Choi, 2017 - Google Patents
Mobile instant messaging evidence in criminal trialsChoi, 2017
View PDF- Document ID
- 14536796976683923323
- Author
- Choi Y
- Publication year
- Publication venue
- Cath. UJL & Tech
External Links
Snippet
Mobile instant messaging (" MIM") applications (" app (s)") like WhatsApp, WeChat, and Line allow mobile users to send real-time text messages, voice messages, picture messages, video messages, or files to individuals or groups of friends. 1 The evolution and rise of …
- 238000005516 engineering process 0 description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Brown | Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice | |
Nuzulita et al. | The role of risk‐benefit and privacy analysis to understand different uses of social media by Generations X, Y, and Z in Indonesia | |
Semitsu | From Facebook to mug shot: How the dearth of social networking privacy rights revolutionized online government surveillance | |
Froomkin | Lessons learned too well: Anonymity in a time of surveillance | |
Strutin | Social media and the vanishing points of ethical and constitutional boundaries | |
Murphy et al. | Social media evidence in government investigations and criminal proceedings: A frontier of new legal issues | |
Orenstein | Friends, Gangbangers, Custody Disputants, Lend Me Your Passwords | |
Verma et al. | Privacy and security: Online social networking | |
Geist | Law, privacy and surveillance in Canada in the post-Snowden era | |
Leitch et al. | Security issues challenging Facebook | |
Kierkegaard | Twitter thou doeth? | |
Robbins | Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence | |
McGregor | Digital security and source protection for journalists | |
Adu Michael et al. | Mitigating cybercrime and online social networks threats in Nigeria | |
Choi | Mobile instant messaging evidence in criminal trials | |
Efe et al. | How privacy is threatened from social media communication? | |
Grossman | No, don't IM me-Instant messaging, authentication, and the best evidence rule | |
Morrison | What the Cops Can't Do, Internet Service Providers Can: Preserving Privacy in Email Contents | |
Shimonski | Cyber reconnaissance, surveillance and defense | |
Dunn et al. | On the Internet, Nobody Knows You are a Dog: Contested Authorship of Digital Evidence in Cases of Gender-based Violence | |
Chang | New technology, new information privacy: social-value-oriented information privacy theory | |
Serano et al. | Using Social Media Evidence at Trial | |
Ninovic | Deepfake crime: Trends, threats and implications | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Mendoza | Network Investigation Techniques: Government Hacking and the Need for Adjustment in the Third-Party Doctrine |