{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:05:05Z","timestamp":1767373505047},"publisher-location":"New York, NY","reference-count":15,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_3","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"41-52","source":"Crossref","is-referenced-by-count":5,"title":["Survey of Law Enforcement Perceptions Regarding Digital Evidence"],"prefix":"10.1007","author":[{"given":"M.","family":"Rogers","sequence":"first","affiliation":[]},{"given":"K.","family":"Scarborough","sequence":"additional","affiliation":[]},{"given":"K.","family":"Frakes","sequence":"additional","affiliation":[]},{"given":"C.","family":"San Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","volume-title":"Report on the Digital Evidence Needs Survey of State, Local and Tribal Law Enforcement","author":"A. E","year":"2005","unstructured":"E. Appel and M. Pollitt, Report on the Digital Evidence Needs Survey of State, Local and Tribal Law Enforcement, National Institute of Justice, U.S. Department of Justice, Washington, DC (\n                    http:\/\/www.jciac.org\/docs\/Digital%20Evidence%20Survey%20Report.pdf\n                    \n                  ), 2005."},{"key":"3_CR2","unstructured":"H. Armstrong and P. Russo, Electronic forensics education needs of law enforcement, Proceedings of the Eighth Colloquium on Information Systems Security Education, 2004."},{"key":"3_CR3","volume-title":"Computer Forensics and Privacy","author":"C. M","year":"2001","unstructured":"M. Caloyannides, Computer Forensics and Privacy, Artech House, Norwood, Massachusetts, 2001."},{"volume-title":"Handbook of Computer Crime Investigation: Forensic Tools and Technology","year":"2002","key":"3_CR4","unstructured":"E. Casey (Ed.), Handbook of Computer Crime Investigation: Forensic Tools and Technology, Elsevier, London, United Kingdom, 2002."},{"key":"3_CR5","volume-title":"Cybercrime: The Investigation, Prosecution and Defense of Computer-Related Crime","author":"C. R","year":"2006","unstructured":"R. Clifford, D. Moreau, M. Miquelon-Weismann, D. Lamb, I. Orton, J. Savage and S. Brenner, Cybercrime: The Investigation, Prosecution and Defense of Computer-Related Crime, Carolina Academic Press, Durham, North Carolina, 2006."},{"key":"3_CR6","unstructured":"B. Etter, The challenges of policing cyberspace, Proceedings of the NetSafe II Conference (\n                    http:\/\/www.netsafe.org.nz\/Doc_Library\/netsafepapers_barbaraetter_policing.pdf\n                    \n                  ), 2003."},{"key":"3_CR7","volume-title":"Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment","author":"Institute for Security Technology Studies ISTS)","year":"2002","unstructured":"Institute for Security Technology Studies (ISTS), Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment, Dartmouth College, Hanover, New Hampshire (\n                    http:\/\/www.ists.dartmouth.edu\/TAG\/lena.htm\n                    \n                  ), 2002."},{"key":"3_CR8","volume-title":"Law Enforcement Tools and Technologies for Investigating Cyber Attacks: Gap Analysis Report","author":"Institute for Security Technology Studies ISTS)","year":"2004","unstructured":"Institute for Security Technology Studies (ISTS), Law Enforcement Tools and Technologies for Investigating Cyber Attacks: Gap Analysis Report, Dartmouth College, Hanover, New Hampshire (\n                    http:\/\/www.ists.dartmouth.edu\/TAG\/gap_analysis.htm\n                    \n                  ), 2004."},{"issue":"1","key":"3_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1080\/10511250300085661","volume":"14","author":"L. E","year":"2003","unstructured":"E. Lambert, T. Nerbonne, P. Watson, J. Buss, A. Clarke, N. Hogan, S. Barton and J. Lambert, The forensic science needs of law enforcement applicants and recruits: A survey of Michigan law enforcement agencies, Journal of Criminal Justice Education, vol. 14(1), pp. 67\u201381, 2003.","journal-title":"Journal of Criminal Justice Education"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/15567280500541462","volume":"1","author":"L. M","year":"2006","unstructured":"M. Losavio, J. Adams and M. Rogers, Gap analysis: Judicial experience and perception of electronic evidence, Journal of Digital Forensic Practice, vol. 1(1), pp. 13\u201317, 2006.","journal-title":"Journal of Digital Forensic Practice"},{"volume-title":"Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes","year":"2002","key":"3_CR11","unstructured":"A. Marcella and R. Greenfield (Eds.), Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes, Auerbach\/CRC Press, Boca Raton, Florida, 2002."},{"issue":"12","key":"3_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1101779.1101796","volume":"48","author":"M. R","year":"2005","unstructured":"R. Mercuri, Challenges in forensic computing, Communications of the ACM, vol. 48(12), pp. 17\u201321, 2005.","journal-title":"Communications of the ACM"},{"key":"3_CR13","volume-title":"Bureau of Justice Statistics Bulletin","author":"R. B","year":"2002","unstructured":"B. Reaves and M. Hickman, Census of state and local law enforcement agencies, 2000, Bureau of Justice Statistics Bulletin, NCJ 194066, U.S. Department of Justice, Washington, DC (\n                    http:\/\/www.ojp.usdoj.gov\/bjs\/pub\/pdf\/cslleaOO.pdf\n                    \n                  ), 2002."},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cose.2004.01.003","volume":"23","author":"R. M","year":"2004","unstructured":"M. Rogers and K. Seigfried, The future of computer forensics: A needs analysis survey, Computers and Security, vol. 23(1), pp. 12\u201316, 2004.","journal-title":"Computers and Security"},{"key":"3_CR15","volume-title":"State and local law enforcement needs to combat electronic crime, National Institute of Justice","author":"S. H","year":"2000","unstructured":"H. Stambaugh, D. Beaupre, D. Icove, R. Baker, W. Cassady and W. Wiliams, State and local law enforcement needs to combat electronic crime, National Institute of Justice, U.S. Department of Justice, Washington, DC (\n                    http:\/\/www.ncjrs.gov\/pdffilesl\/nij\/183451.pdf\n                    \n                  ), 2000."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:19Z","timestamp":1619669839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_3","relation":{},"subject":[]}}