iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/34/3230.xml
David Gresty
Mark John Taylor John Haggerty David Gresty Chris Wren Tom Berry Avoiding the misuse of social media by employees. 8-11 2016 2016 Netw. Secur. 5 https://doi.org/10.1016/S1353-4858(16)30047-2 db/journals/ns/ns2016.html#TaylorHGWB16
Mark John Taylor John Haggerty David Gresty Natalia Criado Pacheco Tom Berry Peter Almond Investigating employee harassment via social media. 322-335 2015 17 J. Syst. Inf. Technol. 4 https://doi.org/10.1108/JSIT-03-2015-0022 db/journals/jsit/jsit17.html#TaylorHGPBA15
Mark John Taylor John Haggerty David Gresty Peter Almond Tom Berry Forensic investigation of social networking applications. 9-16 2014 2014 Netw. Secur. 11 https://doi.org/10.1016/S1353-4858(14)70112-6 db/journals/ns/ns2014.html#TaylorHGAB14
Mark Taylor 0005 Glyn Hughes John Haggerty David Gresty Peter Almond Digital evidence from mobile telephone applications. 335-339 2012 28 Comput. Law Secur. Rev. 3 https://doi.org/10.1016/j.clsr.2012.03.006 https://www.wikidata.org/entity/Q115092674 db/journals/clsr/clsr28.html#0005HHGA12
Mark Taylor 0005 John Haggerty David Gresty Tom Berry Digital evidence from peer-to-peer networks. 647-652 2011 27 Comput. Law Secur. Rev. 6 https://doi.org/10.1016/j.clsr.2011.09.004 https://www.wikidata.org/entity/Q115092793 db/journals/clsr/clsr27.html#0005HGB11
Mark John Taylor John Haggerty David Gresty David J. Lamb Forensic investigation of cloud computing systems. 4-10 2011 2011 Netw. Secur. 3 https://doi.org/10.1016/S1353-4858(11)70024-1 db/journals/ns/ns2011.html#TaylorHGL11
Mark Taylor 0005 John Haggerty David Gresty The legal aspects of corporate computer usage policies. 72-76 2010 26 Comput. Law Secur. Rev. 1 https://doi.org/10.1016/j.clsr.2009.11.007 db/journals/clsr/clsr26.html#0005HG10
Mark Taylor 0005 John Haggerty David Gresty Robert Hegarty Digital evidence in cloud computing systems. 304-308 2010 26 Comput. Law Secur. Rev. 3 https://doi.org/10.1016/j.clsr.2010.03.002 https://www.wikidata.org/entity/Q115094375 db/journals/clsr/clsr26.html#0005HGH10
Mark John Taylor John Haggerty David Gresty Paul Fergus Forensic investigation of peer-to-peer networks. 12-15 2010 2010 Netw. Secur. 9 https://doi.org/10.1016/S1353-4858(10)70115-X https://www.wikidata.org/entity/Q62619313 db/journals/ns/ns2010.html#TaylorHGF10
Mark Taylor 0005 John Haggerty David Gresty The legal aspects of corporate e-mail investigations. 372-376 2009 25 Comput. Law Secur. Rev. 4 https://doi.org/10.1016/j.clsr.2009.05.006 db/journals/clsr/clsr25.html#0005HG09
Mark Taylor 0005 John Haggerty David Gresty The legal aspects of corporate computer forensic investigations. 562-566 2007 23 Comput. Law Secur. Rev. 6 https://doi.org/10.1016/j.clsr.2007.09.002 https://www.wikidata.org/entity/Q115095962 db/journals/clsr/clsr23.html#0005HG07
Mark John Taylor David Gresty Mike Baskett Computer game-flow design. 2006 4 Comput. Entertain. 1 https://doi.org/10.1145/1111293.1111300 db/journals/cie/cie4.html#TaylorGB06 5
Mark John Taylor David Gresty R. Askwith Knowledge for network support. 469-475 2001 43 Inf. Softw. Technol. 8 db/journals/infsof/infsof43.html#TaylorGA01 https://doi.org/10.1016/S0950-5849(01)00153-7
Mark John Taylor David England David Gresty Knowledge for Web site development. 451-461 2001 11 Internet Res. 5 https://doi.org/10.1108/10662240110410426 db/journals/intr/intr11.html#TaylorEG01
Peter Almond R. Askwith Mike Baskett Tom Berry Natalia CriadoNatalia Criado Pacheco David England Paul Fergus John Haggerty Robert Hegarty Glyn Hughes David J. Lamb Mark Taylor 0005Mark John Taylor Chris Wren