参考文献
|
-
林宜隆、張文耀、劉耿旭(2013)。建構個人資料保護之數位證據鑑識標準作業程序。電腦稽核,27
連結:
-
勤業眾信.企業風險服務專欄.個資法下數位證據之重要性http://www.deloitte.com/view/tc_TW/tw/48080/48084/136508/073fa8b3cc586310VgnVCM 2000001b56f00aRCRD.htm
-
ISO/IEC 27037: 2012;Information technology -- Security techniques --Guidelines for identification, collection, acquisition and preservation of digital evidence.
-
NIST SP 800- 101; Guidelines on Cell Phone Forensics.(visit of date: 2013/ 10/ 22).
-
余俊賢, 數位鑑識 的挑戰與展望2005,(visit date: 2013/ 07/ 01)http://www.informationsecurity.com.tw/article/article_detail.aspx?t2id=1&t3id=2&aid=478
-
Casey, Eoghan(2001).Handbook of Computer Crime Investigation: Forensic Tools and Technology.ACADEMIC PRESS.
-
Casey, Eoghan.Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet.
-
Lin, Abe C.,Lin, I-Long,Lan, T. H.,Wu, Tzongchen(2005).Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence.Proceedings of the First International Workshopon Systematic Approaches to Digital Forensic Engineering (SADFE'05)
-
Lin, I-Long Jack(2005).A Study on Planning Cybersecurity Professionals in Taiwan : Based on the Case of Cyber Forensic Professionals.2005 International Forensic Science Symposium,Taipei,Taiwan:
-
Lin, I-Long Jack(2005).The Study on Constructing Digital Evidence Standard of Procedure.2005 International Forensic Science Symposium,Taipei, Taiwan:
-
Lin, Yi-Chi,Slay, Jill,Lin, I-Long(2008).Computer forensics and Culture.Pacific Asia Workshop on Cybercrime and Computer Forensics at ISI 2008, Taipei-IEEE International Conference of Intelligence and Security Informatics
-
林宜隆(2012)。建構數位證據鑑識標準作業程序。司法新聲,101
-
林宜隆、尹延齡、呂宗霖、周彥霖。數位證據鑑識標準作業程序之研究─以建構智慧型手機整合為例。第十八屆資訊管理暨實務研討會
-
林宜隆、李政謙、陳靜玉、張志汖(2013)。數位證據鑑識標準作業程序與ISO 27037 數位證據處理程序之比較分析。第十九屆資訊管理暨實務研討會
-
林宜隆、邱獻民、呂芳懌(2010)。數位證據同一性在法庭上之攻擊與防禦─以在網際網路蒐集之數位證據為中心。中央警察大學學報,47,363-377。
-
邱獻民(2007)。碩士論文(碩士論文)。東吳大學法律學系。
-
邱獻民、林宜隆(2007)。數位證據在法庭上之攻防對策。中央警察大學『資訊、科技與社會』學報,7(1)
-
陳明秀(2007)。智慧型手機對電腦媒介溝通之影響初探。台灣圖書館管理季刊,3(2)
|