Forensics Journal - Stevenson University 2011 | Page 34
STEVENSON UNIVERSITY
REFERENCES
ABOUT THE AUTHOR
Danielle Sutton is currently a student in the
graduate program at Stevenson University
where she is pursuing a degree in Forensic
Studies-Investigative track. She is employed
as an Compliance Analyst with the Maryland
Board of Physicians. She completed both her
undergraduate and graduate studies at the University of Baltimore where she received a B.S. degree in Criminal Justice in
2006 and her M.A. degree in Legal and Ethical Studies in 2008.
Cohen, F. (2006). Challenges to Digital Forensic Evidence. New Haven,
CT: CRC Press.
Garner, B. A. (2000). Black’s Law Dictionary. St. Paul, MN: West
Publishing Company.
Hardy, R., & Kreston, S. S. (2002). ‘Computers are like filing cabinets...’ Using analogy to explain computer forensics. National Center
for Prosecution of Child abuse Update, 15(9), 1-2.
Howard, T. E. (2004). Don’t cache out your case: prosecuting child
pornography possession laws based on images located in temporary
internet files. Berkley Technology Law Journal, 19(1227), 1228-1273.
Liberatore, M., Levine, B. N., & Shields, C. (2010, November).
Strengthening Forensic Investigations of Child Pornography on
P2P Networks. ACM Conference on Future Networking Technologies.
Retrieved from http://prisms.cs.umass.edu/brian/pubs/Liberatore.
UM-CS-2010-043.pdf
Nelson, B., Philips, A., Enfinger, F., & Steuart, C. (2008). Guide to
computer forensics and investigations (3rd ed.). Boston, MA: Thomson
Course Technology.
Peisert, S., Bishop, M., & Marzullo, K. (2008). Computer forensics
in forensis. ACM SIGOPS Operating Systems Review, 42(3), 112-122.
Sassinsky, J. (n.d.). Cyberclues: Making the case for using computer evidence. Retrieved September 23, 2010, from Sassinsky Data Services,
LLC. website: http://www.sassinsky.com//.html
Shelley, L. I. (1998). Crime and corruption in the digital age. Journal
of International Affairs, 51(2), 605-620.
Wells, M., Finkelhor, D., Wolak, J., & Mitchell, K. J. (2007). Defining chilld pornography: law enforcement dilemmas in investigations
of internet child pornography possession. Police Practice and Research,
8(3), 269-282.
32