David GrestyMark John TaylorJohn HaggertyDavid GrestyChris WrenTom BerryAvoiding the misuse of social media by employees.8-1120162016Netw. Secur.5https://doi.org/10.1016/S1353-4858(16)30047-2db/journals/ns/ns2016.html#TaylorHGWB16Mark John TaylorJohn HaggertyDavid GrestyNatalia Criado PachecoTom BerryPeter AlmondInvestigating employee harassment via social media.322-335201517J. Syst. Inf. Technol.4https://doi.org/10.1108/JSIT-03-2015-0022db/journals/jsit/jsit17.html#TaylorHGPBA15Mark John TaylorJohn HaggertyDavid GrestyPeter AlmondTom BerryForensic investigation of social networking applications.9-1620142014Netw. Secur.11https://doi.org/10.1016/S1353-4858(14)70112-6db/journals/ns/ns2014.html#TaylorHGAB14Mark Taylor 0005Glyn HughesJohn HaggertyDavid GrestyPeter AlmondDigital evidence from mobile telephone applications.335-339201228Comput. Law Secur. Rev.3https://doi.org/10.1016/j.clsr.2012.03.006https://www.wikidata.org/entity/Q115092674db/journals/clsr/clsr28.html#0005HHGA12Mark Taylor 0005John HaggertyDavid GrestyTom BerryDigital evidence from peer-to-peer networks.647-652201127Comput. Law Secur. Rev.6https://doi.org/10.1016/j.clsr.2011.09.004https://www.wikidata.org/entity/Q115092793db/journals/clsr/clsr27.html#0005HGB11Mark John TaylorJohn HaggertyDavid GrestyDavid J. LambForensic investigation of cloud computing systems.4-1020112011Netw. Secur.3https://doi.org/10.1016/S1353-4858(11)70024-1db/journals/ns/ns2011.html#TaylorHGL11Mark Taylor 0005John HaggertyDavid GrestyThe legal aspects of corporate computer usage policies.72-76201026Comput. Law Secur. Rev.1https://doi.org/10.1016/j.clsr.2009.11.007db/journals/clsr/clsr26.html#0005HG10Mark Taylor 0005John HaggertyDavid GrestyRobert HegartyDigital evidence in cloud computing systems.304-308201026Comput. Law Secur. Rev.3https://doi.org/10.1016/j.clsr.2010.03.002https://www.wikidata.org/entity/Q115094375db/journals/clsr/clsr26.html#0005HGH10Mark John TaylorJohn HaggertyDavid GrestyPaul FergusForensic investigation of peer-to-peer networks.12-1520102010Netw. Secur.9https://doi.org/10.1016/S1353-4858(10)70115-Xhttps://www.wikidata.org/entity/Q62619313db/journals/ns/ns2010.html#TaylorHGF10Mark Taylor 0005John HaggertyDavid GrestyThe legal aspects of corporate e-mail investigations.372-376200925Comput. Law Secur. Rev.4https://doi.org/10.1016/j.clsr.2009.05.006db/journals/clsr/clsr25.html#0005HG09Mark Taylor 0005John HaggertyDavid GrestyThe legal aspects of corporate computer forensic investigations.562-566200723Comput. Law Secur. Rev.6https://doi.org/10.1016/j.clsr.2007.09.002https://www.wikidata.org/entity/Q115095962db/journals/clsr/clsr23.html#0005HG07Mark John TaylorDavid GrestyMike BaskettComputer game-flow design.20064Comput. Entertain.1https://doi.org/10.1145/1111293.1111300db/journals/cie/cie4.html#TaylorGB065Mark John TaylorDavid GrestyR. AskwithKnowledge for network support.469-475200143Inf. Softw. Technol.8db/journals/infsof/infsof43.html#TaylorGA01https://doi.org/10.1016/S0950-5849(01)00153-7Mark John TaylorDavid EnglandDavid GrestyKnowledge for Web site development.451-461200111Internet Res.5https://doi.org/10.1108/10662240110410426db/journals/intr/intr11.html#TaylorEG01Peter AlmondR. AskwithMike BaskettTom BerryNatalia CriadoNatalia Criado PachecoDavid EnglandPaul FergusJohn HaggertyRobert HegartyGlyn HughesDavid J. LambMark Taylor 0005Mark John TaylorChris Wren