Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Forensic investigation of social networking applications

Taylor, MJ, Haggerty, J, Gresty, D, Almond, P and Berry, T (2014) Forensic investigation of social networking applications. Network Security (11). pp. 9-16. ISSN 1353-4858

[img]
Preview
Text
Forensic investigation of social networking applications v6.pdf - Accepted Version

Download (204kB) | Preview

Abstract

Social networking applications such as Facebook, Twitter and Linkedin may be involved in instances of misuse such as copyright infringement, data protection violations, defamation, identity theft, harassment, and dissemination of confidential information and malware that can affect both organizations and individuals. In this paper we examine the computer forensic process of obtaining digital evidence from social networking applications and the legal aspects of such. Currently there do not appear to be commonly available guidelines for organizations aimed specifically at the computer forensic process of investigation of social networking applications.

Item Type: Article
Additional Information: NOTICE: this is the author’s version of a work that was accepted for publication in Network Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Network Security, Issue 11, 2014 DOI: 10.1016/S1353-4858(14)70112-6
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
T Technology > T Technology (General)
Divisions: Computer Science & Mathematics
Publisher: Elsevier
Date Deposited: 07 Jan 2015 15:51
Last Modified: 04 Sep 2021 14:45
URI: https://researchonline.ljmu.ac.uk/id/eprint/299
View Item View Item