-
1
-
-
80255136286
-
E-commerce: Protecting purchaser privacy to enforce trust
-
Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.
-
(2011)
Electronic Commerce Research
, vol.11
, Issue.4
, pp. 421-456
-
-
Antoniou, G.1
Batten, L.2
-
4
-
-
10644279890
-
Instant messaging investigations on a live Windows XP system
-
Carvey, H. (2004). Instant messaging investigations on a live Windows XP system. Digital Investigation, 1(4), 256–260.
-
(2004)
Digital Investigation
, vol.1
, Issue.4
, pp. 256-260
-
-
Carvey, H.1
-
5
-
-
34547095771
-
The effect of Internet general privacy concern on customer behavior
-
Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117–141.
-
(2007)
Electronic Commerce Research
, vol.7
, Issue.2
, pp. 117-141
-
-
Castañeda, J.A.1
Montoro, F.J.2
-
6
-
-
51149106811
-
Forensic analysis of volatile instant messaging
-
Dankner, S., Rogers, M., & Kiley, M. (2010). Forensic analysis of volatile instant messaging. International Federation for Information Processing Digital Library, 285(1), 129–138.
-
(2010)
International Federation for Information Processing Digital Library
, vol.285
, Issue.1
, pp. 129-138
-
-
Dankner, S.1
Rogers, M.2
Kiley, M.3
-
8
-
-
33751336113
-
An examination into AOL Instant Messenger 5.5 contact identification
-
Dickson, M. (2006). An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation, 3(4), 227–237.
-
(2006)
Digital Investigation
, vol.3
, Issue.4
, pp. 227-237
-
-
Dickson, M.1
-
9
-
-
33745171808
-
An examination into MSN Messenger 7.5 contact identification
-
Dickson, M. (2006). An examination into MSN Messenger 7.5 contact identification. Digital Investigation, 3(2), 79–83.
-
(2006)
Digital Investigation
, vol.3
, Issue.2
, pp. 79-83
-
-
Dickson, M.1
-
10
-
-
33847252861
-
An examination into Trillian basic 3. x contact identification
-
Dickson, M. (2007). An examination into Trillian basic 3. x contact identification. Digital Investigation, 4(1), 36–45.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 36-45
-
-
Dickson, M.1
-
11
-
-
33750369860
-
An examination into Yahoo Messenger 7.0 contact identification
-
Dickson, M. (2006). An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation, 3(3), 159–165.
-
(2006)
Digital Investigation
, vol.3
, Issue.3
, pp. 159-165
-
-
Dickson, M.1
-
12
-
-
78651525326
-
Memory forensics for QQ from a live system
-
Gao, Y., & Cao, T. (2010). Memory forensics for QQ from a live system. Journal of Computers, 5(4), 541–548.
-
(2010)
Journal of Computers
, vol.5
, Issue.4
, pp. 541-548
-
-
Gao, Y.1
Cao, T.2
-
13
-
-
33645763730
-
Fraudulent auctions on the Internet
-
Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127–140.
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.2
, pp. 127-140
-
-
Gavish, B.1
Tucci, C.L.2
-
14
-
-
67349182620
-
If you build it will they come?–An empirical investigation of consumer perceptions and strategy in virtual worlds
-
Goel, L., & Prokopec, S. (2009). If you build it will they come?–An empirical investigation of consumer perceptions and strategy in virtual worlds. Electronic Commerce Research, 9(1–2), 115–134.
-
(2009)
Electronic Commerce Research
, vol.9
, Issue.1-2
, pp. 115-134
-
-
Goel, L.1
Prokopec, S.2
-
15
-
-
84885890014
-
iForensics: forensic analysis of instant messaging on smart phones
-
Husain, M. I., & Sridhar, R. (2010). iForensics: forensic analysis of instant messaging on smart phones. Digital Forensics and Cyber Crime, 31, 9–18.
-
(2010)
Digital Forensics and Cyber Crime
, vol.31
, pp. 9-18
-
-
Husain, M.I.1
Sridhar, R.2
-
17
-
-
82755182926
-
On-the-spot digital investigation by means of LDFS: Live data forensic system
-
Lim, K. S., Savoldi, A., Lee, C., & Lee, S. (2012). On-the-spot digital investigation by means of LDFS: Live data forensic system. Mathematical and Computer Modelling, 55(1), 223–240.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1
, pp. 223-240
-
-
Lim, K.S.1
Savoldi, A.2
Lee, C.3
Lee, S.4
-
18
-
-
4944248838
-
Packet sniffing for automated chat room monitoring and evidence preservation
-
Meehan, A., Manes, G., Davis, L., Hale, J., & Shenoi, S. (2001). Packet sniffing for automated chat room monitoring and evidence preservation. Workshop on Information Assurance and Security, 2, 1045.
-
(2001)
Workshop on Information Assurance and Security
, vol.2
, pp. 1045
-
-
Meehan, A.1
Manes, G.2
Davis, L.3
Hale, J.4
Shenoi, S.5
-
20
-
-
85131783489
-
Technologies for trust in electronic commerce
-
Patton, M., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 9-21
-
-
Patton, M.1
Jøsang, A.2
-
21
-
-
33751312490
-
Case study: AOL instant messenger trace evidence
-
Reust, J. (2006). Case study: AOL instant messenger trace evidence. Digital Investigation, 3(4), 238–243.
-
(2006)
Digital Investigation
, vol.3
, Issue.4
, pp. 238-243
-
-
Reust, J.1
-
22
-
-
34547110384
-
Privacy and e-commerce: A consumer-centric perspective
-
Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.
-
(2007)
Electronic Commerce Research
, vol.7
, Issue.2
, pp. 89-116
-
-
Smith, R.1
Shao, J.2
-
23
-
-
84867467379
-
Critical review of the e-loyalty literature: A purchase-centred framework
-
Valvi, A. C., & Fragkos, K. C. (2012). Critical review of the e-loyalty literature: A purchase-centred framework. Electronic Commerce Research, 12(3), 331–378.
-
(2012)
Electronic Commerce Research
, vol.12
, Issue.3
, pp. 331-378
-
-
Valvi, A.C.1
Fragkos, K.C.2
-
24
-
-
40849095638
-
Forensic artefacts left by Pidgin Messenger 2.0
-
Van Dongen, W. S. (2007). Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation, 4(3), 138–145.
-
(2007)
Digital Investigation
, vol.4
, Issue.3
, pp. 138-145
-
-
Van Dongen, W.S.1
-
25
-
-
34447338569
-
Forensic artefacts left by Windows Live Messenger 8.0
-
Van Dongen, W. S. (2007). Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation, 4(2), 73–87.
-
(2007)
Digital Investigation
, vol.4
, Issue.2
, pp. 73-87
-
-
Van Dongen, W.S.1
|