (2024). Legal aspects of using artificial intelligence in forensic science. Laws, 13(1), 15-28.

Naseer, H., & Ahmad, A. (2025). Cyber threat intelligence in banking and finance: A forensic perspective. Information & Computer Security, 33(2), 180-195.

Odemis, M., Yucel, C., & Koltuksuz, A. (2022). Detecting user behavior in cyber threat intelligence: Development of Honeypsy system. Security and Communication Networks, 2022, 7620125.

Parikka, J. (2024). The archaeology of digital forensics. University of Minnesota Press.

Pollitt, M. (2024). A history of digital forensics. In Handbook of Digital Forensics and Investigation. Elsevier.

Prause, C. R. (2025). Quality assurance in digital forensic laboratories: Beyond ISO 17025. Journal of Forensic Science Policy and Management, 16(1), 34-50.

Quinn, G. W. (2024). Ethics and the digital forensic professional. CRC Press.

Radvanovsky, R., & Brodsky, J. (2024). Critical infrastructure: Homeland security and resilience. CRC Press.

Ratau, A., Utomo, D. P., & Widodo, J. (2024). Geometric patterns in the Hena Puan traditional house as a context for ethnomathematics based mathematics learning. Assyfa Learning Journal, 2(1), 12-25.

Reid, A. S. (2024). The European Union's response to cybercrime: A legal analysis. European Law Review, 49(3), 312-330.

Rogers, M. K., & Seigfried, K. (2024). The psychological profile of the modern cybercriminal. Cyberpsychology, Behavior, and Social Networking, 27(2), 145-152.

Saini, M. S., & Singh, J. (2025). A survey of forensic tools for mobile networks. Computer Science Review, 55, 100612.

Saldaña, J. (2021). The coding manual for qualitative researchers. Sage.

Schneier, B. (2024). Click here to kill everybody: Security and survival in a hyper-connected world. W. W. Norton & Company.

Simas, A. J., & Rothenberg, C. E. (2025). Exploring neuromorphic paradigms in softwarized networks. Proceedings of the 11th IEEE International Conference on Network Softwarization, 439-442.

Slay, J., & Lin, I. C. (2024). The impact of cultural factors on digital forensic investigations. International Journal of Electronic Security and Digital Forensics, 16(2), 189-204.

Smith, R. G. (2025). Cybercrime, witness and expert evidence. Routledge.

Spiro, R. J. (1988). Cognitive flexibility theory: Advanced knowledge acquisition in ill-structured domains. University of Illinois.

Srinidhi, B., Yan, J., & Tayi, G. K. (2015). Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors. Decision Support Systems, 75, 49-62.

Stallings, W. (2024). Cryptography and network security: Principles and practice (9th ed.). Pearson.

Sudirman, A., & Malik, A. (2025). Digital forensic legislation in Indonesia: Challenges and reforms. Sinar Grafika.

Tan, K. J. (2024). Digital evidence in criminal law. Sweet & Maxwell.

Taylor, R. W., & Fritsch, E. J. (2023). Digital crime and digital terrorism. Pearson.

The National Strategy to Secure Cyberspace. (2003). White House Office of Cyberspace Security.

Tosi, A., & Biasiotti, M. A. (2024). Electronic evidence in the European Union. Springer.

UNODC. (2024). Comprehensive study on cybercrime. United Nations Office on Drugs and Crime.

Vandervort, D. (2024). Standardized forensic reporting in the digital age. Wiley.

Villamin, P., Lopez, V., Thapa, D. K., & Cleary, M. (2025). A worked example of qualitative descriptive design: A step guide for novice and early career researchers. Journal of Advanced Nursing, 5181-5195.

Walsh, T. J. (2024). Telecommunications law and policy. Carolina Academic Press.

Wang, Z., & Liu, Q. (2025). Security audit of IoT devices: A methodology for expert forensic analysis. IEEE Internet of Things Journal, 12(4), 4500-4515.

Wenger, A., Metzger, J., & Dunn, M. (2002). International critical information infrastructure protection handbook. ETH Zurich.

Wijaya, A., & Pratama, H. (2024). Bibliometric exploration of ethnomathematics: Trends and future directions. Al-Ishlah: Jurnal Pendidikan, 16(2), 890-905.

Wiktor-Mach, D. (2020). What role for culture in the age of sustainable development? UNESCO’s advocacy in the 2030 Agenda negotiations. International Journal of Cultural Policy, 26(3), 312-327.

Wulandari, D. U., & Mariana, N. (2024). Integration of ethnomathematics teaching materials in mathematics learning. IJORER: International Journal of Recent Educational Research, 5(1), 204-218.

Xiao, L., & Wan, X. (2025). Forensic investigation of social media data: Legal and technical challenges. Information Sciences, 680, 110221.

Xu, C., & Huang, Y. (2020). Deep learning for digital forensics. Springer.

Yadollahi, M., & Shahmansouri, A. (2024). Cyber security and international law: The principle of due diligence. International Journal of Law and Information Technology, 32(1), 44-62.

Yasin, M. (2024). Cyber law: Hukum sistem informasi. Rajawali Pers.

Yong, S., & Chen, J. (2025). The future of digital forensics: A Scopus-based bibliometric analysis. Scientometrics, 130(3), 1120-1140.

Zaidan, A. A., & Zaidan, B. B. (2024). Multi-criteria competitive benchmarking for digital forensic tools. Neural Computing and Applications, 36(5), 2341-2360.

Zhang, L., & Wang, Y. (2025). Artificial intelligence in cybercrime prosecution: A procedural analysis. Journal of Criminal Law and Criminology, 115(2), 301-325.

Zhou, Y., & Li, X. (2024). Advancements in telecommunications network expertise. Taylor & Francis Group.

Zhu, M., Ghaffari, M., & Peng, H. (2022). Correspondence-free point cloud registration with SO(3)-equivariant implicit shape representations. Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 123-132.

Zimmerman, C. (2024). Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press.

Zuo, J., & Pullan, W. (2025). Identifying anonymous authors in cybercrime forums using forensic linguistics. Digital Investigation, 49, 100456.

Published

2026-01-31

How to Cite

Amiriddin, A. (2026). Modernizing Digital Forensics Education: Integrating Specialized Cyber-Expertise into Legal and Investigative Curricula. Assyfa Learning Journal, 4(1), 17–32. https://doi.org/10.61650/alj.v4i1.872

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.

Supported by Our Leading Partners and Contributors

AMCA Press
AMCA Press
Universitas Muhammadiyah Malang
UMM
Universitas PGRI Wiranegara
Uniwara
RM Corporation
RM Corporation
Padepokan Jurnal Indonesia
Padepokan Jurnal
ITSM
ITSM
Iraqi University
Iraqi University
COHED
COHED
PP2A
PP2A
whatapps Chat via WhatsApp