Hi!
We continue with the third part, complementing the study of the first articles we will work with for the research.
Assessing the relevance of the authors
In the following table, the different authors will be evaluated based on their number of publications, the number of times they have been cited and the H-Index. This data will also be used in the following task.
Author | Paper | Papers authored | Citations | H-index |
Faleh Alshameri | A comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools | 8 | 29 | 3 |
Katrina Khanta | A comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools | 6 | 6 | 2 |
Stephen Boyce | A comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools | 1 | 2 | 1 |
Aya Fukami | A new model for forensic data extraction from encrypted mobile devices | 12 | 104 | 4 |
Radina Stoykova | A new model for forensic data extraction from encrypted mobile devices | 11 | 81 | 5 |
Zeno Geradts | A new model for forensic data extraction from encrypted mobile devices | 91 | 1009 | 18 |
Bandr Fakiha | Unlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis | 13 | 31 | 3 |
Qiu Jiahao | Intellectualized forensic technique for Android pattern locks | 2 | 8 | 1 |
Qiu Weidong | Intellectualized forensic technique for Android pattern locks | 125 | 1012 | 15 |
Wang Yangde | Intellectualized forensic technique for Android pattern locks | 4 | 1 | 1 |
Zha Yan | Intellectualized forensic technique for Android pattern locks | 1 | 0 | 0 |
Xie Yuming | Intellectualized forensic technique for Android pattern locks | 1 | 0 | 0 |
Li Yan | Intellectualized forensic technique for Android pattern locks | 7 | 56 | 3 |
V. Balajichandrasekhar | An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination | 4 | 3 | 1 |
T. Srinivasa Rao | An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination | 27 | 199 | 8 |
G. Srinivas | An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination | 24 | 83 | 6 |
Table. Assessing the relevance of the authors
Who is the most relevant author
After having reviewed the table generated with the information collected in the previous task, and having evaluated all the authors, I believe that the two most relevant authors are Zeno Geradts y Qiu Weidong, they are the two writers with the largest volume of articles written, most cited and with the highest H-index.
Author | Paper | Papers authored | Citations | H-index |
Zeno Geradts | A new model for forensic data extraction from encrypted mobile devices | 91 | 1009 | 18 |
Qiu Weidong | Intellectualized forensic technique for Android pattern locks | 125 | 1012 | 15 |
Table. Comparative between the most influent authors
Now, a comparison must be made between the two because one has more published articles and has been cited more times while the other has a higher H-index.
That is why I raise the question of whether the quality and impact of one author is more than another and why. In the scientific field, three parameters are usually measured, which are the three that are requested of us:
- Number of published articles: Here you can see how productive an author is. But productivity does not necessarily indicate quality.
- Number of citations: This value denotes how much the author has influenced the community. If there are citations, it should denote greater impact.
- H-index: It is a more correct measure to assess productivity and impact since it is generated based on the fact that ‘x’ articles have been published that have been cited at least ‘x’ times each, that is, if the author writes 10, he must be cited at least 10 times to have that value.
After this, I must conclude that among the authors, the two selected are the most prolific and influential, but among the two, I must select the one with the highest H-index, in this case Zeno Geradts.
That’s all for today.
We’ll continue in a few days.