Investigation of Offences Committed in Social Network and its Countermeasures
Abstract
Keywords
Full Text:
PDFReferences
D. M. Boyd and N. B. Ellison, "Social Network Sites:Definition, History, and Scholarship," Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2008.
O. Angelopoulou, "ID Theft: A Computer Forensics’Investigation Framework," presented at Proceedings of the 5th Australian Digital Forensics Conference Perth, Western Australia, 2007.
M. Rogers, "The role of criminal profiling in the Computer forensics process," Computers & Security, vol. 22, pp. 292-298, 2003.
W. K. II and J. Heiser, Computer Forensics: IncidentResponse Essentials: Addison-Wesley, 2002.
"Electronic Crime Scene Investigation: A Guide forFirst Responders.," U.S. Department of Justice 2001.
B. Carrier and E. H. Spafford, "Getting Physical withthe Investigation Process," International Journal ofDigital Evidence, vol. 2, 2003.
H. Lee, T. Palmbach, and M. Miller, Henry Lee’s Crime Scene Handbook: Academic Press, 2001.
N. I. o. Justice, "Results from Tools and TechnologieWorking Group, Goverors," presented at Summit onCybercrime and Cyberterrorism, Princeton NJ, 2002.
M. Reith, C. Carr, and G. Gunsch, "An Examinationof Digital Forensic Models," International Journal ofDigital Evidence, vol. 1, 2002.
S. Ó. Ciardhuáin, "An Extended Model of Cybercrime Investigations," International Journal of Digital Evidence, vol. 3, 2004.
Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones “A Digital Forensic Investigation Model and Tool for Online Social Networks”
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.