Forensics Journal - Stevenson University 2011 | Page 34

STEVENSON UNIVERSITY REFERENCES ABOUT THE AUTHOR Danielle Sutton is currently a student in the graduate program at Stevenson University where she is pursuing a degree in Forensic Studies-Investigative track. She is employed as an Compliance Analyst with the Maryland Board of Physicians. She completed both her undergraduate and graduate studies at the University of Baltimore where she received a B.S. degree in Criminal Justice in 2006 and her M.A. degree in Legal and Ethical Studies in 2008. Cohen, F. (2006). Challenges to Digital Forensic Evidence. New Haven, CT: CRC Press. Garner, B. A. (2000). Black’s Law Dictionary. St. Paul, MN: West Publishing Company. Hardy, R., & Kreston, S. S. (2002). ‘Computers are like filing cabinets...’ Using analogy to explain computer forensics. National Center for Prosecution of Child abuse Update, 15(9), 1-2. Howard, T. E. (2004). Don’t cache out your case: prosecuting child pornography possession laws based on images located in temporary internet files. Berkley Technology Law Journal, 19(1227), 1228-1273. Liberatore, M., Levine, B. N., & Shields, C. (2010, November). Strengthening Forensic Investigations of Child Pornography on P2P Networks. ACM Conference on Future Networking Technologies. Retrieved from http://prisms.cs.umass.edu/brian/pubs/Liberatore. UM-CS-2010-043.pdf Nelson, B., Philips, A., Enfinger, F., & Steuart, C. (2008). Guide to computer forensics and investigations (3rd ed.). Boston, MA: Thomson Course Technology. Peisert, S., Bishop, M., & Marzullo, K. (2008). Computer forensics in forensis. ACM SIGOPS Operating Systems Review, 42(3), 112-122. Sassinsky, J. (n.d.). Cyberclues: Making the case for using computer evidence. Retrieved September 23, 2010, from Sassinsky Data Services, LLC. website: http://www.sassinsky.com//.html Shelley, L. I. (1998). Crime and corruption in the digital age. Journal of International Affairs, 51(2), 605-620. Wells, M., Finkelhor, D., Wolak, J., & Mitchell, K. J. (2007). Defining chilld pornography: law enforcement dilemmas in investigations of internet child pornography possession. Police Practice and Research, 8(3), 269-282. 32