1. VoIP: What is it Good for?
2. Beckett, J. (2005). Forensic Computing: Experts, Certification and the Categorisation of Roles. Paper presented at the Colloquium for Information Systems Security Education - Asia Pacific, Adelaide, Australia.
3. The real national-security needs for VoIP
4. Broucek, V., & Turner, P. (2001). Forensic Computing: Developing a Conceptual Approach for an Emerging Academic Discipline. Paper presented at the 5th Australian Security Research Symposium, Perth, Australia.
5. Broucek, V., & Turner, P. (2002). Bridging the Divide: Rising Awareness of Forensic Issues amongst Systems Administrators. Paper presented at the 3rd International System Administration and Networking Conference, Maastricht, The Netherlands, 27-31 May.