[go: up one dir, main page]

Choi, 2017 - Google Patents

Mobile instant messaging evidence in criminal trials

Choi, 2017

View PDF
Document ID
14536796976683923323
Author
Choi Y
Publication year
Publication venue
Cath. UJL & Tech

External Links

Snippet

Mobile instant messaging (" MIM") applications (" app (s)") like WhatsApp, WeChat, and Line allow mobile users to send real-time text messages, voice messages, picture messages, video messages, or files to individuals or groups of friends. 1 The evolution and rise of …
Continue reading at scholarship.law.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Brown Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice
Nuzulita et al. The role of risk‐benefit and privacy analysis to understand different uses of social media by Generations X, Y, and Z in Indonesia
Semitsu From Facebook to mug shot: How the dearth of social networking privacy rights revolutionized online government surveillance
Froomkin Lessons learned too well: Anonymity in a time of surveillance
Strutin Social media and the vanishing points of ethical and constitutional boundaries
Murphy et al. Social media evidence in government investigations and criminal proceedings: A frontier of new legal issues
Orenstein Friends, Gangbangers, Custody Disputants, Lend Me Your Passwords
Verma et al. Privacy and security: Online social networking
Geist Law, privacy and surveillance in Canada in the post-Snowden era
Leitch et al. Security issues challenging Facebook
Kierkegaard Twitter thou doeth?
Robbins Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence
McGregor Digital security and source protection for journalists
Adu Michael et al. Mitigating cybercrime and online social networks threats in Nigeria
Choi Mobile instant messaging evidence in criminal trials
Efe et al. How privacy is threatened from social media communication?
Grossman No, don't IM me-Instant messaging, authentication, and the best evidence rule
Morrison What the Cops Can't Do, Internet Service Providers Can: Preserving Privacy in Email Contents
Shimonski Cyber reconnaissance, surveillance and defense
Dunn et al. On the Internet, Nobody Knows You are a Dog: Contested Authorship of Digital Evidence in Cases of Gender-based Violence
Chang New technology, new information privacy: social-value-oriented information privacy theory
Serano et al. Using Social Media Evidence at Trial
Ninovic Deepfake crime: Trends, threats and implications
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Mendoza Network Investigation Techniques: Government Hacking and the Need for Adjustment in the Third-Party Doctrine