-
1
-
-
84912025302
-
Social Media and Employment-At-Will: Tort Law and Practical Considerations for Employees, Managers and Organisations
-
Cavico, F; Mujtaba, B; Muffler, S; Samuel, M. 'Social Media and Employment-At-Will: Tort Law and Practical Considerations for Employees, Managers and Organisations'. New Media and Mass Communication, 11, 2013, 25-41.
-
(2013)
New Media and Mass Communication
, vol.11
, pp. 25-41
-
-
Cavico, F.1
Mujtaba, B.2
Muffler, S.3
Samuel, M.4
-
2
-
-
84912008495
-
Is that really me?: Social Networking and the right of publicity
-
Purcell, R. 'Is that really me?: Social Networking and the right of publicity'. Vanderbilt Journal of Entertainment and Technology Law, 12, 2010, 3, 611-639.
-
(2010)
Vanderbilt Journal of Entertainment and Technology Law
, vol.12
, Issue.3
, pp. 611-639
-
-
Purcell, R.1
-
3
-
-
77955539963
-
The influences of social e-shopping in enhancing young women's online shopping behaviour
-
Dennis, C; Morgan, A; Wright, L; Jayawardhena, C. 'The influences of social e-shopping in enhancing young women's online shopping behaviour'. Journal of Customer Behaviour, 2010, 9, 2, 151-174.
-
(2010)
Journal of Customer Behaviour
, vol.9
, Issue.2
, pp. 151-174
-
-
Dennis, C.1
Morgan, A.2
Wright, L.3
Jayawardhena, C.4
-
4
-
-
77949522596
-
Networked Narratives: Understanding word-of-mouth marketing in online communities
-
Kozinets, R; De Valck, K; Wojnicki, A; Wilner, S. 'Networked Narratives: Understanding word-of-mouth marketing in online communities'. Journal of Marketing, 2010, 74, 2, 71-89.
-
(2010)
Journal of Marketing
, vol.74
, Issue.2
, pp. 71-89
-
-
Kozinets, R.1
De Valck, K.2
Wojnicki, A.3
Wilner, S.4
-
5
-
-
84857098530
-
Web 2.0's Marketing impact on low-involvement consumers
-
Fagerstrom, A; Ghinea, G. 'Web 2.0's Marketing impact on low-involvement consumers'. Journal of Interactive Advertising, 2010, 10, 2, 67-71.
-
(2010)
Journal of Interactive Advertising
, vol.10
, Issue.2
, pp. 67-71
-
-
Fagerstrom, A.1
Ghinea, G.2
-
6
-
-
77954223014
-
Workplace impact of social networking
-
Bennett, J; Owens, M; Pitt, M; Tucker, M. 'Workplace impact of social networking'. Property Management, 2009, 28, 3, 138-148.
-
(2009)
Property Management
, vol.28
, Issue.3
, pp. 138-148
-
-
Bennett, J.1
Owens, M.2
Pitt, M.3
Tucker, M.4
-
7
-
-
71149088987
-
Users of the world unite: The challenges and opportunities of social media
-
Kaplan, A; Haenlein, M. 'Users of the world unite: The challenges and opportunities of social media'. Business Horizons, 2010, 53, 59-68.
-
(2010)
Business Horizons
, vol.53
, pp. 59-68
-
-
Kaplan, A.1
Haenlein, M.2
-
8
-
-
84874599980
-
Knowledge protection challenges of social media encountered by organisations
-
Vayrynen, K; Hekkala, R; Liias, T. 'Knowledge protection challenges of social media encountered by organisations'. Journal of Organisational Computing and Electronic Commerce, 2013, 23, 34-55.
-
(2013)
Journal of Organisational Computing and Electronic Commerce
, vol.23
, pp. 34-55
-
-
Vayrynen, K.1
Hekkala, R.2
Liias, T.3
-
9
-
-
77955775897
-
Employee's use of social networking sites: A socially irresponsible practice
-
Clark, L; Roberts, S. 'Employee's use of social networking sites: A socially irresponsible practice'. Journal of Business Ethics, 2010, 95, 507-525.
-
(2010)
Journal of Business Ethics
, vol.95
, pp. 507-525
-
-
Clark, L.1
Roberts, S.2
-
10
-
-
84912047770
-
Social networking - What about privacy and expression?
-
Delaney, A. 'Social networking - what about privacy and expression?' Employment Law Bulletin, 2011, 4, 6-7.
-
(2011)
Employment Law Bulletin
, vol.4
, pp. 6-7
-
-
Delaney, A.1
-
11
-
-
74749098538
-
The legal aspects of computer usage policies
-
Taylor M; Haggerty, J; Gresty, D. 'The legal aspects of computer usage policies'. Computer Law and Security Review, 2010, 26, 1, 72-76.
-
(2010)
Computer Law and Security Review
, vol.26
, Issue.1
, pp. 72-76
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
-
12
-
-
84912045876
-
Private eye: Legal update data privacy
-
164 NLJ 14
-
Morrison, T. 'Private eye: Legal update data privacy'. The New Law Journal, 164, 2014, 7599, 164 NLJ 14.
-
(2014)
The New Law Journal
, vol.164
, pp. 7599
-
-
Morrison, T.1
-
13
-
-
84878589471
-
To tweet or not to tweet? Nurses social media and patient care
-
Piscotty, R; Voepel-Lewis, T; Lee, S; Annis-Emeot, A; Lee, E; Kalisch, B. 'To tweet or not to tweet? Nurses social media and patient care'. Nursing Management, 2013, 44, 5, 52-53.
-
(2013)
Nursing Management
, vol.44
, Issue.5
, pp. 52-53
-
-
Piscotty, R.1
Voepel-Lewis, T.2
Lee, S.3
Annis-Emeot, A.4
Lee, E.5
Kalisch, B.6
-
14
-
-
79954578373
-
Data loss prevention: A matter of discipline
-
Lesnykh, A. 'Data loss prevention: a matter of discipline'. Network Security, 2011, 3, 18-19.
-
(2011)
Network Security
, vol.3
, pp. 18-19
-
-
Lesnykh, A.1
-
15
-
-
84886414710
-
A framework for the e-discovery of social media content in the United States
-
Sipior, J; Ward, B; Volonino, L; MacGabhann, L. 'A framework for the e-discovery of social media content in the United States'. Information Systems Management, 2013, 30, 14, 352-358.
-
(2013)
Information Systems Management
, vol.30
, Issue.14
, pp. 352-358
-
-
Sipior, J.1
Ward, B.2
Volonino, L.3
MacGabhann, L.4
-
16
-
-
84862641293
-
Commercial use of Facebook and Twitter - Risks and rewards
-
Hutchings, G. 'Commercial use of Facebook and Twitter - risks and rewards'. Computer Fraud and Security, 2012, 6, 19-20.
-
(2012)
Computer Fraud and Security
, vol.6
, pp. 19-20
-
-
Hutchings, G.1
-
17
-
-
85045706693
-
Social media 'at least half ' of calls passed to front-line police
-
24 Jun
-
Moore, K. 'Social media 'at least half ' of calls passed to front-line police'. BBC News. 24 Jun 2014. www.bbc.co.uk/news/UK-27949674.
-
(2014)
BBC News
-
-
Moore, K.1
-
18
-
-
84856359759
-
Online social networks as supporting evidence: A digital forensic investigation model and its application design
-
Mohd Zainudin, M; Merabti, M; Llewellyn-Jones, D. 'Online social networks as supporting evidence: A digital forensic investigation model and its application design'. In Proceedings of IEEE International Conference on Research and Innovation in Information Systems, 23-24 Nov 2011, Kuala Lumpur, Malaysia, pp.1-6.
-
Proceedings of IEEE International Conference on Research and Innovation in Information Systems, 23-24 Nov 2011, Kuala Lumpur, Malaysia
, pp. 1-6
-
-
Mohd Zainudin, M.1
Merabti, M.2
Llewellyn-Jones, D.3
-
19
-
-
84912027146
-
Towards 'crime specific' digital investigation frameworks
-
University of Cardiff, Cardiff, Wales, UK
-
Angelopoulou, O; Vidalis, S. 'Towards 'crime specific' digital investigation frameworks'. In Proceedings of 3rd International conference on Cybercrime, Security and Digital Forensics, 8-9 Jun 2013, University of Cardiff, Cardiff, Wales, UK. http://eprints.staffs.ac.uk/1314/.
-
Proceedings of 3rd International Conference on Cybercrime, Security and Digital Forensics, 8-9 Jun 2013
-
-
Angelopoulou, O.1
Vidalis, S.2
-
20
-
-
84883553913
-
-
The Association of Chief Police Officers of England, Wales and N. Ireland
-
ACPO 'Good practice guide for digital evidence, Version 5'. The Association of Chief Police Officers of England, Wales and N. Ireland, 2012. www.acpo.police.uk.
-
(2012)
Good Practice Guide for Digital Evidence, Version 5
-
-
ACPO1
-
21
-
-
84979821564
-
The legal aspects of corporate computer forensic investigations
-
Taylor M; Haggerty, J; Gresty, D. 'The legal aspects of corporate computer forensic investigations'. Computer Law and Security Review, 2007, 23, 6, 562-566.
-
(2007)
Computer Law and Security Review
, vol.23
, Issue.6
, pp. 562-566
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
-
22
-
-
80054073474
-
Social networking sites, RIPA and criminal investigations
-
O'Floinn, M; Ormerod, D. 'Social networking sites, RIPA and criminal investigations'. Criminal Law Review, 2011, 10, 766-792.
-
(2011)
Criminal Law Review
, vol.10
, pp. 766-792
-
-
O'Floinn, M.1
Ormerod, D.2
-
23
-
-
78449256118
-
The digital crime tsunami
-
Gogolin, G. 'The digital crime tsunami'. Digital Investigation, 2010, 7, 1, 3-8.
-
(2010)
Digital Investigation
, vol.7
, Issue.1
, pp. 3-8
-
-
Gogolin, G.1
-
24
-
-
84880568694
-
A Framework for the forensic analysis of user interaction with social media
-
Haggerty, J; Casson, M; Haggerty, S; Taylor, M. 'A Framework for the forensic analysis of user interaction with social media'. International Journal of Digital Crime and Forensics, 2012, 4, 4, 15-30.
-
(2012)
International Journal of Digital Crime and Forensics
, vol.4
, Issue.4
, pp. 15-30
-
-
Haggerty, J.1
Casson, M.2
Haggerty, S.3
Taylor, M.4
-
25
-
-
79961063454
-
iPhone 3GS forensics: Logical analysis using Apple iTunes Back-up Utility
-
Bader, M; Baggili, I. 'iPhone 3GS forensics: Logical analysis using Apple iTunes Back-up Utility'. Small Scale Digital Device Forensics Journal, 2010, 4, 1, 1-15.
-
(2010)
Small Scale Digital Device Forensics Journal
, vol.4
, Issue.1
, pp. 1-15
-
-
Bader, M.1
Baggili, I.2
-
26
-
-
84863615849
-
-
Apress, New York, NY, USA
-
Morrissey, S. 'iOS Forensic Analysis: For iPhone, iPad and iPod Touch'. Apress, New York, NY, USA, 2010, p.185.
-
(2010)
IOS Forensic Analysis: For IPhone, IPad and IPod Touch
, pp. 185
-
-
Morrissey, S.1
-
27
-
-
84864628454
-
Forensic analysis of social networking applications on mobile devices
-
Mutawa, N. Baggili, I; Marrington, A. 'Forensic analysis of social networking applications on mobile devices'. Digital Investigation, 2012, 9, 24-33.
-
(2012)
Digital Investigation
, vol.9
, pp. 24-33
-
-
Mutawa, N.1
Baggili, I.2
Marrington, A.3
-
28
-
-
84864065511
-
Social networking materials as criminal evidence
-
O'Floinn, M; Ormerod, D. 'Social networking materials as criminal evidence'. Criminal Law Review, 2012, 7, 486-512.
-
(2012)
Criminal Law Review
, vol.7
, pp. 486-512
-
-
O'Floinn, M.1
Ormerod, D.2
-
29
-
-
84912027145
-
-
Smith v ADVFN Plc & Ors, Court of Appeal - Queen's Bench Division, July 25, 2008, [2008] EWHC 1797 (QB)
-
Smith v ADVFN Plc & Ors, Court of Appeal - Queen's Bench Division, July 25, 2008, [2008] EWHC 1797 (QB).
-
-
-
-
30
-
-
84975124386
-
Data ownership in social networks - A very personal thing
-
Bond, R. 'Data ownership in social networks - a very personal thing'. Privacy and Data Protection, 2010, 11, 1, 8.
-
(2010)
Privacy and Data Protection
, vol.11
, Issue.1
, pp. 8
-
-
Bond, R.1
-
31
-
-
77952689368
-
Social networks and web 2.0: Are users also bound by data protection regulations?
-
Van Alsenoy, B; Ballet, J; Kuczerawy, A; Dumortier, J. 'Social networks and web 2.0: are users also bound by data protection regulations?'. Identity in the Information Society, 2009, 2, 1, 65-79.
-
(2009)
Identity in the Information Society
, vol.2
, Issue.1
, pp. 65-79
-
-
Van Alsenoy, B.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
32
-
-
79956080699
-
Online social networking and the right to privacy: The conflicting rights of privacy and expression
-
Marsoof, A. 'Online social networking and the right to privacy: The conflicting rights of privacy and expression'. International Journal of Law and Information Technology, 2011, 19, 2, 110-132.
-
(2011)
International Journal of Law and Information Technology
, vol.19
, Issue.2
, pp. 110-132
-
-
Marsoof, A.1
-
33
-
-
84876470158
-
Online copyright enforcement by Internet service providers
-
Muir, A. 'Online copyright enforcement by Internet service providers'. Journal of Information Science, 2013, 39, 2, 256-269.
-
(2013)
Journal of Information Science
, vol.39
, Issue.2
, pp. 256-269
-
-
Muir, A.1
-
34
-
-
78649241256
-
The effect of the Digital Economy Act 2010 upon semiotic democracy
-
Griffin, J. 'The effect of the Digital Economy Act 2010 upon semiotic democracy'. International Review of Law, Computers and Technology, 2010, 24, 3, 251-262.
-
(2010)
International Review of Law, Computers and Technology
, vol.24
, Issue.3
, pp. 251-262
-
-
Griffin, J.1
-
36
-
-
79960449405
-
English libel law is not fit for purpose
-
Lane, S. 'English libel law is not fit for purpose'. Serials, 2011, 24, 2, 150-153.
-
(2011)
Serials
, vol.24
, Issue.2
, pp. 150-153
-
-
Lane, S.1
-
37
-
-
84912018921
-
Social media in the workplace - Proactive protections for employers
-
Lieber, L. 'Social media in the workplace - proactive protections for employers'. Employment Relations Today, 2011, 38, 3, 93-101.
-
(2011)
Employment Relations Today
, vol.38
, Issue.3
, pp. 93-101
-
-
Lieber, L.1
-
38
-
-
76949093866
-
All about me: Disclosure in online social networking profiles: The case of Facebook
-
Nosko, A; Wood, E; Molema, S. 'All about me: disclosure in online social networking profiles: The case of Facebook'. Computers in Human Behaviour, 2010, 26, 3, 406-418.
-
(2010)
Computers in Human Behaviour
, vol.26
, Issue.3
, pp. 406-418
-
-
Nosko, A.1
Wood, E.2
Molema, S.3
-
39
-
-
84885096707
-
The impact of identity theft on perceived security and trusting E-commerce
-
Zakaria, S. 'The impact of identity theft on perceived security and trusting E-commerce'. Journal of International Banking and Commerce, 2013, 18, 2, 1-11.
-
(2013)
Journal of International Banking and Commerce
, vol.18
, Issue.2
, pp. 1-11
-
-
Zakaria, S.1
-
40
-
-
84912025517
-
Why the legislative provisions governing harassment lack clarity and cohesion
-
JPN 409
-
Haralambos, N; Geach, N. 'Why the legislative provisions governing harassment lack clarity and cohesion'. Criminal Law and Justice Weekly, 2010, 174, JPN 409.
-
(2010)
Criminal Law and Justice Weekly
, pp. 174
-
-
Haralambos, N.1
Geach, N.2
-
41
-
-
84912045874
-
Social networks, crime and the law
-
Autumn
-
Church, E; Fafinski, S. 'Social networks, crime and the law'. Student Law Review, Autumn 2011, 13-16.
-
(2011)
Student Law Review
, pp. 13-16
-
-
Church, E.1
Fafinski, S.2
-
42
-
-
84912035452
-
How do employers protect data from theft by their employees?
-
Pritchett, S. 'How do employers protect data from theft by their employees?'. Privacy and Data Protection, 2011, 11, 5, 8-14.
-
(2011)
Privacy and Data Protection
, vol.11
, Issue.5
, pp. 8-14
-
-
Pritchett, S.1
-
43
-
-
79956032303
-
Malware propagation in online social networks: Nature, dynamics, and defense implications
-
Yan, G; Chen, G; Eidenbenz, S; Li, N. 'Malware propagation in online social networks: nature, dynamics, and defense implications'. In Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, March 22-24, 2011, Hong Kong, pp.196-206.
-
Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, March 22-24, 2011, Hong Kong
, pp. 196-206
-
-
Yan, G.1
Chen, G.2
Eidenbenz, S.3
Li, N.4
|