{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:02:32Z","timestamp":1757311352590,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587024"},{"type":"electronic","value":"9783030587031"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_3","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"46-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Digital Forensics Education Modules for Judicial Officials"],"prefix":"10.1007","author":[{"given":"Ragib","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jeffery T.","family":"Walker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"3_CR1","unstructured":"Federal Rules of Civil Procedure Rule 26. \nhttps:\/\/www.law.cornell.edu\/rules\/frcp\/rule_26"},{"key":"3_CR2","unstructured":"Federal Rules of Civil Procedure Rule 37. \nhttps:\/\/www.law.cornell.edu\/rules\/frcp\/rule_37"},{"key":"3_CR3","unstructured":"National Computer Forensics Institute (NCFI), Courses. \nhttps:\/\/www.ncfi.usss.gov\/ncfi\/pages\/courses.jsf"},{"key":"3_CR4","unstructured":"National District Attorneys Association, Digital Technology Training. \nhttp:\/\/www.ndaa.org\/digital_technology_training.html"},{"key":"3_CR5","unstructured":"Quality Matters Rubric. \nhttps:\/\/www.qualitymatters.org\/why-quality- matters\/about-qm"},{"key":"3_CR6","unstructured":"People v. Diaz, 51 Cal. 4th 84, 244 P. 3d 501 (2011)"},{"key":"3_CR7","unstructured":"Riley v. California, 134 S. Ct. 2473 \u2013 United States Supreme Court (2014)"},{"key":"3_CR8","unstructured":"Araiza, A.G.: Electronic discovery in the cloud. Duke L. Tech. Rev. 1 (2011)"},{"key":"3_CR9","unstructured":"BBC, Lostprophets\u2019 Ian Watkins: \u2018tech savvy\u2019 web haul, December 2013. \nhttp:\/\/www.bbc.com\/news\/uk- wales-25435751"},{"key":"3_CR10","unstructured":"Choo, K., Smith, R., McCusker, R.: \u201cfuture directions in technology-enabled crime: 2007\u201309.\u201d \u201cResearch and public policy series no. 78. Canberra: Australian Institute of Criminology\u201d (2007)"},{"key":"3_CR11","unstructured":"Clancy, T.K.: National center for justice and the rule of law (2004\u20132014). \nhttps:\/\/olemiss.edu\/depts\/ncjrl\/index.html"},{"key":"3_CR12","unstructured":"Dist. Court, SD Texas. Quantlab technologies ltd. v. Godlevsky. Civil Action No. 4: 09-cv-4039 (2014)"},{"key":"3_CR13","unstructured":"Dotzauer, E.: COE - Cybercrime Training for Judges and Prosecutors: a Concept"},{"key":"3_CR14","first-page":"1","volume":"19","author":"J Dykstra","year":"2012","unstructured":"Dykstra, J., Riehl, D.: Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing. Rich. JL Tech. 19, 1 (2012)","journal-title":"Rich. JL Tech."},{"key":"3_CR15","unstructured":"Feinberg, D., Adrian, M., Ronthal, A.: The future of the DBMS market is cloud (2019). \nhttps:\/\/www.gartner.com\/document\/3941821"},{"key":"3_CR16","first-page":"i","volume":"12","author":"DB Garrie","year":"2014","unstructured":"Garrie, D.B.: Digital forensic evidence in the courtroom: understanding content and quality. Nw. J. Tech. Intell. Prop. 12, i (2014)","journal-title":"Nw. J. Tech. Intell. Prop."},{"key":"3_CR17","unstructured":"Gartner Inc.: Gartner says that consumers will store more than a third of their digital content in the cloud by 2016 (2012). \nhttps:\/\/www.gartner.com\/newsroom\/id\/2060215"},{"key":"3_CR18","unstructured":"K & L Gates: E-discovery amendments to the federal rules of civil procedure go into effect today, December 2006. \nhttp:\/\/www.ediscoverylaw.com\/2006\/12\/articles\/news-updates\/ediscovery-amendments-to-the-federal-rules-of-civil-procedure-go-into"},{"issue":"14","key":"3_CR19","first-page":"800","volume":"10","author":"K Kent","year":"2006","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response. NIST Spec. Publ. 10(14), 800\u201386 (2006)","journal-title":"NIST Spec. Publ."},{"key":"3_CR20","unstructured":"Lunn, D.: Computer forensics-an overview. Sans Institute 2002, (2000)"},{"key":"3_CR21","first-page":"191","volume":"8","author":"JA Nicholson","year":"2012","unstructured":"Nicholson, J.A.: Plus ultra: third-party preservation in a cloud computing paradigm. Hastings Bus. LJ 8, 191 (2012)","journal-title":"Hastings Bus. LJ"},{"key":"3_CR22","first-page":"119","volume":"2","author":"AA Proia","year":"2015","unstructured":"Proia, A.A., Simshaw, D.: Cybersecurity and the legal profession. Cybersecur. Our Dig. Lives 2, 119 (2015)","journal-title":"Cybersecur. Our Dig. Lives"},{"key":"3_CR23","first-page":"10","volume":"774","author":"J Robbins","year":"2008","unstructured":"Robbins, J.: An explanation of computer forensics. Natl. Foren. Center 774, 10\u2013143 (2008)","journal-title":"Natl. Foren. Center"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: 7th IFIP International Conference on Digital Forensics (2011)","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"3_CR25","first-page":"1561","volume":"52","author":"J Smith","year":"2012","unstructured":"Smith, J.: Electronic discovery: the challenges of reaching into the cloud. Santa Clara L. Rev. 52, 1561 (2012)","journal-title":"Santa Clara L. Rev."},{"key":"3_CR26","unstructured":"Stacy, S.: Litigation holds: ten tips in ten minutes (2014). \nhttps:\/\/www.ned.uscourts.gov\/internetDocs\/cle\/2010-07\/LitigationHoldTopTen.pdf"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Stufflebeam, D.L.: The CIPP model for evaluation. In: International Handbook of Educational Evaluation, pp. 31\u201362. Springer (2003)","DOI":"10.1007\/978-94-010-0309-4_4"},{"key":"3_CR28","unstructured":"The Federal Bureau of Investigation: Piecing together digital evidence (2013). \nhttps:\/\/www.fbi.gov\/news\/stories\/2013\/january\/piecing-together-digital-evidence"},{"key":"3_CR29","unstructured":"Vance, J.: Partnering with the U.S. Attorney to Fight Cyber Crime. Cyber 2020, University of Alabama at Birmingham, October 2016"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Wiles, J., Cardwell, K., Reyes, A.: The Best DAMN Cybercrime and Digital Forensics Book period. Syngress Media Inc. (2007)","DOI":"10.1016\/B978-1-59749-228-7.00002-3"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, X., Choo, K.K.R.: Digital Forensic Education: An Experiential Learning Approach, vol. 61. Springer (2019)","DOI":"10.1007\/978-3-030-23547-5"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:04:57Z","timestamp":1599545097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}