Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


A core concept taught to forensic investigators is the practice of equivocal forensic analysis which is strongly advocated by researchers and practitioners to limit investigators from reaching incorrect conclusions, either due to their own bias, or as a result of subjectivity from others. The process is however a time-consuming one and students may not see the value in doing so amidst a busy academic schedule. This paper examines how the use of the red herring plot mechanism in a game-based storytelling environment can be used in a computer forensics semester module to effectively highlight the importance of evaluating the available evidence objectively and thus encourage students to avoid falling into the trap of developing and following preconceived theories.

Original languageEnglish
Title of host publicationInformation Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 2020, Proceedings
EditorsLynette Drevin, Suné Von Solms, Marianthi Theocharidou
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages14
ISBN (Print)9783030592905
Publication statusPublished - 2020
Event13th IFIP WG 11.8 World Conference on Information Security Education, WISE 2020 - Maribor, Slovenia
Duration: 21 Sept 202023 Sept 2020

Publication series

NameIFIP Advances in Information and Communication Technology
Volume579 IFIP
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X


Conference13th IFIP WG 11.8 World Conference on Information Security Education, WISE 2020


  • Confirmation bias
  • Digital forensics
  • Equivocal forensic analysis
  • Game-based storytelling

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management


Dive into the research topics of 'Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings'. Together they form a unique fingerprint.

Cite this