Found: 6
Select item for more details and to access through your institution.
HOW OFTEN IS EMPLOYEE ANGER AN INSIDER RISK II? DETECTING AND MEASURING NEGATIVE SENTIMENT VERSUS INSIDER RISK IN DIGITAL COMMUNICATIONS COMPARISON BETWEEN HUMAN RATERS AND PSYCHOLINGUISTIC SOFTWARE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 73
- By:
- Publication type:
- Article
Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
TECHNOLOGY CORNER VISUALISING FORENSIC DATA: EVIDENCE GUIDELINES (PART 2).
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 93
- By:
- Publication type:
- Article
INFORMATION SECURITY CHALLENGE OF QR CODES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 43
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 5
- By:
- Publication type:
- Article
AUTOMATING VENDOR FRAUD DETECTION IN ENTERPRISE SYSTEMS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 7
- By:
- Publication type:
- Article