{"id":2514,"date":"2015-12-22T09:48:51","date_gmt":"2015-12-22T14:48:51","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2514"},"modified":"2017-02-03T21:26:34","modified_gmt":"2017-02-04T02:26:34","slug":"compethorghumresources","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/compethorghumresources\/","title":{"rendered":"Week 4: Ethics for Digital Forensic"},"content":{"rendered":"<p>Ethics in Computer Forensics<\/p>\n<p><a href=\"https:\/\/www.forensicmag.com\/article\/2014\/03\/professional-ethics-digital-forensics-discipline-part-1\">https:\/\/www.forensicmag.com\/article\/2014\/03\/professional-ethics-digital-forensics-discipline-part-1<\/a><\/p>\n<p><a href=\"http:\/\/www.forensicmag.com\/article\/2014\/06\/professional-ethics-digital-forensics-discipline-part-2\">http:\/\/www.forensicmag.com\/article\/2014\/06\/professional-ethics-digital-forensics-discipline-part-2<\/a><\/p>\n<p>There\u2019s no code of ethics to govern digital forensics \u2013 and we need\u00a0one<\/p>\n<p><a href=\"http:\/\/theconversation.com\/theres-no-code-of-ethics-to-govern-digital-forensics-and-we-need-one-45755\">http:\/\/theconversation.com\/theres-no-code-of-ethics-to-govern-digital-forensics-and-we-need-one-45755<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Required Viewing found here<\/strong><br \/>\nEthical Insights: IT Forensics, Ethics and Risks<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=UiqzV2NNPW8\">https:\/\/www.youtube.com\/watch?v=UiqzV2NNPW8<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethics in Computer Forensics https:\/\/www.forensicmag.com\/article\/2014\/03\/professional-ethics-digital-forensics-discipline-part-1 http:\/\/www.forensicmag.com\/article\/2014\/06\/professional-ethics-digital-forensics-discipline-part-2 There\u2019s no code of ethics to govern digital forensics \u2013 and we need\u00a0one http:\/\/theconversation.com\/theres-no-code-of-ethics-to-govern-digital-forensics-and-we-need-one-45755 &nbsp; Required Viewing found here Ethical Insights: IT Forensics, Ethics and Risks https:\/\/www.youtube.com\/watch?v=UiqzV2NNPW8<\/p>\n","protected":false},"author":1207,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2514","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages\/2514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/users\/1207"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/comments?post=2514"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages\/2514\/revisions"}],"predecessor-version":[{"id":3090,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages\/2514\/revisions\/3090"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/media?parent=2514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}