• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Scholarly Commons Home
  • About
  • FAQ
  • My Account
  •  
  •  

Home > Journals and Magazines > Journals > JDFSL > Vol. 8 (2013)

 

Table of Contents

PDF

Table of Contents

Front Matter/Back Matter

PDF

Front Matter

PDF

Masthead

PDF

Back Matter

Articles

PDF

Automating Vendor Fraud Detection in Enterprise Systems
Kishore Singh, Peter Best, and Joseph Mula

PDF

Information Security Challenge of QR Codes
Nik Thompson and Kevin Lee

PDF

How Often Is Employee Anger An Insider Risk II? Detecting and Measuring Negative Sentiment versus Insider Risk in Digital Communications–Comparison between Human Raters and Psycholinguistic Software
Eric Shaw, Maria Payri, Michael Cohn, and Ilene R. Shaw

PDF

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2)
Damian Schofield and Ken Fowle

PDF

Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Thomas Nash

 
 
  • Journal Home
  • About This Journal
  • Aims & Scope
  • Editorial Board
  • Policies
  • LaTeX Template
  • Submission Guidelines
  • Sponsors
  • Indexing/Databases
  • Subscriptions
  • Reviewer Ethical Guidelines
  • Submit Article
  • Most Popular Papers
  • Receive Email Notices or RSS

 

Search

Advanced Search

ISSN: (Print) 1558-7215

ISSN: (Online) 1558-7223

 
 
  • Creative Commons License
    This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
 
Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright