- Yinghua Guo, Jill Slay. Testing Forensic Copy Function of Computer Forensics Investigation Tools. J. Digital Forensic Practice, 3(1):46-61, 2010.
- Rafael Etges, Emma Sutcliffe. An Overview of Transnational Organized Cyber Crime. J. Digital Forensic Practice, 3(2-4):106-114, 2010.
- Mark Pollitt. Forensic Twitter. J. Digital Forensic Practice, 3(1):1-3, 2010.
- Thomas Gloe, Rainer Böhme. The Dresden Image Database for Benchmarking Digital Image Forensics. J. Digital Forensic Practice, 3(2-4):150-159, 2010.
- Kenneth Geers. The Cyber Threat to National Critical Infrastructures: Beyond Theory. J. Digital Forensic Practice, 3(2-4):124-130, 2010.
- Pawel Zwan, Andrzej Czyzewski. Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger. J. Digital Forensic Practice, 3(1):33-45, 2010.
- Edward H. Freeman. Computer Printouts as Legal Evidence. J. Digital Forensic Practice, 3(2-4):98-105, 2010.
- Greg Gogolin, James Jones. Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business. J. Digital Forensic Practice, 3(2-4):131-139, 2010.
- Gary C. Kessler. ::::Windows Forensic Analysis DVD Toolkit::::, 2nd edition. By Harlan Carvey. J. Digital Forensic Practice, 3(1):64-66, 2010.
- Jonathan Matusitz. Cyberterrorism: Postmodern State of Chaos. J. Digital Forensic Practice, 3(2-4):115-123, 2010.