Published online by Cambridge University Press: 17 June 2013
This article aims to identify and define some of the legal issues, the computer misuses and the information misbehaviour associated with IT security that are increasingly a matter for civil litigation, criminal cases and national policy where fighting serious organised crime and cybercrime are concerned. The author, Brunella Longo, investigates this subject, suggests criteria and offers practical guidance for researching the issues. The article also includes references to relevant legislation, normative technical standards and best practices that have emerged as a result of corporate IT developments.
1 ISACA. (2010) Securing Mobile Devices. An ISACA Emerging Technology White Paper.
2 NIST. (2008) Guide to Securing Legacy IEEE 802.11 Wireless Networks. Special Publication 800–48 Revision 1.
3 Hadjsaid, N. and Sabonnadiere, J-C. (2012) SmartGrids. WileyGoogle Scholar.
4 Kleidermacher, D. and Keidermacher, M. (2012) Embedded Systems Security: practical methods for safe and secure software and systems development. ElsevierGoogle Scholar.
5 Longo, B. (2013) Mind the BYOD gap. Cybersecurity at a crossroads. Self-archived version available through http://www.SSRN.com.
6 Jahankhani, H. and Beqiri, E. (2008) Memory-Based antiforensic tools and techniques. International Journal of Information Security and Privacy, 2 (2) pp.1–13CrossRefGoogle Scholar.
7 Ibid
8 Hart, H. M. Jr. and McNaughton, J. T. (1958) Evidence and Inference in the Law. Evidence and Inference. The Hayden Colloquium on Scientific Concept and Method. The Free Press of Glencoe, pp. 48–72Google Scholar.
9 Ibid
10 Schwartz, D. S. (2011–2012). A Foundation Theory of Evidence. Georgetown Law Journal, (100), 95–172Google Scholar.
11 Saracevic, T. (2010) The Notion of Context in “Information Interaction in Context”. IIiX 2010, August 18–21, 2010, New Brunswick, New Jersey, USA.