Taylor, MJ, Haggerty, J, Gresty, D, Almond, P and Berry, T (2014) Forensic investigation of social networking applications. Network Security (11). pp. 9-16. ISSN 1353-4858
|
Text
Forensic investigation of social networking applications v6.pdf - Accepted Version Download (204kB) | Preview |
Abstract
Social networking applications such as Facebook, Twitter and Linkedin may be involved in instances of misuse such as copyright infringement, data protection violations, defamation, identity theft, harassment, and dissemination of confidential information and malware that can affect both organizations and individuals. In this paper we examine the computer forensic process of obtaining digital evidence from social networking applications and the legal aspects of such. Currently there do not appear to be commonly available guidelines for organizations aimed specifically at the computer forensic process of investigation of social networking applications.
Item Type: | Article |
---|---|
Additional Information: | NOTICE: this is the author’s version of a work that was accepted for publication in Network Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Network Security, Issue 11, 2014 DOI: 10.1016/S1353-4858(14)70112-6 |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software T Technology > T Technology (General) |
Divisions: | Computer Science & Mathematics |
Publisher: | Elsevier |
Date Deposited: | 07 Jan 2015 15:51 |
Last Modified: | 04 Sep 2021 14:45 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/299 |
View Item |