-
2
-
-
0038422195
-
Managing legal liability of the Net: a ten step guide for IT mangers
-
Attaran M. Managing legal liability of the Net: a ten step guide for IT mangers. Information Management and Computer Security 8 2 (2000) 98-100
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.2
, pp. 98-100
-
-
Attaran, M.1
-
4
-
-
38549167612
-
An empirical evaluation of key factors contributing to Internet abuse in the workplace
-
Chen J., Chen C., and Yang H. An empirical evaluation of key factors contributing to Internet abuse in the workplace. Industrial Management and Data Systems 108 1 (2008) 87-106
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.1
, pp. 87-106
-
-
Chen, J.1
Chen, C.2
Yang, H.3
-
7
-
-
74749086493
-
-
Copland V United Kingdom (2007) Times Law Reports/2007/24 April (Application No 62617/00_)
-
Copland V United Kingdom (2007) Times Law Reports/2007/24 April (Application No 62617/00_)
-
-
-
-
16
-
-
24144454227
-
USB and other portable storage device usage
-
Gorge M. USB and other portable storage device usage. Computer Fraud and Security 8 (2005) 15-17
-
(2005)
Computer Fraud and Security
, vol.8
, pp. 15-17
-
-
Gorge, M.1
-
17
-
-
50049134316
-
Data protection: why are organisations still missing the point
-
Gorge M. Data protection: why are organisations still missing the point. Computer Fraud and Security 6 (2008) 5-8
-
(2008)
Computer Fraud and Security
, vol.6
, pp. 5-8
-
-
Gorge, M.1
-
18
-
-
33745505202
-
Managing corporate computer forensics
-
Haggerty J., and Taylor M. Managing corporate computer forensics. Computer Fraud and Security 2006 6 (2006) 14-16
-
(2006)
Computer Fraud and Security
, vol.2006
, Issue.6
, pp. 14-16
-
-
Haggerty, J.1
Taylor, M.2
-
19
-
-
74749107932
-
-
University of Malaga, Malaga, Spain
-
Haggerty J., Taylor M., and Gresty D. Determining culpability in investigations of malicious e-mail dissemination within the organisation, WDFIA 2008, Workshop on Digital Forensics and Incident Analysis, 9th October 2008 (2008), University of Malaga, Malaga, Spain
-
(2008)
Determining culpability in investigations of malicious e-mail dissemination within the organisation, WDFIA 2008, Workshop on Digital Forensics and Incident Analysis, 9th October 2008
-
-
Haggerty, J.1
Taylor, M.2
Gresty, D.3
-
20
-
-
23844493846
-
The corporation: the non-policed state
-
Hilley S. The corporation: the non-policed state. Infosecurity Today 1 No. 6 (2004) 36-37
-
(2004)
Infosecurity Today
, vol.1
, Issue.6
, pp. 36-37
-
-
Hilley, S.1
-
23
-
-
74749083717
-
Who is reading your e-mails
-
p6
-
ITLT. Who is reading your e-mails. IT Law Today 14 (2006) 7 p6
-
(2006)
IT Law Today
, vol.14
, pp. 7
-
-
ITLT1
-
24
-
-
28844494902
-
The unique challenges of collecting corporate evidence
-
Kent J., and Ghavalas B. The unique challenges of collecting corporate evidence. Digital Investigation 2 (2005) 239-243
-
(2005)
Digital Investigation
, vol.2
, pp. 239-243
-
-
Kent, J.1
Ghavalas, B.2
-
25
-
-
74749083832
-
Internet-enabled workers plague UK business
-
6-6
-
McKenna B. Internet-enabled workers plague UK business. Infosecurity Today 3 2 (2006) 6-6
-
(2006)
Infosecurity Today
, vol.3
, Issue.2
-
-
McKenna, B.1
-
28
-
-
74749093779
-
-
Penwell Publishing (UK) Ltd v Ornstien and others , Transcript, 147
-
Penwell Publishing (UK) Ltd v Ornstien and others (2007) All England Official Transcripts, 2007, EWHC 1570 (QB), HQ06X02998, (Transcript) [119]-[147]
-
(2007)
All England Official Transcripts, 2007, EWHC 1570 (QB), HQ06X02998
, pp. 119
-
-
-
34
-
-
33846220583
-
the design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement
-
Stephen B., and Petropoulakis L. the design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement. Journal of Network and Computer Applications 30 (2007) 445-465
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 445-465
-
-
Stephen, B.1
Petropoulakis, L.2
-
35
-
-
67650276438
-
the investigation minefield: a guide
-
Surguy M., and Smith A. the investigation minefield: a guide. New Law Journal 155 7165 (2005) 290-294
-
(2005)
New Law Journal
, vol.155
, Issue.7165
, pp. 290-294
-
-
Surguy, M.1
Smith, A.2
-
36
-
-
67650248663
-
The legal aspects of corporate e-mail investigations
-
372-376
-
Taylor, M., Haggerty, J., Gresty, D. (2009) The legal aspects of corporate e-mail investigations, [2009] 25 Computer Law and Security Review 372-376.
-
(2009)
Computer Law and Security Review
, vol.25
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
|