References
- Beebe, & Clark. (2005). A hierarchical, objectives-based framework for the digital investigations process. Retrieved 3/10/2015, from http://www.dfrws.org/2004/day1/Beebe_Obj_Framework_for_DI.pdf
- Behr. (2008). Anti-forensics: What it is, what it does and why you need to know. New Jersey Lawyer. Issue No. 255. Retrieved 3/10/2015, from http://www.njsba.com/images/content/1/0/1002013/Dec2008.pdf#page=4
- Bloomberg. (2012). The average person has five connected devices, while some have 15 plus. Retrieved August 10, 2015, from http://go.bloomberg.com/tech-blog/2012-08-29-average-household-has-5-connected-devices-while-some-have-15-plus/
- Breitinger, F., & Rousseu, V. (2014). Automated evaluation of approximate matching algorithms on real data. Digital Investigations, 11, S10–S17.
- Burning Glass. (2015). Job market intelligence: Cybersecurity job, 2015. Retrieved May 6, 2015, from http://burning-glass.com/research/cybersecurity/
- Carrier, B. (2005). File system forensic analysis (1st ed.). Upper Saddle River, NJ: Pearson Education.
- Casey, E. (2011). Digital evidence and computer crime (3rd ed.). Waltham, MA: Academic Press.
- Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014–2019 White Paper. (2015, February). Retrieved August 10, 2015, from http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html
- Cohen, C. (2007, March). Growing challenge of computer forensics. The Police Chief, vol. 74, no. 3. Alexandria, VA: International Association of Chiefs of Police.
- Estes, A. (2014). Police can still get data off your iOS 8 device without Apple’s help; Gizmodo Blog entry, 9/19/14. Retrieved 5/12/2015, from http://gizmodo.com/police-can-still-get-data-off-your-ios-8-device-without-1636831283
- Ferraro, M. M., & Russell, A. (2004). Current issues confronting child exploitation and computer crime task force. Digital Investigations, 1, 7–15.
- Forte, D. (2009). Do encrypted disks spell the end of forensics? Computer Fraud and Security, 2009, 18–20.
- Garfinkel, S. (2010, October 18). Automated digital forensics. CRSC lunch seminar. Retrieved 5/12/2015, from http://crcs.seas.harvard.edu/event/simson-garfinkel-automated-digital-forensics
- Garfinkel, S. (2012). Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus. Digital Investigation, 9, 80–89. Retrieved from http://simson.net/clips/academic/2012.DFRWS.DIIN382.pdf
- Garrett, R. (2009). Byte stuff: Local officers should be prepared to follow the trail of bytes criminal leave behind. Law Enforcement Technology, 36, 10–16.
- Gogolin, G. (2010). Digital investigation, 7, 3–8.10.1016/j.diin.2010.07.001
- Goodison, S. E., Davis, R. C., & Jackson, B. A. (2015). Digital Evidence and the U.S. criminal justice system: Identifying technology and other needs to more effectively acquire and utilize digital evidence. RAND Report. Retrieved from http://www.rand.org/pubs/research_reports/RR890.html
- Grispos, G., Storer, T., & Glisson, W. B. (2012). Calm before the storm. International Journal of Digital Crime and Forensics, 4, 28–48.10.4018/IJDCF
- Hern. (2014, October 17). Apple defies FBI and offers encryption by default on new operating system. The Guardian. Retrieved April 6, 2015, from http://www.theguardian.com/technology/2014/oct/17/apple-defies-fbi-encryption-mac-osx
- Hilbert, M., & López, P. (2011, April 1). The world’s technological capacity to store, communicate, and compute information. Science, 60–65. Published online February 10, 2011 [doi:10.1126/science.1200970]. Retrieved from http://www.sciencemag.org/content/332/6025/60.abstract
- Hong, I., Yu, H., Lee, S., & Lee, K. (2013). A new triage model conforming to the needs of selective search and seizure of electronic evidence. Digital Investigation, 10, 175–192.10.1016/j.diin.2013.01.003
- Huber, E. (2010). Certification, licensing, and accreditation in digital forensics. A Fistful of Dongles. Retrieved from http://ericjhuber.blogspot.com/2010/11/certification-licensing-and.html
- Irons, A., & Lallie, H. S. (2014). Digital forensics to intelligent forensics. Future Internet, 6, 584–596. doi:10.3390/fi6030584
- James, J., & Glayshev, P. (2013). Challenges with automation in digital forensic. arXiv: 1303.4498 [cs.CY]. Retrieved 6/5/2015, from http://arxiv.org/abs/1303.4498
- Kara, L. (2015). Digital forensics: Literature review. Unpublished paper.
- Kenneally, E. (2002, August). Computer forensics: Beyond the buzzword. Login, 27, 8–11.
- Kotter, J. (1996) Leading change. Boston, MA: Harvard Business Press. Out of print.
- KPMG. (2011, July). Issue monitor, cybercrime, the growing challenge for governments. Vol. 8. Retrieved August 10, 2015, from https://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/cyber-crime.pdf
- Lee, W., & Stolfo, S. J. (2000). Data-mining approaches for intrusion detection. Fort Belvoir, VA: Defense Technical Information Center.
- Lei Pan, L., & Batten, M. (2005). Reproducibility of digital evidence in forensic investigations. Digital Forensic Research Workshop. Retrieved June 16, 2015, from http://www.dfrws.org/2005/proceedings/pan_reproducibility.pdf
- Libicki, M., Senty, D., & Pollack, J. (2014). H4cker5 wanted: An examination if the cybersecurity labor market. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf
- Maras, M.-H. (2015). Computer forensics: Cybercriminals, laws, and evidence. Burlington, MA: Jones & Bartlett Learning.
- National Academy of Sciences. (2009). Strengthening forensic science in the United States: A path forward. Washington, DC: National Academies Press.
- National Institute of Justice. (2008). Electronic crime scene investigation: A guide for first responders. Washington, DC: U.S. Department of Justice.
- National Institute of Standards and Technology. (2014). NIST cloud computing forensic science challenges (Draft NISTIR 8006). Retrieved May 1, 2015, from http://www.nist.gov/itl/itl-cloud-computing-forensic-science.cfm
- National Institute of Standards and Testing. (2015). Computer forensics tool testing handbook. Retrieve 8-11-2015, from http://www.cftt.nist.gov/CFTT-Booklet-08112015.pdf
- National White Collar Crime Center. (2009). Computer crime: Computer as an instrument of crime. Fairmont, WV: National White Collar Center.
- Noonan, W. (2014). Deputy special agent in charge for the US Secret Service Criminal Investigative Division. Testimony before USSS- house financial services committee. Retrieved from http://www.dhs.gov/news/2014/03/05/written-testimony-usss-house-financial-services-subcommittee-financial-institutions
- Palmer. (2001). A road map for digital forensic research DTR – T001–01 FINAL, DFRWS TECHNICAL REPORT. Report from the first Digital Forensic Research Workshop (DFRWS).
- Pollitt, M. M. (2007). An ad hoc review of digital forensic models. In Second international workshop on systematic approaches to digital forensic engineering (pp. 43–54). Los Alamitos, CA: IEEE Computer Society.10.1109/SADFE.2007.3
- Pollitt. (2010). Chapter 1: A history of digital forensics. IFIP Open Digital Library. Retrieved 5/2/2015, from http://opendl.ifip-tc6.org/db/conf/ifip11-9/df2010/Pollitt10.pdf
- Richard, G. G., & Roussev, V. (2006). Next-generation digital forensics. Communications of the ACM, 49, 76–80. doi:10.1145/1113034.1113074
- Shavers, B. (2013). Placing the suspect behind the keyboard. Syngress: Elsevier Press.
- Watson, D., & Jones, A. (2013). Digital forensics: Processing and procedures. Syngress: Elsevier. Website: All cell phone brands. Retrieved August 10, 2015, from http://www.gsmarena.com/makers.php3
- Whittemore, G. (2008). Report to the House of Delegates (2008 A.B.A. Sec. Sci. & Tech. L. 2). Retrieved from http://www.wired.com/images_blogs/threatlevel/files/aba_report_and_resolution.pdf
- Witcomb. (2002). An historical perspective of digital evidence: A forensic scientist’s view. International Journal of Digital Evidence, 1(1). Retrieved 2/12/2015, from https://www.utica.edu/academic/institutes/ecii/publications/articles/9C4E695B-0B78-1059-3432402909E27BB4.pdf