default search action
Journal of Digital Forensics, Security and Law, Volume 2
Volume 2, Number 1, 2007
- Kenneth J. Knapp, F. Nelson Ford, Thomas E. Marshall, R. Kelly Rainer Jr.:
The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research. 9-34 - Gregory H. Carlton:
A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks. 35-56 - Patricia A. H. Williams:
Information Governance: A Model for Security in Medical Practice. 57-74 - Nikica Budimir, Jill Slay:
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. 75-92 - Gary C. Kessler:
Book Review: No Place To Hide. 93-96
Volume 2, Number 2, 2007
- Janaletchumi Appudurai, Chitra Latha Ramalingam:
Computer Crimes: A Case Study of What Malaysia Can Learn from Others? 7-22 - Verine Etsebeth:
Monitoring and Surveillance in the Workplace: Lessons Learnt? â€" Investigating the International Legal Position. 23-40 - Murdoch Watney:
The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism. 41-56 - R. G. Pawar, B. S. Sawant, A. Kaiwade:
Information Technology Act 2000 in India - Authentication of E-Documents. 57-66 - Gary C. Kessler:
Book Review: Conquest in Cyberspace: National Security and Information Warfare. 67-70
Volume 2, Number 3, 2007
- Stephen Barnes, David P. Biros:
An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity. 7-28 - Ki Jung Lee, Il-Yeol Song:
Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective. 29-44 - Timothy Vidas:
Providing a Foundation for Analysis of Volatile Data Stores. 45-56 - Jigang Liu:
Book Review: Computer Forensics: Principles and Practices. 57-60
Volume 2, Number 4, 2007
- Douglas P. Twitchell:
SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams. 9-18 - Wasim A. Al-Hamdani:
Education Organization Baseline Control Protection and Trusted Level Security. 19-42 - Richard G. Taylor:
Making Molehills Out of Mountains: Bringing Security Research to the Classroom. 43-58 - Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins:
The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise. 59-76 - Errol A. Blake:
Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal. 77-106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.