Tread Carefully Into the Cloud.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Abstract:
      The article discusses the risks of cloud or internet-based computing. The author says that Web 2.0 marketers reportedly lack the necessary requirements to meet regulatory guidelines. He states that due to inefficient auditing systems information security is still at risk. The relationship between electronic discovery and enterprise applications is explained. The author says that electronic discovery also uses computer forensics that needs access to every critical information in a volatile storage such as the random access memory.