SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Andrew MW. Defining a process model for forensic analysis of digital evidence devices and storage media. IEEE Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007), 2007.
  • 2
    Brown R, Pham B, DeVel O. Design of a digital forensics image mining system, KES. LNAI 2005; 3683: 395404.
  • 3
    Strawn C. Expanding the potential for GPS evidence acquisition. Small Scale Digital Device Forensics Journal 2009; 3(1): 112.
  • 4
    Iqbal MU, Samsung L. Legal and ethical implications of GPS vulnerabilities. Journal of International Commercial Law and Technology 2008; 3(3): 178187.
  • 5
    Sohn H, Ro YM, Plataniotis KN. Content sharing based on personal information in virtually secured space. Lecture Notes in Computer Science 2009; 5450: 388400.
  • 6
    Asher C, Aumasson J-P, Phan RC-W. Security and privacy preservation in human-involved networks. Proceedings of the Workshop on Open Research Problems in Network Security (iNetSec '09), IFIP AICT 309 2009; 139148.
  • 7
    Nance K, Hay B, Bishop M. Digital forensics: defining a research agenda. In Proceedings of the 42nd Hawaii International Conference on System Sciences, IEEE Press: Waikoloa, HI, USA, Jan. 2009.
  • 8
    Walters A, Nick J, Petroni L. Volatools: integrating volatile memory forensics into the digital investigation process, in Black Hat DC, 2007.
  • 9
    Matthew S, Jill S. Recovery of Skype application activity data from physical memory. International Conference on Availability, Reliability and Security 2010; 283288.
  • 10
    Keenan T. On the Internet, things never go away completely. IFIP International Federation for Information Processing 2008; 262: 3750.
  • 11
    Acquisti A, Gross R. Imagined communities: awareness, information sharing, and privacy on the Facebook. Lecture Notes in Computer Science 2006; 4258: 3658.
  • 12
    Jansen WA, Ayers R. An overview and analysis of PDA forensic tools. Digital Investigation 2005; 2(2): 120132.
  • 13
    Counts S, Fisher KE. Mobile social networking: an information grounds perspective. Proceedings of the 41st Hawaii International Conference on System Sciences 2008; 153162.
  • 14
    Drummond A. Teenager Missing after Facebook Meeting. Available from: http://news.smh.com.au/breaking-newsnational/teenager-missing-after-Facebook-meeting-20100514-v30u.html [Accessed on April, 19, 2011].
  • 15
    Hansen S, Berente N. Wikipedia, critical social theory, and the possibility of rational discourse. The Information Society 2009; 25: 3859.
  • 16
    Sawyer S, Tapia A. From findings to theories: institutionalizing social informatics. The Information Society 2007; 23: 263275.
  • 17
    Horton M. All Koreans to Have 1 Gbps Broadband by 2012, Tech Fragments. Available from: http://techfragments.com/news/359/Tech/All_Koreans_to_Have_1Gbps_Broadband_by_2012.html [Accessed on February 25, 2009].
  • 18
  • 19