Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
1615
YesterdayYesterday
2219
This weekThis week
9023
Last WeekLast week
13850
This monthThis month
5518
Last monthLast month
50787
All daysAll days
5832591

Journal of Digital Forensics, Security and Law

Number 4, 2007

  • 9-18
    SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams
    Authors: Douglas P. Twitchell
    Number of views: 335
  • 19-42
    Education Organization Baseline Control Protection and Trusted Level Security
    Authors: Wasim A. Al-Hamdani
    Number of views: 328
  • 43-58
    Making Molehills Out of Mountains: Bringing Security Research to the Classroom
    Authors: Richard G. Taylor
    Number of views: 319
  • 59-76
    The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise
    Authors: Guillermo Francia III, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
    Number of views: 355
  • 77-106
    Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Authors: Errol A. Blake
    Number of views: 335

Number 3, 2007

  • 7-28
    An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity
    Authors: Stephen D. Barnes, David P. Biros
    Number of views: 305
  • 29-44
    Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective
    Authors: Ki Jung Lee, Il- Yeol Song
    Number of views: 307
  • 45-56
    Providing a Foundation for Analysis of Volatile Data Stores
    Authors: Timothy Vidas
    Number of views: 306
  • 57-60
    Book Review: Computer Forensics: Principles and Practices
    Authors: Jigang Liu
    Number of views: 332

Number 2, 2007

  • 7-22
    Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
    Authors: Janaletchumi Appudurai, Chitra Latha Ramalingam
    Number of views: 400
  • 23-40
    Monitoring and Surveillance in the Workplace: Lessons Learnt? Investigating the International Legal Position
    Authors: Verine Etsebeth
    Number of views: 314
  • 41-56
    The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism
    Authors: Murdoch Watney
    Number of views: 333
  • 57-66
    Information Technology Act 2000 in India - Authentication of E-Documents
    Authors: R. G. Pawar, B. S. Sawant, A. Kaiwade
    Number of views: 300
  • 67-70
    Book Review: Conquest in Cyberspace: National Security and Information Warfare
    Authors: Gary C. Kessler
    Number of views: 306

Number 1, 2007

  • 9-34
    The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research
    Authors: Kenneth J. Knapp, F. Nelson Ford, Thomas E. Marshall, R. Kelly Rainer, Jr.
    Number of views: 455
  • 35-56
    A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks
    Authors: Gregory H. Carlton
    Number of views: 355
  • 57-74
    Information Governance: A Model for Security in Medical Practice
    Authors: Patricia A.H. Williams
    Number of views: 268
  • 75-92
    Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence
    Authors: Nikica Budimir, Jill Slay
    Number of views: 290
  • 93-96
    Book Review: No Place To Hide
    Authors: Gary Kessler
    Number of views: 304


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us