{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:59:55Z","timestamp":1769831995945,"version":"3.49.0"},"publisher-location":"Boston, MA","reference-count":30,"publisher":"Springer US","isbn-type":[{"value":"9780387723662","type":"print"},{"value":"9780387723679","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_2","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"13-24","source":"Crossref","is-referenced-by-count":32,"title":["Digital Forensic Readiness as a Component of Information Security Best Practice"],"prefix":"10.1007","author":[{"given":"C P","family":"Grobler","sequence":"first","affiliation":[]},{"given":"C P","family":"Louwrens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"American Heritage Dictionary (4th Edition), (New York, NY: Houghton Mifflin, 2000)."},{"issue":"2","key":"2_CR2","first-page":"32","volume":"8","author":"A. Cullery","year":"2003","unstructured":"Cullery A, Computer Forensics: Past Present And Future, Information Security Technical Report, Volume 8, number 2, (Elsevier, 2003), p 32\u201335.","journal-title":"Computer Forensics: Past Present And Future, Information Security Technical Report"},{"key":"2_CR3","unstructured":"Dictionary.Com, (June 31, 2006), http:\/\/www.dictionary.reference.com ."},{"key":"2_CR4","unstructured":"4. Digital Forensic Research Workshop, A Roadmap for Digital Forensics Research,(2001), http:\/\/www.dfrws.org ."},{"key":"2_CR5","unstructured":"Endicott-Popovsky B, Frincke D, Adding the 4th R: A Systems Approach to Solving the Hackers Arms Race, Proceedings of the 2006 Symposium 39th Hawai International Conference on System Sciences, (2006)."},{"key":"2_CR6","unstructured":"Garcia J, 2006, Pro-Active and Re-Active Forensics, (September 5, 2006), http:\/\/www.jessland.net ."},{"key":"2_CR7","unstructured":"Gordon La, Loeb M, Richardson R, Lucyshyn W, 2006 CSI\/FBI Computer Crime and Security Survey, (Computer Security Institute, 2006)."},{"key":"2_CR8","unstructured":"Grobler CP, VonSolms SH, A Model To Assess The Information Security Status of an Organization with Special Reference to the Policy Dimension, Master\u2019s Dissertation, (2004)."},{"key":"2_CR9","unstructured":"Hilley, 2004, The Corporation: The Non-Policed State, (September 24, 2006), http:\/\/www.infosecurity-magaqzine.com\/features\/novdec04\/corpnovdec.htm ."},{"key":"2_CR10","unstructured":"Hoffman T, 2004, Sarbanes-Oxley Sparks Forensics Apps Interest, (March 29, 2004), http:\/\/www.Computerworld,com\/action\/article . do?command=viewarticlebasic&a rticleid=91676."},{"key":"2_CR11","unstructured":"Inforenz, 2006, Are You Ready For Forensics?, (September 14, 2006), http:\/\/www.Inforenz.com\/press\/20060223.html ."},{"key":"2_CR12","unstructured":"Cobit: Control Objectives for Information and related technologies, (IT Governance Institute, 3rd edition, 2000)"},{"key":"2_CR13","unstructured":"King II Report on Corporate Governance, (August, 2003), http:\/\/www.iodsa.co.za\/lod%20draft%20king%20report.pdf ."},{"key":"2_CR14","unstructured":"Kruse II, Warren G, Jay G Heiser JG, Computer Forensics Incident Response Essentials, (Addison Wesley, Pearson Education 2004)."},{"key":"2_CR15","unstructured":"Louwrens B, Von Solms SH, Reeckie C, Grobler T, A Control Framework for Digital Forensics, Advances in Digital Forensics, (Springer, 2006)."},{"key":"2_CR16","unstructured":"Patzakis J, Computer Forensics as an Integral Component of Information Security Enterprise, Guidance Software, (October 24, 2005), http:\/\/www.guidancesoftware.com ."},{"key":"2_CR17","first-page":"276","volume":"2","author":"S. Quinn","year":"2005","unstructured":"Quinn S, Examining The State of Preparedness of IT Management in New Zealand for Events that may require Forensic Analysis, Digital Investigation, December 2005, Volume 2, Issue 4, (Elsevier, 2005), p. 276\u2013280.","journal-title":"Examining The State of Preparedness of IT Management in New Zealand for Events that may require Forensic Analysis"},{"key":"2_CR18","unstructured":"Reith M, Varr V, Gunch G, An Examination of Digital Forensic Models. International Journal Of Digital Evidence Volume 1, Issue 3, (Elsevier, 2002), (February 15, 2005), http:\/\/www.ijde.org\/docs\/02art2.pdf ."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Rosseau Von Solms, SH (Basie) Von Solms, Information Security Governance: Due Care, Computers And Security, (August 13, 2006), doi:10:1016\/Jcose.","DOI":"10.1016\/j.cose.2006.08.013"},{"key":"2_CR20","unstructured":"Rowlingson, A Ten Step Process for Forensic Readiness, International Journal of Digital Evidence, Volume 2 Issue 3, Winter 2004, (Elsevier, 2004). 24"},{"key":"2_CR21","unstructured":"21. SABS ISO\/IEC17799. SABS Edition 11\/iso\/iec Editionl, South African Standard, Code of Practice for Information Security Management, (South African Bureau of Standards, 2001)."},{"key":"2_CR22","unstructured":"Sheldon A, Forensic Auditing, The Role of Computer Forensics in the Corporate Toolbox, (March 25, 2004), http:\/\/www.itsecurity.com\/papers\/pll.htm ."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Sinangin D, Computer Forensics Investigations in a Corporate Environment, Computer Fraud and Security Bulletin, Volume 8, p. 11\u201314, June 2002, (Elsevier, 2002).","DOI":"10.1016\/S1361-3723(02)00610-3"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Stephenson P, Conducting Incident Post Mortems, Computer Fraud and Security, April 2003, (Elsevier, 2003).","DOI":"10.1016\/S1361-3723(03)04012-0"},{"key":"2_CR25","unstructured":"The Electronic Communications and Transactions Act, (2003), http:\/\/www.gov.za\/gazette\/regulation\/2003\/24594a.pdf ."},{"key":"2_CR26","unstructured":"Sarbarnes-Oxley Act of 2002, (October 20, 2006), http:\/\/www.frwebgate.access.gpo.gov\/cgi-bin\/getdoc.cgi?dbname=107_cong_bills&docid=f:h3763enr.txt.pdf ."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Von Solms SH, Information Security Governance: Cobit or ISO17799 or both, Computers and Security, Volume 24, Issue 2, March 2005, (Elsevier, 2005).","DOI":"10.1016\/j.cose.2005.02.002"},{"issue":"3","key":"2_CR28","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2006.03.004","volume":"25","author":"S.H. Solms Von","year":"2006","unstructured":"Von Solms SH, Information Security: The Fourth Wave, Computers and Security, Volume 25, Issue 3, May 2006, (Elsevier, 2006), p. 165\u2013168.","journal-title":"Computers and Security"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Von Solms SH, Louwrens CP. Relationship between Digital Forensics, Corporate Governance, Information Technology and Information Security Governance, (Information Security Of South Africa Conference 2005 Proceeding, 2005).","DOI":"10.4018\/978-1-59140-872-7.ch011"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Wolfe H, The question of organizational forensic policy, Computer Fraud and Security, Volume 6, June 2004, (Elsevier, 2004), p. 13\u201314.","DOI":"10.1016\/S1361-3723(04)00077-6"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T13:34:20Z","timestamp":1684071260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_2","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2007]]}}}