


default search action
Journal of Digital Forensics, Security and Law, Volume 4
Volume 4, Number 1, 2009
- Grover S. Kearns:

Graduate Accounting Students' Perception of IT Forensics: A Multi-Dimensional Analysis. 5-38 - Peter J. Best, Pall Rikhardsson, Mark Toleman:

Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis. 39-60 - Stevenson G. Smith, Larry D. Crumbley:

Defining a Forensic Audit. 61-80
Volume 4, Number 2, 2009
- Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre:

Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers. 5-26 - Craig Valli

:
Visualisation of Honeypot Data Using Graphviz and Afterglow. 27-38 - Damir Kahvedzic, M. Tahar Kechadi:

Correlating Orphaned Windows Registry Data Structures. 39-56 - Dennis Browning, Gary C. Kessler:

Bluetooth Hacking: A Case Study. 57-72 - Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth:

The Impact of Hard Disk Firmware Steganography on Computer Forensics. 73-84
Volume 4, Number 3, 2009
- Craig Valli

, Patryk Szewczyk:
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. 5-16 - Andy Luse, Brian E. Mennecke, Anthony M. Townsend:

Electronic Forms-Based Computing for Evidentiary Analysis. 17-34 - Thomas Lonardo, Doug White, Alan Rea:

To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. 35-56 - Gary C. Kessler:

Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions. 57-60
Volume 4, Number 4, 2009
- Mohamed Chawki:

Online Child Sexual Abuse: The French Response. 7-42 - Francis S. Cronjé:

A Synopsis of Proposed Data Protection Legislation in SA. 43-50 - Jacqueline Fick:

Prevention is Better than Prosecution: Deepening the Defence against Cyber Crime. 51-72 - Z. Ntozintle Jobodwana:

Telecommunications Liberalisation in Africa: Proposed Regulatory Model for the SADC Region. 73-94

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














