{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:38:29Z","timestamp":1726004309698},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_28","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T16:02:50Z","timestamp":1546012970000},"page":"488-506","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations"],"prefix":"10.1007","author":[{"given":"Niken Dwi Wahyu","family":"Cahyani","sequence":"first","affiliation":[]},{"given":"Ben","family":"Martini","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Helen","family":"Ashman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"28_CR1","first-page":"415","volume":"15","author":"JK Plowman","year":"1995","unstructured":"Plowman, J.K.: Multimedia in the courtroom: a valuable tool or smoke and mirrors. Rev. Litig. 15, 415\u2013430 (1995)","journal-title":"Rev. Litig."},{"issue":"2","key":"28_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S0959-4752(02)00016-6","volume":"13","author":"RE Mayer","year":"2003","unstructured":"Mayer, R.E.: The promise of multimedia learning: using the same instructional design methods across different media. Learn. Instr. 13(2), 125\u2013139 (2003)","journal-title":"Learn. Instr."},{"key":"28_CR3","first-page":"1","volume":"49","author":"NDW Cahyani","year":"2016","unstructured":"Cahyani, N.D.W., Martini, B., Choo, K.-K.R.: Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Aust. J. Forensic Sci. 49, 1\u201317 (2016)","journal-title":"Aust. J. Forensic Sci."},{"key":"28_CR4","unstructured":"Cahyani, N.D.W., Martini, B., Choo, K.-K.R.: Using multimedia presentations to improve digital forensic understanding: a pilot study. In: 26th Australasian Conference on Information Systems, pp. 1\u201310. University of South Australia, South Australia (2015)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Cahyani, N.D.W., Martini, B., Choo, K.-K.R.: Using multimedia presentations to enhance the judiciary\u2019s technical understanding of digital forensic concepts: an Indonesian case study. In: 49th Annual Hawaii International Conference on System Sciences, pp. 5617\u20135626. IEEE Computer Society Press, Hawaii (2016)","DOI":"10.1109\/HICSS.2016.695"},{"issue":"2","key":"28_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.diin.2011.08.001","volume":"8","author":"J Beckett","year":"2011","unstructured":"Beckett, J., Slay, J.: Scientific underpinnings and background to standards and accreditation in digital forensics. Digit. Invest. 8(2), 114\u2013121 (2011)","journal-title":"Digit. Invest."},{"key":"28_CR7","first-page":"1","volume":"118","author":"R McKemmish","year":"1999","unstructured":"McKemmish, R.: What is forensic computing? Trends Issues Crime Crim. Justice 118, 1\u20136 (1999)","journal-title":"Trends Issues Crime Crim. Justice"},{"key":"28_CR8","unstructured":"Kessler, G., Fasulo, M.: The case for teaching network protocols to computer forensics examiners. In: Conference on Digital Forensics, Security and Law, pp. 115\u2013137. Association of Digital Forensics, Security and Law, United States (2007)"},{"issue":"3","key":"28_CR9","first-page":"1","volume":"1","author":"M Reith","year":"2002","unstructured":"Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1\u201312 (2002)","journal-title":"Int. J. Digit. Evid."},{"key":"28_CR10","unstructured":"Baryamureeba, V., Tushabe, F.: The enhanced digital investigation process model. In: Digital Forensic Research Conference, pp. 1\u20139. DFRWS, USA (2004)"},{"key":"28_CR11","first-page":"91","volume-title":"Digital Evidence and Computer Crime","author":"E Casey","year":"2004","unstructured":"Casey, E., Palmer, G.: The investigative process. In: Casey, E. (ed.) Digital Evidence and Computer Crime, 2nd edn, pp. 91\u2013114. Academic Press, London (2004)","edition":"2"},{"issue":"4","key":"28_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1219052","volume":"99","author":"A Yasinsac","year":"2003","unstructured":"Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., Sommer, P.M.: Computer forensics education. IEEE Secur. Priv. Mag. 99(4), 15\u201323 (2003)","journal-title":"IEEE Secur. Priv. Mag."},{"issue":"2","key":"28_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.4018\/jdcf.2012040103","volume":"4","author":"G Grispos","year":"2012","unstructured":"Grispos, G., Storer, T., Glisson, W.: Calm before the storm: the challenges of cloud computing in digital forensics. Int. J. Digit. Crime Forensics 4(2), 28\u201348 (2012)","journal-title":"Int. J. Digit. Crime Forensics"},{"issue":"2","key":"28_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.diin.2012.07.001","volume":"9","author":"B Martini","year":"2012","unstructured":"Martini, B., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digit. Invest. 9(2), 71\u201380 (2012)","journal-title":"Digit. Invest."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Wolthusen, S.D.: Overcast: forensic discovery in cloud environments. In: 5th International Conference on IT Security Incident Management and IT Forensics, pp. 3\u20139. IEEE (2009)","DOI":"10.1109\/IMF.2009.21"},{"key":"28_CR16","first-page":"22","volume":"19","author":"B Carney","year":"2004","unstructured":"Carney, B., Feigenson, N.: Visual persuasion in the Michael Skakel trial: enhancing advocacy through interactive media presentations. Crim. Justice 19, 22\u201336 (2004)","journal-title":"Crim. Justice"},{"issue":"2","key":"28_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/02602930801955978","volume":"34","author":"S Bloxham","year":"2009","unstructured":"Bloxham, S.: Marking and moderation in the UK: false assumptions and wasted resources. Assess. Eval. High Educ. 34(2), 209\u2013220 (2009)","journal-title":"Assess. Eval. High Educ."},{"issue":"1","key":"28_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/01411920500402037","volume":"32","author":"C Crook","year":"2006","unstructured":"Crook, C., Gross, H., Dymott, R.: Assessment relationships in higher education: the tension of process and practice. Brit. Educ. Res. J. 32(1), 95\u2013114 (2006)","journal-title":"Brit. Educ. Res. J."},{"key":"28_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511732997","volume-title":"Assessing Writing","author":"SC Weigle","year":"2002","unstructured":"Weigle, S.C.: Assessing Writing. Cambrigde University Press, Cambrigde (2002)"},{"issue":"1","key":"28_CR20","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1080\/15434300903464418","volume":"7","author":"K Barkaoui","year":"2010","unstructured":"Barkaoui, K.: Variability in ESL essay rating processes: the role of the rating scale and rater experience. Lang. Assess. Q. 7(1), 54\u201374 (2010)","journal-title":"Lang. Assess. Q."},{"key":"28_CR21","unstructured":"Jongsma, E.A., Mellott, D.K.: Computerized system and method for teaching and assessing the holistic scoring of open-ended questions. IFI CLAIMS Patent Services (2004). http:\/\/www.google.com\/patents\/US6768894"},{"key":"28_CR22","first-page":"16","volume":"256","author":"GR Schmitt","year":"2007","unstructured":"Schmitt, G.R.: Online DNA training targets lawyers, judges. NIJ J. 256, 16\u201318 (2007)","journal-title":"NIJ J."},{"key":"28_CR23","unstructured":"Varfi, T., Parmentier, S., Aertsen, I. (eds).: Developing judicial training for restorative justice: towards a European approach. European Forum for Restorative Justice, Leuven (2014)"},{"issue":"1","key":"28_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/07294360123776","volume":"20","author":"SJ Hanrahan","year":"2001","unstructured":"Hanrahan, S.J., Isaacs, G.: Assessing self-and peer-assessment: the students\u2019 views. High Educ. Res. Dev. 20(1), 53\u201370 (2001)","journal-title":"High Educ. Res. Dev."},{"key":"28_CR25","doi-asserted-by":"crossref","DOI":"10.1163\/9789004639690","volume-title":"Educating Judges: Towards a New Model of Continuing Judicial Learning","author":"L Armytage","year":"1996","unstructured":"Armytage, L.: Educating Judges: Towards a New Model of Continuing Judicial Learning, 1st edn. Kluwer Law International, Alphen aan den Rijn (1996)","edition":"1"},{"issue":"4","key":"28_CR26","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/S0004-9514(14)60393-7","volume":"42","author":"R Ladyshewsky","year":"1996","unstructured":"Ladyshewsky, R.: East meets west: the influence of language and culture in clinical education. Aust. J. Physiother. 42(4), 287\u2013294 (1996)","journal-title":"Aust. J. Physiother."},{"issue":"4","key":"28_CR27","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s11422-015-9669-5","volume":"10","author":"M Morales","year":"2015","unstructured":"Morales, M.: Influence of culture and language sensitive physics on science attitude enhancement. Cult. Stud. Sci. Educ. 10(4), 951\u2013984 (2015)","journal-title":"Cult. Stud. Sci. Educ."},{"issue":"4","key":"28_CR28","first-page":"61","volume":"7","author":"K Hout","year":"1996","unstructured":"Hout, K., de Bodo, R.: Technologies for courtroom presentation (with technical terms explained!). Pract. Litigator 7(4), 61\u201376 (1996)","journal-title":"Pract. Litigator"},{"key":"28_CR29","first-page":"38","volume":"9","author":"V Sainato","year":"2009","unstructured":"Sainato, V.: Evidentiary presentations and forensic technologies in the courtroom, the director\u2019s cut. J. Inst. Justice Int. Stud. 9, 38\u201352 (2009)","journal-title":"J. Inst. Justice Int. Stud."},{"issue":"5","key":"28_CR30","first-page":"24","volume":"31","author":"PJ Unger","year":"2014","unstructured":"Unger, P.J.: Technology for courtroom presentations. GP Solo 31(5), 24\u201330 (2014)","journal-title":"GP Solo"},{"issue":"1","key":"28_CR31","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0959-4752(01)00018-4","volume":"12","author":"RE Mayer","year":"2002","unstructured":"Mayer, R.E., Moreno, R.: Aids to computer-based multimedia learning. Learn Instr. 12(1), 107\u2013119 (2002)","journal-title":"Learn Instr."},{"issue":"2","key":"28_CR32","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1023\/A:1009627926302","volume":"12","author":"B Prabhakaran","year":"2000","unstructured":"Prabhakaran, B.: Adaptive multimedia presentation strategies. Multimedia Tools Appl. 12(2), 281\u2013298 (2000)","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T14:17:38Z","timestamp":1694528258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}