default search action
Graeme Horsman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Graeme Horsman:
Sources of error in digital forensics. Forensic Sci. Int. Digit. Investig. 48: 301693 (2024) - [j37]Graeme Horsman, Andrew Dodd:
Competence in digital forensics. Forensic Sci. Int. Digit. Investig. 51: 301840 (2024) - 2023
- [j36]Graeme Horsman:
Can signs of digital coercive control be evidenced in mobile operating system settings? - A guide for first responders. Forensic Sci. Int. Digit. Investig. 44: 301483 (2023) - 2022
- [j35]Graeme Horsman:
Conducting a 'manual examination' of a device as part of a digital investigation. Digit. Investig. 40(Supplement): 301331 (2022) - [j34]Graeme Horsman:
Defining principles for preserving privacy in digital forensic examinations. Digit. Investig. 40(Supplement): 301350 (2022) - [j33]Yirang Lim, MinA Youn, Hyunji Chung, Jungheum Park, Graeme Horsman, Sangjin Lee:
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics. J. Inf. Secur. Appl. 65: 103102 (2022) - [j32]Olga Angelopoulou, Andy Jones, Graeme Horsman, Seyedali Pourmoafi:
A Study of the Data Remaining on Second-Hand Mobile Devices in the UK. J. Digit. Forensics Secur. Law 17(2) (2022) - 2021
- [j31]Nina Sunde, Graeme Horsman:
Part 2: The Phase-oriented Advice and Review Structure (PARS) for digital forensic investigations. Digit. Investig. 36(Supplement): 301074 (2021) - [j30]Graeme Horsman:
Contemporaneous notes for digital forensic examinations. Digit. Investig. 37: 301173 (2021) - [j29]Graeme Horsman:
Defining 'service levels' for digital forensic science organisations. Digit. Investig. 38: 301178 (2021) - [j28]Graeme Horsman:
Decision support for first responders and digital device prioritisation. Digit. Investig. 38: 301219 (2021) - [j27]Graeme Horsman, James R. Lyle:
Dataset construction challenges for digital forensics. Digit. Investig. 38: 301264 (2021) - 2020
- [j26]Graeme Horsman:
Digital Evidence Certainty Descriptors (DECDs). Digit. Investig. 32: 200896 (2020) - [j25]Virginia N. L. Franqueira, Graeme Horsman:
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. Digit. Investig. 32 Supplement: 300923 (2020) - [j24]Graeme Horsman:
Opinion: Does the field of digital forensics have a consistency problem? Digit. Investig. 33: 300970 (2020) - [j23]Graeme Horsman:
The challenge of identifying historic 'private browsing' sessions on suspect devices. Digit. Investig. 34: 300980 (2020) - [j22]Graeme Horsman, Nina Sunde:
Part 1: The need for peer review in digital forensics. Digit. Investig. 35: 301062 (2020)
2010 – 2019
- 2019
- [j21]Graeme Horsman:
Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework. Digit. Investig. 28(Supplement): 146-151 (2019) - [j20]Graeme Horsman, Benjamin Findlay, Tim James:
Developing a 'router examination at scene' standard operating procedure for crime scene investigators in the United Kingdom. Digit. Investig. 28(Supplement): 152-162 (2019) - [j19]Graeme Horsman:
Tool testing and reliability issues in the field of digital forensics. Digit. Investig. 28(Supplement): 163-175 (2019) - [j18]Graeme Horsman:
Reconstructing cached video stream content: - Part 2. Digit. Investig. 31 (2019) - [j17]Ruth Threadgall, Graeme Horsman:
An examination of gaming platform policies for law enforcement support. Digit. Investig. 31 (2019) - [j16]Graeme Horsman:
A Call for the Prohibition of Encryption: Panacea or Problem? IEEE Secur. Priv. 17(2): 59-66 (2019) - 2018
- [j15]Graeme Horsman:
Combatting those who intentionally access images depicting child sexual abuse on the Internet: A call for a new offence in England and Wales. Comput. Law Secur. Rev. 34(1): 111-124 (2018) - [j14]Graeme Horsman, Angela King:
Policing and Crime Act 2017: Changes to pre-charge bail and the impact on digital forensic analysis. Comput. Law Secur. Rev. 34(5): 1139-1143 (2018) - [j13]Graeme Horsman:
Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics. Comput. Secur. 73: 294-306 (2018) - [j12]Graeme Horsman:
I didn't see that! An examination of internet browser cache behaviour following website visits. Digit. Investig. 25: 105-113 (2018) - [j11]Graeme Horsman:
Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache. Digit. Investig. 26 Supplement: S30-S37 (2018) - [j10]Graeme Horsman, Helen Page, Peter Beveridge:
A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions. Digit. Investig. 27: 47-56 (2018) - [j9]Graeme Horsman:
A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: A case study on Periscope. J. Inf. Secur. Appl. 42: 107-117 (2018) - 2017
- [j8]Graeme Horsman:
A survey of current social network and online communication provision policies to support law enforcement identify offenders. Digit. Investig. 21: 65-75 (2017) - [j7]Graeme Horsman, Kevin Ginty, Paul Cranner:
Identifying offenders on Twitter: A law enforcement practitioner guide. Digit. Investig. 23: 63-74 (2017) - 2016
- [j6]Graeme Horsman:
Digital forensics: Understanding the development of criminal law in England and Wales on images depicting child sexual abuse. Comput. Law Secur. Rev. 32(3): 419-432 (2016) - [j5]Graeme Horsman:
The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Comput. Secur. 56: 151-162 (2016) - [j4]Graeme Horsman:
Unmanned aerial vehicles: A preliminary analysis of forensic challenges. Digit. Investig. 16: 1-11 (2016) - 2015
- [j3]Graeme Horsman, Lynne R. Conniss:
Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digit. Investig. 12 Supplement 1: S30-S37 (2015) - [j2]Graeme Horsman, Lynne R. Conniss:
An investigation of anonymous and spoof SMS resources used for the purposes of cyberstalking. Digit. Investig. 13: 80-93 (2015) - 2014
- [j1]Graeme Horsman, Christopher Laing, Paul Vickers:
A case-based reasoning method for locating evidence during digital forensic device triage. Decis. Support Syst. 61: 69-78 (2014) - 2012
- [c3]Graeme Horsman, Christopher Laing, Paul Vickers:
A Method for Reducing the Risk of Errors in Digital Forensic Investigations. Communications and Multimedia Security 2012: 99-106 - [c2]Graeme Horsman, Christopher Laing, Paul Vickers:
User-Contributory Case-Based Reasoning for Digital Forensic Investigations. EST 2012: 103-106 - [c1]Graeme Horsman, Christopher Laing, Paul Vickers:
A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. TrustCom 2012: 682-689
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint