Gregory H. Carlton

Gregory H. Carlton

Gregory H. Carlton, Ph.D., Computer Information Systems, College of Business Administration

Research

Publications and Research

Accepted Peer-Reviewed Work Awaiting Publication (i.e., In Press)

Publications

● Carlton, G.H. and Kessler, G.C. (2018), Disconnects of specialized mobile forensics within the generalized field of digital forensic science. International Journal of Interdisciplinary Telecommunications and Networking; Volume 10, Issue 3.

● Carlton, G.H. and Kessler, G.C. (2018), A study of forensic imaging to evaluate unsanitized destination storage media. International Journal of Interdisciplinary Telecommunications and Networking; Volume 10, Issue 3.

● Kessler, G.C. and Carlton, G.H. (2017). Exploring Myths in Digital Forensics: Separating Science From Ritual. International Journal of Interdisciplinary Telecommunications and Networking; Volume 9, Issue 4, 1-9.

● Kessler, G.C. and Carlton, G.H. (2014). A study of forensic imaging in the absence of write-blockers. Journal of Digital Forensics, Security, and Law; Volume 9, Number 3, 51-58

● Carlton, G.H. (2013). A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology. Journal of Digital Forensics, Security, and Law; Volume 8, Number 1, 17-37.

● Carlton, G.H. and Kessler, G.C. (2012). Identifying trace evidence in data wiping application software. Journal of Digital Forensics, Security, and Law; Volume 7, Number 2, 113-142.

● Carlton, G.H. and Matsumoto, J. (2011). A survey of contemporary enterprise storage technologies from a digital forensics perspective. Journal of Digital Forensics, Security, and Law; Volume 6, Number 3, 63-74.

● Carlton, G.H. and Zhou, H. (2011). A survey of cloud computing challenges from a digital forensics perspective. International Journal of Interdisciplinary Telecommunications and Networking; Volume 3, Issue 4, 1-16.

● Carlton, G.H. and Worthley, R. (2010). Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners. Journal of Digital Forensics, Security, and Law; Volume 5, Number 1. 5-20.

● Carlton, G.H. and Worthley, R. (2009). An Evaluation of Agreement and Conflict Among Computer Forensics Experts. Proceedings of the 42nd Annual Hawaii International Conference on Systems Sciences; p. 277.

● Carlton, G.H. (2008) An Evaluation of Windows-based Computer Forensics Application Software Running on a Macintosh. Journal of Digital Forensics, Security, and Law; Volume 3, Number 3. 43-60.

● Carlton, G.H. (2006). A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks. Journal of Digital Forensics, Security and Law; Volume 2, Number 1, 35-56.

● Carlton, G.H. (2006). Forensic Data Acquisition Task Performance Guide – The Identification and Measurement of a Protocol for the Forensic Data Acquisition of Personal Computer Workstations, http://htcia.org

● Carlton, G.H. (2006). A Protocol for the Forensic Data Acquisition of Personal Computer Workstations. Dissertation Abstracts International, (UMI No. 3251043)

● Carlton, G.H. (2005). A Critical Evaluation of the Treatment of Deleted Files in Microsoft Windows Operating Systems, Proceedings of the 38th Annual Hawaii International Conference on Systems Sciences; p. 310C.

Conference Presentations

● Carlton, G.H. (2016) Contemporary Headlines in Mobile and Digital Forensics. Wireless Telecommunications Symposium, London, UK,.

● Kessler, G.C., Carlton, G.H. (2015) Exploring Myths in Digital Forensics. Proceedings of the American Academy of Forensics Sciences, p. 495.

● Carlton, G.H. (2014) "Digital Forensics and Mobile Devices," Proceedings of the 13th Annual Wireless Telecommunications Sympoisum, Washington, D.C.

● Carlton, G.H., Worthley, R. (2009) An Evaluation of Agreement and Conflict Among Computer Forensics Experts. Proceedings of the 42nd Annual Hawaii International Conference on Systems Sciences, p. 277.

● Carlton, G.H. (2008) Computer Forensics Methodology - Protection After Security Fails. Proceedings of the 7th Annual Wireless Telecommunications Symposium, Pomona, CA.

● Carlton, G.H. (2007) The Forensic Data Acquisition Task Performance Guide. High Technology Crime Investigation Association International 2007 Conference and Exposition, San Diego, CA

● Carlton, G.H. (2005) A Critical Evaluation of the Treatment of Deleted Files in Microsoft Windows Operation Systems. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p. 310.

Broadcast Presentations

● 2009 Time Warner Cable Local Edition 5-minute segment on CNN Headlines News discussing Online Computer Safety broadcasted multiple occurrences between March 30, 2009 and April 5, 2009, at 24 or 54 minutes past the hour.

● 2007 Time Warner Cable Local Edition 5-minute segment on CNN Headlines News discussing Computer Forensics broadcasted multiple occurrences between October 29, 2007 and November 2, 2007, at 24 or 54 minutes past the hour.

Research Interests

● Digital Forensics (Computer Forensics)