{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:29:02Z","timestamp":1743139742430,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030235468"},{"type":"electronic","value":"9783030235475"}],"license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-23547-5_1","type":"book-chapter","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T07:11:56Z","timestamp":1563952316000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Experiential Learning in Digital Forensics"],"prefix":"10.1007","author":[{"given":"Xiaolu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Timothy T.","family":"Yuen","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ahsan, M.M., Wahab, A.W.A., Idris, M.Y.I., Khan, S., Bachura, E., Choo, K.-K.R.: Class: cloud log assuring soundness and secrecy scheme for cloud forensics. IEEE Trans. Sustain. Comput. (2018)","DOI":"10.1109\/TSUSC.2018.2833502"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3177847","volume":"51","author":"Konstantia Barmpatsalou","year":"2018","unstructured":"Barmpatsalou, K., Cruz, T., Monteiro, E., Sim\u00f5es, P.: Current and future trends in mobile device forensics: a survey. ACM Comput. Surv. 51(3), 46:1\u201346:31 (2018). \n                  https:\/\/doi.org\/10.1145\/3177847","journal-title":"ACM Computing Surveys"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Cloyd, T., Osborn, T., Ellingboe, B., Glisson, W.B., Choo, K.R.: Browser analysis of residual facebook data. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering, Trustcom\/Bigdatase 2018, New York, NY, USA, 1\u20133 August 2018, pp. 1440\u20131445 (2018). \n                  https:\/\/doi.org\/10.1109\/Trust-Com\/BigDataSE.2018.00200","DOI":"10.1109\/Trust-Com\/BigDataSE.2018.00200"},{"issue":"1","key":"1_CR4","first-page":"5","volume":"40","author":"JS Coker","year":"2017","unstructured":"Coker, J.S., Heiser, E., Taylor, L., Book, C.: Impacts of experiential learning depth and breadth on student outcomes. J. Exp. Educ. 40(1), 5\u201323 (2017)","journal-title":"J. Exp. Educ."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"DOrazio, C., Ariffin, A., Choo, K.-K.R.: IoS anti-forensics: how can we securely conceal, delete and insert data? In: 2014 47th Hawaii International Conference on System Sciences, pp. 4838\u20134847 (2014)","DOI":"10.1109\/HICSS.2014.594"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.future.2016.11.010","volume":"79","author":"Christian J. D\u2019Orazio","year":"2018","unstructured":"D\u2019Orazio, C.J., Choo, K.R.: Circumventing IoS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps. Future Gener. Comput. Syst. 79, 247\u2013261 (2018). \n                  https:\/\/doi.org\/10.1016\/j.future.2016.11.010","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"1_CR7","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1111\/1556-4029.13393","volume":"62","author":"B Eterovic-Soric","year":"2017","unstructured":"Eterovic-Soric, B., Choo, K.-K.R., Mubarak, S., Ashman, H.: Windows 7 antiforensics: a review and a novel approach. J. Forensic Sci. 62(4), 1054\u20131070 (2017)","journal-title":"J. Forensic Sci."},{"issue":"3","key":"1_CR8","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1080\/20961790.2018.1503526","volume":"3","author":"H Guo","year":"2018","unstructured":"Guo, H., Hou, J.: Review of the accreditation of digital forensics in China. Forensic Sci. Res. 3(3), 194\u2013201 (2018)","journal-title":"Forensic Sci. Res."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"22385","DOI":"10.1109\/ACCESS.2017.2759766","volume":"5","author":"Luuc Van Der Horst","year":"2017","unstructured":"Horst, L.V.D., Choo, K.R., Le-Khac, N.: Process memory investigation of the Bitcoin clients electrum and Bitcoin core. IEEE Access 5, 22385\u201322398 (2017). \n                  https:\/\/doi.org\/10.1109\/ACCESS.2017.2759766","journal-title":"IEEE Access"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906149","volume":"49","author":"Suleman Khan","year":"2016","unstructured":"Khan, S., Gani, A., Wahab, A.W.A., Bagiwa, M.A., Shiraz, M., Khan, S.U., Zomaya, A.Y.: Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. 49(1), 7:1\u20137:42 (2016). \n                  https:\/\/doi.org\/10.1145\/2906149","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"1_CR11","doi-asserted-by":"crossref","first-page":"193","DOI":"10.5465\/amle.2005.17268566","volume":"4","author":"AY Kolb","year":"2005","unstructured":"Kolb, A.Y., Kolb, D.A.: Learning styles and learning spaces: enhancing experiential learning in higher education. Acad. Manag. Learn. Educ. 4(2), 193\u2013212 (2005)","journal-title":"Acad. Manag. Learn. Educ."},{"key":"1_CR12","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1007\/978-1-4419-1428-6_227","volume-title":"Encyclopedia of the Sciences of Learning","author":"Alice Y. Kolb","year":"2012","unstructured":"Kolb, A.Y., Kolb, D.A.: Experiential learning theory. In: Encyclopedia of the Sciences of Learning, pp. 1215\u20131219. Springer, Berlin (2012)"},{"key":"1_CR13","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.compedu.2013.10.013","volume":"72","author":"Abdullah Konak","year":"2014","unstructured":"Konak, A., Clark, T.K., Nasereddin, M.: Using Kolb\u2019s experiential learning cycle to improve student learning in virtual computer laboratories. Comput. Educ. 72, 11\u201322 (2014)","journal-title":"Computers & Education"},{"issue":"6","key":"1_CR14","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1111\/1556-4029.13203","volume":"61","author":"Ming Di Leom","year":"2016","unstructured":"Leom, M.D., Choo, K.-K.R., Hunt, R.: Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci. 61(6), 1473\u20131492 (2016)","journal-title":"Journal of Forensic Sciences"},{"key":"1_CR15","first-page":"211","volume-title":"Introductory Computer Forensics","author":"Xiaodong Lin","year":"2018","unstructured":"Lin, X.: File carving. In: Introductory Computer Forensics, pp. 211\u2013233. Springer, Berlin (2018)"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Mata, N., Beebe, N., Choo, K.R.: Are your neighbors Swingers or Kinksters? Feeld app forensic analysis. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering, Trustcom\/Bigdatase 2018, New York, NY, USA, 1\u20133 August 2018, pp. 1433\u20131439 (2018). \n                  https:\/\/doi.org\/10.1109\/Trust-Com\/BigDataSE.2018.00199","DOI":"10.1109\/Trust-Com\/BigDataSE.2018.00199"},{"key":"1_CR17","unstructured":"My, A., Rights, C., Justice, S.: American bar association. Perspectives (2018)"},{"issue":"4","key":"1_CR18","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.diin.2014.09.002","volume":"11","author":"D Quick","year":"2014","unstructured":"Quick, D., Choo, K.-K.R.: Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digit. Investig. 11(4), 273\u2013294 (2014)","journal-title":"Digit. Investig."},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jnca.2016.11.018","volume":"86","author":"Darren Quick","year":"2017","unstructured":"Quick, D., Choo, K.R.: Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Netw. Comput. Appl. 86, 24\u201333 (2017). \n                  https:\/\/doi.org\/10.1016\/j.jnca.2016.11.018","journal-title":"Journal of Network and Computer Applications"},{"key":"1_CR20","series-title":"SpringerBriefs on Cyber Security Systems and Networks","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7763-0","volume-title":"Big Digital Forensic Data","author":"Darren Quick","year":"2018","unstructured":"Quick, D., Choo, K.R.: Big Digital Forensic Data - Volume 1: Data Reduction Framework and Selective Imaging. Springer, Berlin (2018). \n                  https:\/\/doi.org\/10.1007\/978-981-10-7763-0"},{"key":"1_CR21","series-title":"SpringerBriefs on Cyber Security Systems and Networks","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0263-3","volume-title":"Big Digital Forensic Data","author":"Darren Quick","year":"2018","unstructured":"Quick, D., Choo, K.R.: Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence. Springer, Berlin (2018). \n                  https:\/\/doi.org\/10.1007\/978-981-13-0263-3"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"47566","DOI":"10.1109\/ACCESS.2018.2867466","volume":"6","author":"Darren Quick","year":"2018","unstructured":"Quick, D., Choo, K.R.: IoT device forensics and data reduction. IEEE Access 6, 47566\u201347574 (2018). \n                  https:\/\/doi.org\/10.1109\/ACCESS.2018.2867466","journal-title":"IEEE Access"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Rondeau, C.M., Temple, M.A., Lopez, J.: Industrial IoT cross-layer forensic investigation. In: Wiley Interdisciplinary Reviews: Forensic Science, p. e1322 (2019)","DOI":"10.1002\/wfs2.1322"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Shetty, R., Grispos, G., Choo, K.R.: Are you dating danger? an interdisciplinary approach to evaluating the (in)security of android dating apps. IEEE Trans. Sustain. Comput. (2019). \n                  https:\/\/doi.org\/10.1109\/TSUSC.2017.2783858","DOI":"10.1109\/TSUSC.2017.2783858"},{"key":"1_CR25","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.diin.2017.08.004","volume":"23","author":"Kai Shi","year":"2017","unstructured":"Shi, K., Xu, M., Jin, H., Qiao, T., Yang, X., Zheng, N., Choo, K.R.: A novel file carving algorithm for national marine electronics association (NMEA) logs in GPS forensics. Digit. Investig. 23, 11\u201321 (2017). \n                  https:\/\/doi.org\/10.1016\/j.diin.2017.08.004","journal-title":"Digital Investigation"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-78816-6_7","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"Cory Smith","year":"2018","unstructured":"Smith, C., Dietrich, G., Choo, K.R.: Identification of forensic artifacts in VMWare virtualized computing. In: Security and Privacy in Communication Networks - Securecomm 2017 International Workshops, ATCS and Sepriot, Niagara Falls, Canada, 22\u201325 October 2017, Proceedings, pp. 85\u2013103 (2017). \n                  https:\/\/doi.org\/10.1007\/978-3-319-78816-6_7"},{"issue":"3","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"Matthew C. Stamm","year":"2011","unstructured":"Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3\u20132), 1050\u20131065 (2011). \n                  https:\/\/doi.org\/10.1109\/TIFS.2011.2119314","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.future.2018.08.029","volume":"91","author":"Tejaswi Volety","year":"2019","unstructured":"Volety, T., Saini, S., McGhin, T., Liu, C.Z., Choo, K.R.: Cracking Bitcoin wallets: i want what you have in the wallets. Future Gener. Comput. Syst. 91, 136\u2013143 (2019). \n                  https:\/\/doi.org\/10.1016\/j.future.2018.08.029","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"1_CR29","first-page":"645","volume":"9","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Hu, L., Song, S., Xie, Z., Meng, X., Zhao, K.: Windows volatile memory forensics based on correlation analysis. J. Netw. 9(3), 645\u2013653 (2014)","journal-title":"J. Netw."},{"key":"1_CR30","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.diin.2016.03.002","volume":"17","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Breitinger, F., Baggili, I.: Rapid android parser for investigating DEX files (RAPID). Digit. Investig. 17, 28\u201339 (2016)","journal-title":"Digit. Investig."},{"key":"1_CR31","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.cose.2017.07.011","volume":"70","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Baggili, I., Breitinger, F.: Breaking into the vault: privacy, security and forensic analysis of android vault applications. Comput. Secur. 70, 516\u2013531 (2017)","journal-title":"Comput. Secur."},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, X., Grannis, J., Baggili, I., Beebe, N.L.: Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system. Digit. Investig. (2019)","DOI":"10.1016\/j.diin.2019.02.003"}],"container-title":["Studies in Big Data","Digital Forensic Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23547-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T09:33:04Z","timestamp":1563960784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23547-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"ISBN":["9783030235468","9783030235475"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23547-5_1","relation":{},"ISSN":["2197-6503","2197-6511"],"issn-type":[{"type":"print","value":"2197-6503"},{"type":"electronic","value":"2197-6511"}],"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"25 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}