C. Blackwell, An Investigative Framework for Incident Analysis Advances in Digital Forensics, pp.23-34, 2011.
DOI : 10.1007/978-3-642-24212-0_2

I. Brown, Regulation of Converged Communications Surveillance, New Directions in Surveillance and Privacy, pp.39-73, 2009.

A. Gershowitz, The iPhone Meets the Fourth Amendment, SSRN Electronic Journal, vol.3, 2008.
DOI : 10.2139/ssrn.1084503

C. Grobler, C. Louwrens, V. Solms, and S. , A Multi-component View of Digital Forensics, 2010 International Conference on Availability, Reliability and Security, pp.647-652, 2010.
DOI : 10.1109/ARES.2010.61

S. C. Ieong, FORZA ??? Digital forensics investigation framework that incorporate legal issues, Digital Investigation, pp.29-36, 2006.
DOI : 10.1016/j.diin.2006.06.004

N. Lane, E. Miluzzo, H. Ly, D. Peebles, T. Choudhury et al., A survey of mobile phone sensing, IEEE Communications Magazine, vol.48, issue.9, pp.140-150, 2010.
DOI : 10.1109/MCOM.2010.5560598

W. Jansen and R. Ayers, Guidelines on cell phone forensics, NIST Special Publication, vol.800, p.101, 2007.
DOI : 10.6028/NIST.SP.800-101

R. P. Mislan, E. Casey, and G. C. Kessler, The growing need for on-scene triage of mobile devices, Digital Investigation, vol.6, issue.3-4, pp.3-4, 2010.
DOI : 10.1016/j.diin.2010.03.001

L. Mitrou, Data Retention: a Pandora Box for Rights and Liberties, Digital Privacy: Theory, Technologies and Practices, pp.410-433, 2008.

S. Morrissey, IOS Forensic Analysis: for IPhone, IPad and IPod Touch, Apress, 2010.
DOI : 10.1007/978-1-4302-3343-5

A. Mylonas, Smartphone spying tools, 2008.

M. Rogers, J. Goldman, R. Mislan, T. Wedge, and S. Debrota, Computer Forensics Field Triage Process Model, Proceeding of the Conference on Digital Forensics Security and Law, pp.27-40, 2006.
DOI : 10.15394/jdfsl.2006.1004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878

I. Sutherland, J. Evans, T. Tryfonas, and A. Blyth, Acquiring volatile operating system data tools and techniques, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.6-73, 2008.
DOI : 10.1145/1368506.1368516

J. Tan, Forensic readiness, @ Stake Technical Report, 2001.

V. Thing, K. Ng, and E. Chang, Live memory forensics of mobile phones, Digital Investigation, pp.74-82, 2010.
DOI : 10.1016/j.diin.2010.05.010

J. Walls, Forensic Triage for Mobile Phones with DEC0DE, USENIX Security Symposium, 2011.

A. Wiebe, The new Fundamental Right to IT Security -First evaluation and comparative view at the U.S., Datenschutz und Datensicherheit, pp.713-716, 2008.

A. Wiebke, Agents, Trojans and tags: The next generation of investigators, International Review of Law Computers & Technology, vol.23, issue.12, pp.99-108, 2009.

J. A. Zachman, A framework for information systems architecture, IBM Systems Journal, vol.26, issue.3, pp.276-292, 1987.
DOI : 10.1147/sj.263.0276