Skip to main content
    • Aa
    • Aa

Learning on the Wires: BYOD, Embedded Systems, Wireless Technologies and Cybercrime


This article aims to identify and define some of the legal issues, the computer misuses and the information misbehaviour associated with IT security that are increasingly a matter for civil litigation, criminal cases and national policy where fighting serious organised crime and cybercrime are concerned. The author, Brunella Longo, investigates this subject, suggests criteria and offers practical guidance for researching the issues. The article also includes references to relevant legislation, normative technical standards and best practices that have emerged as a result of corporate IT developments.

Linked references
Hide All

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

D. Kleidermacher and M. Keidermacher (2012) Embedded Systems Security: practical methods for safe and secure software and systems development. Elsevier

H. Jahankhani and E. Beqiri (2008) Memory-Based antiforensic tools and techniques. International Journal of Information Security and Privacy, 2 (2) pp.113

Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Legal Information Management
  • ISSN: 1472-6696
  • EISSN: 1741-2021
  • URL: /core/journals/legal-information-management
Please enter your name
Please enter a valid email address
Who would you like to send this to? *



Altmetric attention score

Full text views

Total number of HTML views: 2
Total number of PDF views: 10 *
Loading metrics...

Abstract views

Total abstract views: 90 *
Loading metrics...

* Views captured on Cambridge Core between September 2016 - 25th June 2017. This data will be updated every 24 hours.