-
1
-
-
19844379355
-
A hierarchical, objectives-based framework for the digital investigations process
-
June 2005
-
Beebe N.L., Clark J. G, 2005, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, Volume 2, Issue 2, June 2005, Pages 147-167.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Beebe, N.L.1
Clark, J.G.2
-
2
-
-
77952355042
-
Categories of digital investigation analysis techniques based on the computer history model
-
September 2006, Carrier B. 2006, Basic Digital Forensic Investigation Concepts, Internet, Available from:, [Last Accessed: 12/03/2007]
-
Carrier B.D., Spafford E.H., 2006, Categories of digital investigation analysis techniques based on the computer history model, Digital Investigation Volume 3, Supplement 1, September 2006, Pages 121-130 The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06) Carrier B., 2006, Basic Digital Forensic Investigation Concepts, Internet, Available from: http://www.digitalevidence.org/di-basics.html, [Last Accessed: 12/03/2007].
-
(2006)
The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06)
, vol.3
, Issue.SUPPL. 1
, pp. 121-130
-
-
Carrier, B.D.1
Spafford, E.H.2
-
3
-
-
0037387448
-
Determining intent- Opportunistic vs targeted attacks
-
April
-
Casey, E., April 2003, Determining Intent - Opportunistic vs Targeted Attacks, Computer Fraud & Security, Volume 2003, Issue 4, pp. 8-11.
-
(2003)
Computer Fraud & Security
, vol.2003
, Issue.4
, pp. 8-11
-
-
Casey, E.1
-
4
-
-
84867714874
-
-
Academic Press Inc.U.S. ISBN-10: 0123693756, Chapter 1: A History of Crime Reconstruction
-
Chisum W.J., Turvey B., 2006, Crime Reconstruction, Academic Press Inc., U.S., ISBN-10: 0123693756, Chapter 1: A History of Crime Reconstruction, p.23.
-
(2006)
Crime Reconstruction
, pp. 23
-
-
Chisum, W.J.1
Turvey, B.2
-
5
-
-
84867723151
-
Is identity theft serious?
-
Available from:, [Last Accessed: 14/09/2007]
-
CIFAS, 2007, Is Identity Theft Serious?, Internet, Available from: http://www.cifas.org.uk/default.asp?edit-id=556-56, [Last Accessed: 14/09/2007].
-
(2007)
Internet
-
-
-
6
-
-
1842841182
-
-
Dwan B., 2004, Identity Theft, Computer Fraud and Security, Volume 2004, Issue 4, Page 14-17.
-
(2004)
Identity Theft, Computer Fraud and Security
, vol.2004
, Issue.4
, pp. 14-17
-
-
Dwan, B.1
-
7
-
-
53549122113
-
-
Federal Trade Commission, February, January - December 2004. pdf, downloaded from:, [Last Accessed: 11/09/2007]
-
Federal Trade Commission, February 2005, National and State Trends in Fraud & Identity Theft, January - December 2004., pdf, downloaded from: http://www.ftc.gov/opa/2005/02/top102005.htm [Last Accessed: 11/09/2007].
-
(2005)
National and State Trends in Fraud & Identity Theft
-
-
-
8
-
-
39349087810
-
-
Federal Trade Commission, February, January - December 2006, .pdf, downloaded from:, [Last Accessed: 14/09/2007]
-
Federal Trade Commission, February 2007, Consumer Fraud and Identity Theft Complaint Data, January - December 2006, .pdf, downloaded from: http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf [Last Accessed: 14/09/2007].
-
(2007)
Consumer Fraud and Identity Theft Complaint Data
-
-
-
9
-
-
84867709951
-
-
Home Office Identity Fraud Steering Committee, [Last Accessed: 02/04/2007]
-
Home Office Identity Fraud Steering Committee, 2006, http://www.identity- theft.org.uk, [Last Accessed: 02/04/2007].
-
(2006)
-
-
-
10
-
-
84867714872
-
-
H. R. 2622, Fair and Accurate Credit Transactions Act of 2003, H. R. 2622, 2003, Internet, Available from:, [Last Accessed: 11/09/2007
-
H. R. 2622, Fair and Accurate Credit Transactions Act of 2003, H. R. 2622, Fair and Accurate Credit Transactions Act of 2003, 2003, Internet, Available from: http://financialservices.house.gov/media/pdf/108hr2622ai.pdf [Last Accessed: 11/09/2007].
-
Fair and Accurate Credit Transactions Act of 2003
-
-
-
11
-
-
0004265173
-
-
O'Reilly, ISBN: 1-56592-086-4 ID Theft and Assumption Deterrence Act, 1998, available from:, United States Code, § 003 (7), 30/10/1998 [Last Accessed: 11/09/2007
-
Icove D. et al., 1995, Computer Crime, A Crimefighter's Handbook, O'Reilly, ISBN: 1-56592-086-4 ID Theft and Assumption Deterrence Act, 1998, available from: http://www.ftc.gov/os/statutes/itada/itadact.htm, United States Code, § 003 (7), 30/10/1998 [Last Accessed: 11/09/2007].
-
(1995)
Computer Crime, A Crimefighter's Handbook
-
-
Icove, D.1
-
12
-
-
84873201213
-
-
CRC Press LLC, ISBN: 0-8493-0955-7
-
Marcella A. J., Greenfield R., 2002, Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes, CRC Press LLC, ISBN: 0-8493-0955-7.
-
(2002)
Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes
-
-
Marcella, A.J.1
Greenfield, R.2
-
13
-
-
2942740967
-
Cyber attacks on banks double from 2003
-
McKenna B., 2004, Cyber attacks on banks double from 2003, Computer Fraud and Security, Volume 2004, Issue 6, Page 3.
-
(2004)
Computer Fraud and Security
, vol.2004
, Issue.6
, pp. 3
-
-
Mckenna, B.1
-
14
-
-
69349085858
-
-
Postnote Computer Crime, October, Number 271, Available from:, [Last Accessed: 25/04/2007]
-
Postnote Computer Crime, October 2006, Parliamentary Office of Science and Technology, Number 271, Available from: http://www.parliament.uk/documents/ upload/postpn271.pdf [Last Accessed: 25/04/2007].
-
(2006)
Parliamentary Office of Science and Technology
-
-
-
15
-
-
0003370628
-
The general assumptions and rationale of forensic identification
-
David L. Faigman, David H. Kaye, Michael J. Saks, & Joseph Sanders, St. Paul: West Publishing Co
-
Thornton, J.I., 1997, "The General Assumptions And Rationale Of Forensic Identification", in David L. Faigman, David H. Kaye, Michael J. Saks, & Joseph Sanders, Modern Scientific Evidence: The Law And Science Of Expert Testimony, vol. 2, St. Paul: West Publishing Co.
-
(1997)
Modern Scientific Evidence: The Law and Science of Expert Testimony
, vol.2
-
-
Thornton, J.I.1
-
16
-
-
84867701859
-
-
unknown, 26/03/, Available from:, [Last Accessed: 03/09/2007]
-
unknown, 26/03/2007, One in ten Britons victim to online fraud, Available from: http://www.inthenews.co.uk/news/news/finance/one-in-ten-britons-victim- online-fraud-$1071167.htm [Last Accessed: 03/09/2007].
-
(2007)
One in Ten Britons Victim to Online Fraud
-
-
|