1 |
Vavilis, S., Petkovic, M., & Zannone, N. (2016). A severity-based quantification of data leakages in database systems. Journal of Computer Security, 24(3), 321-345.
DOI
|
2 |
Yuan, J., & Yu, S. (2015). Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Transactions on Information Forensics and Security, 10(8), 1717-1726.
DOI
|
3 |
Kruse II, W. G., & Heiser, J. G. (2001). Computer forensics: incident response essentials. London, United Kingdom: Pearson Education.
|
4 |
Skalak, S. L., Golden, T. W., Clayton, M. M., & Pill, J. S. (2011). A guide to forensic accounting investigation. Hoboken, NJ : John Wiley & Sons.
|
5 |
Losavio, M. M., Chow, K. P., Koltay, A., & James, J. (2018). The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Security and Privacy, 1(3), 1-11.
|
6 |
Karie, N. M., & Venter, H. S. (2015). Taxonomy of challenges for digital forensics. Journal of forensic sciences, 60(4), 885-893.
DOI
|
7 |
Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2014). Cloud forensics: identifying the major issues and challenges. In International conference on advanced information systems engineering (pp. 271-284). Cham, Switzerland: Springer.
|
8 |
Okereafor, K., & Djehaiche, R. (2020). A Review of Application Challenges of Digital Forensics. International Journal of Simulation Systems Science and Technology, 21(2), 351-357.
|
9 |
Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital investigation, 13(June), 38-57.
DOI
|
10 |
Ribeiro, L. E. (2019). High-profile data breaches: Designing the right data protection architecture based on the law, ethics and trust. Applied Marketing Analytics, 5(2), 146-158.
|
11 |
Nelson, B., Phillips, A., & Steuart, C. (2014). Guide to computer forensics and investigations. Boston, MA: Cengage Learning.
|
12 |
Lee, J. H. (2021). Effect of Sports Psychology on Enhancing Consumer Purchase Intention for Retailers of Sports Shops: Literature Content Analysis. Journal of Distribution Science, 19(4), 5-13.
DOI
|
13 |
Liu, S., & Kuhn, R. (2010). Data loss prevention. IT professional, 12(2), 10-13.
DOI
|
14 |
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports, 23(4), 1-9.
DOI
|
15 |
Park, S., Kim, Y., Park, G., Na, O., & Chang, H. (2018). Research on digital forensic readiness design in a cloud computing-based smart work environment. Sustainability, 10(4), 1203.
DOI
|
16 |
Poyraz, O. I., Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020). Cyber assets at risk: monetary impact of US personally identifiable information mega data breaches. The Geneva Papers on Risk and Insurance-Issues and Practice, 45(4), 616-638.
DOI
|
17 |
Chen, H., Huang, X., & Li, Z. (2022). A content analysis of Chinese news coverage on COVID-19 and tourism. Current Issues in Tourism, 25(2), 198-205.
DOI
|
18 |
Dezfoli, F. N., Dehghantanha, A., Mahmoud, R., Sani, N. F. B. M., & Daryabar, F. (2013). Digital forensic trends and future. International Journal of Cyber-Security and Digital Forensics, 2(2), 48-77.
|
19 |
Adams, R. B., Hobbs, V., & Mann, G. (2013). The advanced data acquisition model (ADAM): A process model for digital forensic practice. JDFSL: The Journal of Digital Forensics, Security and Law, 8(4), 25-48.
|
20 |
Patrucco, A. S., Luzzini, D., & Ronchi, S. (2017). Research perspectives on public procurement: Content analysis of 14 years of publications in the journal of public procurement. Journal of Public Procurement, 17(2), 229-269.
DOI
|
21 |
Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), 723-740.
DOI
|
22 |
Shabtai, A., Elovici, Y., & Rokach, L. (2012). Data leakage detection/prevention solutions. In A Survey of Data Leakage Detection and Prevention Solutions (pp. 17-37). Boston, MA: Springer.
|
23 |
Sung, I. (2021). Interdisciplinary Literaure Analysis between Cosmetic Container Design and Customer Purchasing Intention. The Journal of Industrial Distribution & Business, 12(3), 21-29.
DOI
|
24 |
Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
DOI
|
25 |
Wang, H., Wang, W., Sun, H., Cui, Z., Rahnamayan, S., & Zeng, S. (2017). A new cuckoo search algorithm with hybrid strategies for flow shop scheduling problems. Soft Computing, 21(15), 4297-4307.
DOI
|
26 |
Woo, E. J., & Kang, E. (2021). The effect of environmental factors on customer's environmental protection pattern: An empirical text analysis in the literature. International Journal of Environmental Sciences, 7(1), 1-15.
|
27 |
Zawoad, S., & Hasan, R. (2016). Trustworthy digital forensics in the cloud. Computer, 49(3), 78-81.
DOI
|
28 |
Bollam, N., & Malsoru, M. V. (2011). Review on Data Leakage Detection. International Journal of Engineering Research and Applications, 1(3), 1088-1091.
|
29 |
Ali, M. D., & Kaur, D. (2020). Byod cyber forensic eco-system. International Journal of Advanced Research in Engineering and Technology, 11(9), 417-437.
|
30 |
Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62(February), 137-152.
DOI
|
31 |
Assarroudi, A., Heshmati Nabavi, F., Armat, M. R., Ebadi, A., & Vaismoradi, M. (2018). Directed qualitative content analysis: the description and elaboration of its underpinning methods and data analysis process. Journal of Research in Nursing, 23(1), 42-55.
DOI
|
32 |
Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: an analytical crime scene procedure model (ACSPM). Forensic science international, 233(1-3), 244-256.
DOI
|
33 |
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1-14.
|
34 |
Jain, M., & Lenka, S. K. (2016). A review on data leakage prevention using image steganography. International Journal of Computer Science Engineering, 5(2), 56-59.
|
35 |
Daryabar, F., Dehghantanha, A., Udzir, N. I., bin Shamsuddin, S., & Norouzizadeh, F. (2013). A survey about impacts of cloud computing on digital forensics. International Journal of Cyber-Security and Digital Forensics, 2(2), 77-95.
|
36 |
Gaur, A., & Kumar, M. (2018). A systematic approach to conducting review studies: An assessment of content analysis in 25 years of IB research. Journal of World Business, 53(2), 280-289.
DOI
|
37 |
Guevara, C., Santos, M., & Lopez, V. (2017). Data leakage detection algorithm based on task sequences and probabilities. Knowledge-Based Systems, 120(March), 236-246.
DOI
|
38 |
Kang, E. (2021). Qualitative Content Approach: Impact of Organizational Climate on Employee Capability. East Asian Journal of Business Economics, 9(4), 57-67.
DOI
|
39 |
Katz, G., Elovici, Y., & Shapira, B. (2014). CoBAn: A context-based model for data leakage prevention. Information sciences, 262(March), 137-158.
DOI
|
40 |
Khan, S., Gani, A., Wahab, A. W. A., Shiraz, M., & Ahmad. I. (2016). Network forensics: Review, taxonomy, and open challenges. Journal of Network and Computer Applications, 66(May), 214-235.
DOI
|
41 |
Kebande, V. R., & Venter, H. S. (2018). Novel digital forensic readiness technique in the cloud environment. Australian Journal of Forensic Sciences, 50(5), 552-591.
DOI
|
42 |
Kim, J., Lee, C., & Chang, H. (2020). The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth. Sustainability, 12(24), 10639.
DOI
|
43 |
Krishnan, S., & Shashidhar, N. (2021). Interplay of Digital Forensics in eDiscovery. International Journal of Computer Science and Security, 15(2), 19-44.
|
44 |
Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16-22.
DOI
|
45 |
Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., & Peacock, M. (2017). Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22(September), 3-13.
DOI
|
46 |
Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The future of digital forensics: Challenges and the road ahead. IEEE Security & Privacy, 15(6), 12-17.
DOI
|
47 |
Collie, J. (2018). A strategic model for forensic readiness. Athens Journal of Sciences, 5(2), 167-182.
DOI
|
48 |
Hong, J. H. (2021). A Global Strategy of a Company that Uses Culture Content as its Core Business. The Journal of Industrial Distribution & Business, 12(6), 37-46.
DOI
|