To read this content please select one of the options below:

A cognitive walkthrough of Autopsy Forensic Browser

David J. Bennett (Department of Computing (Academic), Canterbury Christ Church University, Canterbury, UK)
Paul Stephens (Department of Computing (Academic), Canterbury Christ Church University, Canterbury, UK)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 20 March 2009

1285

Abstract

Purpose

The purpose of this paper is to review the usability of the Autopsy Forensic Browser in order to improve future versions of this, or similar, tools.

Design/methodology/approach

The software Autopsy Forensic Browser was analysed for usability using a cognitive walkthrough approach.

Findings

The results of the evaluation indicate that there are many areas where usability could be improved and these are classified into areas of eight overlapping areas. Examples from each area are presented, with suggestions as to methods to alleviate them.

Research limitations/implications

The review is limited by the use of the “expert evaluator” approach rather than using a user‐based evaluation. This would tend to mean that some of the usability errors would be “false positives”, while some usability issues were not uncovered. A user‐based evaluation could be a future project.

Practical implications

Usability could be improved of the Autopsy Forensic Browser and developers of such systems should engage with the usability and interaction design community to enhance their software. It would be helpful for users, if future versions of the software take account of the findings of the paper.

Originality/value

This is one of the first reviews of the usability of forensic analysis software and the first for the Autopsy Forensic Browser system. The value is the findings suggest practical ways to enhance usability, which will impact on the effectiveness of investigators.

Keywords

Citation

Bennett, D.J. and Stephens, P. (2009), "A cognitive walkthrough of Autopsy Forensic Browser", Information Management & Computer Security, Vol. 17 No. 1, pp. 20-29. https://doi.org/10.1108/09685220910944731

Publisher

:

Emerald Group Publishing Limited

Copyright © 2009, Emerald Group Publishing Limited

Related articles