+

Steinmetz et al., 2025 - Google Patents

The role of computer technologies in structuring evidence gathering in cybercrime investigations: A qualitative analysis

Steinmetz et al., 2025

Document ID
6333614278852132318
Author
Steinmetz K
Schaefer B
Brewer C
Kurtz D
Publication year
Publication venue
Criminal Justice Review

External Links

Snippet

In recent decades, law enforcement agencies have increasingly prioritized cybercrime investigations, as evinced by the growing adoption of specialized cybercrime units and personnel. A burgeoning literature has emerged which examines cybercrime units and …
Continue reading at journals.sagepub.com (other versions)

Similar Documents

Publication Publication Date Title
Barocas et al. Privacy dependencies
Mancosu et al. What you can scrape and what is right to scrape: A proposal for a tool to collect public Facebook data
McDermott Conceptualising the right to data protection in an era of Big Data
Ohm Sensitive information
Lyon Surveillance, Snowden, and big data: Capacities, consequences, critique
Lepri et al. The tyranny of data? The bright and dark sides of data-driven decision-making for social good
Rød et al. Empowering activists or autocrats? The Internet in authoritarian regimes
Robertson et al. To surveil and predict: A human rights analysis of algorithmic policing in Canada
Berman When Database Queries Are Fourth Amendment Searches
Green et al. Open data privacy
Regan et al. Constructing the suspicious: Data production, circulation, and interpretation by DHS fusion centers
Whittington et al. Push, pull, and spill: A transdisciplinary case study in municipal open government
Steinmetz et al. The role of computer technologies in structuring evidence gathering in cybercrime investigations: A qualitative analysis
Brown Outsourcing, data insourcing, and the irrelevant Constitution
Young et al. Call me big PAPA: An extension of Mason’s information ethics framework to big data
Mantelero et al. The “Dark Side” of Big Data: Private and Public Interaction in Social Surveillance: How data collections by private entities affect governmental social control and how the EU reform on data protection responds
Sprague Welcome to the machine: Privacy and workplace implications of predictive analytics
Akoto Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies
Sprague Welcome to the machine: Privacy and workplace implications of predictive analytics
Garbe Pulling through elections by pulling the plug: Internet disruptions and electoral violence in Uganda
Olesen Whistleblowing and the press: Complicating the standard account
Williamson Do Proxies Provide Plausible Deniability? Evidence From Experiments on Three Surveys
Shenkman et al. Legal loopholes and data for dollars: How law enforcement and intelligence agencies are buying your data from brokers
Storbeck et al. Surveillance experiences of extinction rebellion activists and police: Unpacking the technologization of Dutch protest policing
Muñiz Secondary ensnarement: Surveillance systems in the service of punitive immigration enforcement
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载