메뉴 건너뛰기




Volumn , Issue , 2008, Pages 12-20

Determining culpability in investigations of malicious e-mail dissemination within the organisation

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX PROCESSES; COMPLEX SEQUENCES; CRIMINAL INVESTIGATION; DISCIPLINARY ACTIONS; SOCIAL NETWORK ANALYSIS APPROACHES; VERBAL WARNING;

EID: 67650140712     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WDFIA.2008.8     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 2
    • 0038205937 scopus 로고    scopus 로고
    • The role of criminal profiling in the computer forensics process
    • Rogers, M. "The role of criminal profiling in the computer forensics process", Computers and Security, Vol.22, No.4, 2003, pp 292-298.
    • (2003) Computers and Security , vol.22 , Issue.4 , pp. 292-298
    • Rogers, M.1
  • 3
    • 0032305346 scopus 로고    scopus 로고
    • Employee abuses in cyberspace: Management's legal quagmire
    • Bequai, A. "Employee abuses in cyberspace: management's legal quagmire", Computers and Security, Vol.17, 1998, pp 667-670.
    • (1998) Computers and Security , vol.17 , pp. 667-670
    • Bequai, A.1
  • 4
    • 84979838066 scopus 로고    scopus 로고
    • Monitoring Internet and email usage - Germany: Surfing into unemployment? Private Internet use and emailing under German labour law
    • DOI 10.1016/S0267-3649(02)03011-X, PII S026736490203011X
    • Niemann, J. "Email abuse - Germany: Surfing into unemployment? Private Internet use and emailing under German labour law", Computer Law and Security Report, Vol.18, No.2, 2002, pp 114-116. (Pubitemid 34249785)
    • (2002) Computer Law and Security Report , vol.18 , Issue.2 , pp. 114-116
    • Niemann, J.-M.1
  • 5
    • 67650173229 scopus 로고    scopus 로고
    • accessed
    • Access Data, FTK Forensic Tool Kit, http://www.accessdata.com accessed 2008.
    • (2008) FTK Forensic Tool Kit
  • 6
    • 67650123450 scopus 로고    scopus 로고
    • accessed
    • Guidance Software, Encase, http://www.guidancesoftware.com, accessed 2008.
    • (2008) Encase
  • 8
    • 32344432810 scopus 로고    scopus 로고
    • Discovery and regeneration of hidden emails
    • DOI 10.1145/1066677.1066792, Applied Computing 2005 - Proceedings of the 20th Annual ACM Symposium on Applied Computing
    • Carenini, G., Ng, R., Zhou, X. & Zwart, E., "Discovery and Regeneration of Hidden Emails", ACM Symposium on Applied Computing, 2005, pp. 503-510. (Pubitemid 43302940)
    • (2005) Proceedings of the ACM Symposium on Applied Computing , vol.1 , pp. 503-510
    • Carenini, G.1    Ng, R.2    Zhou, X.3    Zwart, E.4
  • 12
    • 67650136969 scopus 로고    scopus 로고
    • accessed
    • Kalamaras, D.B., SocNetV, http://socnetv.sourceforge.net/, accessed 2008.
    • (2008)
    • Kalamaras, D.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.