1.0 Introduction
1.1 What is Cyber Law
1.1.1 Cyber Law in Malaysia
1.2 Cyber Crime in Brief
2.0 What is Computer Evidence
2.1 Definition of Computer Evidence
2.2 The Importance of Computer Evidence (the problems and solutions)
3.0 Computer Evidence: Processing Process
4.0 Comparison with Physical Evidence
4.1 Strength and weaknesses in Computer Evidence
5.0 Computer Evidence in Malaysia
5.1 Introduction
5.2 Classification of Computer Evidence
5.3 Weight of evidence
5.4 Primary or Secondary Evidence
5.5 Burden of proof
5.6 Malaysian Decided Cases
6.0 Articles and Journals (views and comments)
8.0 Referrences
1.2 Cyber Crime in Brief
2.0 What is Computer Evidence
2.1 Definition of Computer Evidence
2.2 The Importance of Computer Evidence (the problems and solutions)
3.0 Computer Evidence: Processing Process
4.0 Comparison with Physical Evidence
4.1 Strength and weaknesses in Computer Evidence
5.0 Computer Evidence in Malaysia
5.1 Introduction
5.2 Classification of Computer Evidence
5.3 Weight of evidence
5.4 Primary or Secondary Evidence
5.5 Burden of proof
5.6 Malaysian Decided Cases
6.0 Articles and Journals (views and comments)
- Article:Undercover chatroom work captures e-criminal (Barrett Lyon, National Hi-Tech Crime Unit).
- Article: Schoolteacher granted new trial in spyware-porn case; Computer-forensic evidence could keep Amero out of jail.(Julie Amero).
- Article: Scotland Yard looks to set up crack cybercrime unit (Bill Goodwin)
- Article: Experts Must Think Like Criminals to Track Computer Clues
8.0 Referrences
9.0 Appendix 1
9.1 Glossary
0 comments:
Post a Comment