메뉴 건너뛰기




Volumn 306, Issue , 2009, Pages 143-155

A forensic framework for handling information privacy incidents

(2)  Reddy, Kamil a   Venter, Hein a  

a NONE

Author keywords

Forensic readiness capability; Information privacy incidents

Indexed keywords

ELECTRONIC CRIME COUNTERMEASURES;

EID: 84943538687     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-3-642-04155-6_11     Document Type: Conference Paper
Times cited : (19)

References (23)
  • 3
    • 0002186644 scopus 로고    scopus 로고
    • Privacy-enhancing technologies: Typology, critique, vision
    • , P. Agre and M. Rotenberg (Eds.), MIT Press, Cambridge, Massachusetts
    • [3] H. Burkert, Privacy-enhancing technologies: Typology, critique, vision, in Technology and Privacy: The New Landscape, P. Agre and M. Rotenberg (Eds.), MIT Press, Cambridge, Massachusetts, pp. 125–142, 1997.
    • (1997) Technology and Privacy: The New Landscape , pp. 125-142
    • Burkert, H.1
  • 5
    • 84943525853 scopus 로고    scopus 로고
    • Canadian Institute of Chartered Accountants, Generally Accepted Privacy Principles, Toronto, Canada
    • Canadian Institute of Chartered Accountants, Generally Accepted Privacy Principles, Toronto, Canada (www.cica.ca/index.cfm/ciid/258/laid/1.htm).
  • 8
    • 51149091325 scopus 로고    scopus 로고
    • A theoretical framework for organizational network forensic readiness
    • [8] B. Endicott-Popovsky, D. Frincke and C. Taylor, A theoretical framework for organizational network forensic readiness, Journal of Computers, vol. 2(3), pp. 1–11, 2007.
    • (2007) Journal of Computers , vol.2 , Issue.3 , pp. 1-11
    • Endicott-Popovsky, B.1    Frincke, D.2    Taylor, C.3
  • 9
    • 0010888307 scopus 로고    scopus 로고
    • Does privacy law work?
    • P. Agre and M. Rotenberg (Eds.), MIT Press, Cambridge, Massachusetts
    • [9] R. Gellman, Does privacy law work? in Technology and Privacy: The New Landscape, P. Agre and M. Rotenberg (Eds.), MIT Press, Cambridge, Massachusetts, pp. 193–218, 1997.
    • (1997) Technology and Privacy: The New Landscape , pp. 193-218
    • Gellman, R.1
  • 10
    • 84943573504 scopus 로고    scopus 로고
    • International Association of Privacy Professionals, IAPP Privacy Certification, York, Maine
    • International Association of Privacy Professionals, IAPP Privacy Certification, York, Maine (www.privacyassociation.org/index.php?option=comcontent&task=view&id=17&Itemid=80).
  • 13
    • 33644785939 scopus 로고    scopus 로고
    • Computer forensics and electronic discovery: The new management challenge
    • [13] V. Luoma, Computer forensics and electronic discovery: The new management challenge, Computers and Security, vol. 25(2), pp. 91–96, 2006.
    • (2006) Computers and Security , vol.25 , Issue.2 , pp. 91-96
    • Luoma, V.1
  • 17
    • 84943553014 scopus 로고    scopus 로고
    • Organization for Economic Cooperation and Development, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris, France
    • Organization for Economic Cooperation and Development, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris, France (www.oecd.org/document/18/0,3343,en26493425518151861111,00.html).
  • 20
    • 84943541108 scopus 로고    scopus 로고
    • South African Law Reform Commission, Privacy and Data Protection, Discussion Paper 109, Project 124, Pretoria, South Africa
    • South African Law Reform Commission, Privacy and Data Protection, Discussion Paper 109, Project 124, Pretoria, South Africa (www.doj.gov.za/salrc/dpapers.htm), 2005.
    • (2005)
  • 21
    • 84868340750 scopus 로고    scopus 로고
    • Specifying digital forensics: A forensics policy approach
    • [21] C. Taylor, B. Endicott-Popovsky and D. Frincke, Specifying digital forensics: A forensics policy approach, Digital Investigation, vol. 4(S1), pp. 101–104, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 101-104
    • Taylor, C.1    Endicott-Popovsky, B.2    Frincke, D.3
  • 22
    • 2942752024 scopus 로고    scopus 로고
    • The question of organizational forensic policy
    • [22] H. Wolf, The question of organizational forensic policy, Computer Fraud and Security, vol. 2004(6), pp. 13–14, 2004.
    • (2004) Computer Fraud and Security , vol.2004 , Issue.6 , pp. 13-14
    • Wolf, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.