


default search action
Journal of Digital Forensics, Security and Law, Volume 2
Volume 2, Number 1, 2007
- Kenneth J. Knapp, F. Nelson Ford, Thomas E. Marshall, R. Kelly Rainer Jr.:

The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research. 9-34 - Gregory H. Carlton:

A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks. 35-56 - Patricia A. H. Williams:

Information Governance: A Model for Security in Medical Practice. 57-74 - Nikica Budimir, Jill Slay:

Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. 75-92 - Gary C. Kessler:

Book Review: No Place To Hide. 93-96
Volume 2, Number 2, 2007
- Janaletchumi Appudurai, Chitra Latha Ramalingam:

Computer Crimes: A Case Study of What Malaysia Can Learn from Others? 7-22 - Verine Etsebeth:

Monitoring and Surveillance in the Workplace: Lessons Learnt? â€" Investigating the International Legal Position. 23-40 - Murdoch Watney

:
The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism. 41-56 - R. G. Pawar, B. S. Sawant, A. Kaiwade:

Information Technology Act 2000 in India - Authentication of E-Documents. 57-66 - Gary C. Kessler:

Book Review: Conquest in Cyberspace: National Security and Information Warfare. 67-70
Volume 2, Number 3, 2007
- Stephen Barnes, David P. Biros:

An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity. 7-28 - Ki Jung Lee, Il-Yeol Song:

Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective. 29-44 - Timothy Vidas:

Providing a Foundation for Analysis of Volatile Data Stores. 45-56 - Jigang Liu:

Book Review: Computer Forensics: Principles and Practices. 57-60
Volume 2, Number 4, 2007
- Douglas P. Twitchell:

SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams. 9-18 - Wasim A. Al-Hamdani:

Education Organization Baseline Control Protection and Trusted Level Security. 19-42 - Richard G. Taylor:

Making Molehills Out of Mountains: Bringing Security Research to the Classroom. 43-58 - Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins:

The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise. 59-76 - Errol A. Blake:

Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal. 77-106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














