TITLE

Cybersleuthing

AUTHOR(S)
Lytle, Tamara
PUB. DATE
January 2012
SOURCE
HR Magazine;Jan2012, Vol. 57 Issue 1, p55
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the use of digital forensics to identify employees who misuse technology and engage in illegal or unethical conduct. Digital forensics specialists including Rich Plansky, Mark Pollitt, and Glenn Dardick examine cases in which digital investigation was used to identify the sources of data leaks, solve harassment cases, and prevent fraud. The role of human resources (HR) departments in communicating technology policies is examined.
ACCESSION #
70278640

 

Related Articles

  • Cyber analysts help in staff crime cases.  // Meat Trades Journal;11/20/2015, p2 

    The article reports that cyber forensics experts are capable of helping businesses in protecting themselves from fraud and mentions that butchers' shops are more concerned about the issue of staff pocketing money from the till.

  • Improvement of evidence collection module using live response technology on a windows system. Park, Won; Lee, DongHwi // Multimedia Tools & Applications;Aug2015, Vol. 74 Issue 16, p6453 

    Recently, A malware (or malicious code) of information leakage type is increasing for leaking personal data, credit information, financial information, etc. Also, this various forms is fast changing. However, a recent trend of an existing windows forensics module for the type of violation is a...

  • PR BLOTTER.  // Public Relations Tactics;Oct2002, Vol. 9 Issue 10, p4 

    Highlights various issues related to the public relations (PR) industry. Launch of books related to PR activities in the White House and baseball; Occurrence of widespread fraud in resumes; Availability of memos on the Web site InternalMemos.com related to corporation leaks.

  • Record takers. Sparrow, Stephanie // Personnel Today;10/10/2006, p35 

    The article presents the author's comments on how the human resource (HR) department can help in preventing huge leak of valuable knowledge from the organizations. The organizations need to look at how the employees communicate and how they capture experience, and think more flexibly about...

  • Can Workplace Policies Control Your Organization's Potential Risk from Employee Blogs? Baderian, Steven D.; Siegel, Paul J. // Venulex Legal Summaries;2006 Q1, p1 

    The article addresses the increasing prevalence of blogging and the growing concerns of employers in the U.S. Blogging is described as the act of posting a diary or journal on the Internet by an individual, group or entity. The trend has employers concerned about what employees may be saying...

  • UPRAVLJANJE KADROVIMA KAO NAÄŒIN ÄŒUVANJA POSLOVNO VAŽNIH PODATAKA. Banovec, Daša Janja; Podbregar, Iztok // International Conference: Crisis Management Days;2014, p67 

    Experts have found that employees represent the greatest risk for unauthorized leak of business-critical information for organizations since they have access to a wide range of business-critical information, knowledge and understanding of work processes. At the same time, they are aware of any...

  • Go whistle for it. Bates, Jane // Nursing Standard;1/11/2006, Vol. 20 Issue 18, p33 

    The article presents advisories in addressing malpractice practiced by a nurse in the workplace and the risk of whistle blowing in addressing such issue. The author points out that medical personnel might suffer serious punishments and disciplinary actions for the act of whistle blowing...

  • Gaps in the HIPAA Chinese Wall. Lavelle, Anne M. // Trustee;Jan2006, Vol. 59 Issue 1, p25 

    Examines the gaps in the U.S. Health Insurance Portability and Accountability Act (HIPAA) in cases wherein the patient happens to be an employee of the hospital. Ways in which the hospital human resource department can deal with a nurse who possibly violated HIPAA rules by leaking information...

  • Security breaches hitting home. Bielski, Lauren // ABA Banking Journal;Jun2005, Vol. 97 Issue 6, p7 

    Discusses security concerns regarding phishing and information leaks in banks and other financial service firms in the U.S. Incidents of record thefts in some banks; Impact of compliance pressures on bankers; Increase in fraud and security breaches in banks; Service offered by Yahoo to Internet...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics