Steinmetz et al., 2025 - Google Patents
The role of computer technologies in structuring evidence gathering in cybercrime investigations: A qualitative analysisSteinmetz et al., 2025
- Document ID
- 6333614278852132318
- Author
- Steinmetz K
- Schaefer B
- Brewer C
- Kurtz D
- Publication year
- Publication venue
- Criminal Justice Review
External Links
Snippet
In recent decades, law enforcement agencies have increasingly prioritized cybercrime investigations, as evinced by the growing adoption of specialized cybercrime units and personnel. A burgeoning literature has emerged which examines cybercrime units and …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Barocas et al. | Privacy dependencies | |
| Mancosu et al. | What you can scrape and what is right to scrape: A proposal for a tool to collect public Facebook data | |
| McDermott | Conceptualising the right to data protection in an era of Big Data | |
| Ohm | Sensitive information | |
| Lyon | Surveillance, Snowden, and big data: Capacities, consequences, critique | |
| Lepri et al. | The tyranny of data? The bright and dark sides of data-driven decision-making for social good | |
| Rød et al. | Empowering activists or autocrats? The Internet in authoritarian regimes | |
| Robertson et al. | To surveil and predict: A human rights analysis of algorithmic policing in Canada | |
| Berman | When Database Queries Are Fourth Amendment Searches | |
| Green et al. | Open data privacy | |
| Regan et al. | Constructing the suspicious: Data production, circulation, and interpretation by DHS fusion centers | |
| Whittington et al. | Push, pull, and spill: A transdisciplinary case study in municipal open government | |
| Steinmetz et al. | The role of computer technologies in structuring evidence gathering in cybercrime investigations: A qualitative analysis | |
| Brown | Outsourcing, data insourcing, and the irrelevant Constitution | |
| Young et al. | Call me big PAPA: An extension of Mason’s information ethics framework to big data | |
| Mantelero et al. | The “Dark Side” of Big Data: Private and Public Interaction in Social Surveillance: How data collections by private entities affect governmental social control and how the EU reform on data protection responds | |
| Sprague | Welcome to the machine: Privacy and workplace implications of predictive analytics | |
| Akoto | Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies | |
| Sprague | Welcome to the machine: Privacy and workplace implications of predictive analytics | |
| Garbe | Pulling through elections by pulling the plug: Internet disruptions and electoral violence in Uganda | |
| Olesen | Whistleblowing and the press: Complicating the standard account | |
| Williamson | Do Proxies Provide Plausible Deniability? Evidence From Experiments on Three Surveys | |
| Shenkman et al. | Legal loopholes and data for dollars: How law enforcement and intelligence agencies are buying your data from brokers | |
| Storbeck et al. | Surveillance experiences of extinction rebellion activists and police: Unpacking the technologization of Dutch protest policing | |
| Muñiz | Secondary ensnarement: Surveillance systems in the service of punitive immigration enforcement |