


default search action
Journal of Digital Forensics, Security and Law, Volume 1
Volume 1, Number 1, 2006
- John W. Bagby, John C. Ruhnka:

Electronic Data Discovery: Integrating Due Process into Cyber Forensic Practice. 5-24 - Jill Slay, Fiona Schulz:

Development of an Ontology Based Forensic Search Mechanism: Proof of Concept. 25-44 - Hüseyin Tanriverdi, Jonathan Harrison, Ketan S. Mesuria, Joshua Bertsch, Po-Ling Hsiao, David Hendrawirawan:

AlphaCo: A Teaching Case on Information Technology Audit and Security. 45-68
Volume 1, Number 2, 2006
- Mark Weiser, David P. Biros, Greg Mosier:

Development of a National Repository of Digital Forensic Intelligence. 5-18 - Marcus K. Rogers, James Goldman, Richard Mislan, Timothy Wedge, Steve Debrota:

Computer Forensics Field Triage Process Model. 19-38 - John W. Bagby, John C. Ruhnka:

Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics. 39-74 - Wayne A. Jansen, Rick Ayers:

Forensic Tools for Mobile Phone Subscriber Identity Modules. 75-94
Volume 1, Number 3, 2006
- Il-Yeol Song, Ki Jung Lee, Xiaohua Hu, John D. Maguire, Namyoun Choi, Peter P. Chen:

Designing a Data Warehouse for Cyber Crimes. 5-22 - Andy Jones, Craig Valli

, Iain Sutherland, Paula Thomas:
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. 23-36 - Gary C. Kessler, Michael E. Schirling:

The Design of an Undergraduate Degree Program in Computer & Digital Forensics. 37-50 - Kim Morfitt, Craig Valli

:
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients. 51-64
Volume 1, Number 4, 2006
- Grover S. Kearns:

A Curriculum for Teaching Information Technology Investigative Techniques for Auditors. 9-28 - Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul B. Fox:

The Role of Power and Negotiation in Online Deception. 29-48 - Bernd Carsten Stahl:

Is Forensic Computing a Profession? Revisiting an Old Debate in a New Field. 49-66 - Gary C. Kessler:

Book Review: Digital Crime and Forensic Science in Cyberspace. 67-70

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














