{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:56:08Z","timestamp":1756994168970,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031815690"},{"type":"electronic","value":"9783031815706"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81570-6_23","type":"book-chapter","created":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T17:53:37Z","timestamp":1739296417000},"page":"351-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues"],"prefix":"10.1007","author":[{"given":"Norman","family":"Nelufule","sequence":"first","affiliation":[]},{"given":"Boitumelo","family":"Nkwe","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Shadung","sequence":"additional","affiliation":[]},{"given":"Kele","family":"Masemola","sequence":"additional","affiliation":[]},{"given":"Tanita","family":"Singano","sequence":"additional","affiliation":[]},{"given":"Japhtalina","family":"Mokoena","sequence":"additional","affiliation":[]},{"given":"Zamo","family":"Ngubane","sequence":"additional","affiliation":[]},{"given":"Ntombizodwa","family":"Thwala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,12]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Renold, A.P.: Survey of evidence collection methods for Internet of Things forensics. In: Proceedings of the 1st IEEE International Conference on Networking and Communications 2023, ICNWC 2023. Institute of Electrical and Electronics Engineers Inc. (2023). https:\/\/doi.org\/10.1109\/ICNWC57852.2023.10127407","DOI":"10.1109\/ICNWC57852.2023.10127407"},{"issue":"4","key":"23_CR2","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TBDATA.2017.2683521","volume":"5","author":"A Castiglione","year":"2019","unstructured":"Castiglione, A., Cattaneo, G., De Maio, G., De Santis, A., Roscigno, G.: A novel methodology to acquire live big data evidence from the cloud. IEEE Trans Big Data 5(4), 425\u2013438 (2019). https:\/\/doi.org\/10.1109\/TBDATA.2017.2683521","journal-title":"IEEE Trans Big Data"},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MCC.2017.39","volume":"4","author":"K-KR Choo","year":"2017","unstructured":"Choo, K.-K.R., Esposito, C., Castiglione, A.: Evidence and forensics in the cloud: challenges and future research directions. IEEE Cloud Comput. 4(3), 1\u20136 (2017)","journal-title":"IEEE Cloud Comput."},{"issue":"6","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TCSS.2019.2927431","volume":"6","author":"S Li","year":"2019","unstructured":"Li, S., Qin, T., Min, G.: Blockchain-based digital forensics investigation framework in the Internet of Things and social systems. IEEE Trans. Comput. Soc. Syst. 6(6), 1433\u20131441 (2019). https:\/\/doi.org\/10.1109\/TCSS.2019.2927431","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Tiwari, A., Mehrotra, V., Goel, S., Naman, K., Maurya, S., Agarwal, R.: Developing trends and challenges of digital forensics. In: 2021 5th International Conference on Information Systems and Computer Networks, ISCON 2021. Institute of Electrical and Electronics Engineers Inc. (2021). https:\/\/doi.org\/10.1109\/ISCON52037.2021.9702301","DOI":"10.1109\/ISCON52037.2021.9702301"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Silvarajoo, V.R., Yun Lim, S., Daud, P.: Digital evidence case management tool for collaborative digital forensics investigation. In: 2021 3rd International Cyber Resilience Conference, CRC 2021. Institute of Electrical and Electronics Engineers Inc., January 2021. https:\/\/doi.org\/10.1109\/CRC50527.2021.9392497","DOI":"10.1109\/CRC50527.2021.9392497"},{"key":"23_CR7","unstructured":"Lee, S., Kim, H., Lee, S., Lim, J.: Digital evidence collection process in integrity and memory information gathering. In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), Taipei, Tawan. IEEE, February, pp. 1\u201312 (2005)"},{"issue":"3","key":"23_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/19393555.2011.654317","volume":"21","author":"D Bennett","year":"2012","unstructured":"Bennett, D.: The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Inf. Secur. J. 21(3), 159\u2013168 (2012). https:\/\/doi.org\/10.1080\/19393555.2011.654317","journal-title":"Inf. Secur. J."},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Maheswari, K.U., Shobana, G.: The state of the art tools and techniques for remote digital forensic investigations. In: 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, pp. 464\u2013468. Institute of Electrical and Electronics Engineers Inc., May 2021. https:\/\/doi.org\/10.1109\/ICSPC51351.2021.9451718","DOI":"10.1109\/ICSPC51351.2021.9451718"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"153349","DOI":"10.1109\/ACCESS.2019.2946978","volume":"7","author":"M Pourvahab","year":"2019","unstructured":"Pourvahab, M., Ekbatanifard, G.: Digital forensics architecture for evidence collection and provenance preservation in IaaS cloud environment using SDN and blockchain technology. IEEE Access 7, 153349\u2013153364 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2946978","journal-title":"IEEE Access"},{"key":"23_CR11","doi-asserted-by":"publisher","unstructured":"Hemanth, J., Pelusi, D., Chen, J.I.-Z. (eds.): Intelligent Cyber Physical Systems and Internet of Things. Engineering Cyber-Physical Systems and Critical Infrastructures, vol. 3. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-18497-0","DOI":"10.1007\/978-3-031-18497-0"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Li, K.-C., Gupta, B.B., Agrawal, D.P.: Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 1st edn. CRC Press, Parkway (2021)","DOI":"10.1201\/9780429270567"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Yaacoub, J.P.A., Noura, H.N., Salman, O., Chehab, A.: Advanced digital forensics and anti-digital forensics for IoT systems: techniques, limitations and recommendations. Internet Things 19 (2022). https:\/\/doi.org\/10.1016\/j.iot.2022.100544","DOI":"10.1016\/j.iot.2022.100544"},{"issue":"3","key":"23_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10611-021-09986-7","volume":"77","author":"T Van Nguyen","year":"2022","unstructured":"Van Nguyen, T., Truong, T.V., Lai, C.K.: Legal challenges to combating cybercrime: an approach from Vietnam. Crime Law Soc. Change 77(3), 231\u2013252 (2022). https:\/\/doi.org\/10.1007\/s10611-021-09986-7","journal-title":"Crime Law Soc. Change"},{"key":"23_CR15","unstructured":"Chadd, K.: The history of cybercrime and cybersecurity, 1940\u20132020. Cybercrimes Mag., 1\u20135 (2020). https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/"},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Pieterse, H.: The cyber threat landscape in south africa: a 10-year review. Afr. J. Inf. Commun. 28 (2021). https:\/\/doi.org\/10.23962\/10539\/32213","DOI":"10.23962\/10539\/32213"},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Nortj\u00e9, J., Myburgh, D.C.: Forensic investigators in South Africa. PER\/PELJ 2019 (2019). https:\/\/doi.org\/10.17159\/1727","DOI":"10.17159\/1727"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Van Niekerk, B.: An analysis of cyber-incidents in South Africa. Afr. J. Inf. Commun. (AJIC) (20) (2017). https:\/\/doi.org\/10.23962\/10539\/23573","DOI":"10.23962\/10539\/23573"},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Avoine, G., Hernandez-Castro, J.: Security of Ubiquitous Computing Systems: Selected Topics. Springer, Cham (2021).https:\/\/doi.org\/10.1007\/978-3-030-10591-4.","DOI":"10.1007\/978-3-030-10591-4"},{"key":"23_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100015","volume":"5","author":"A Dimitriadis","year":"2020","unstructured":"Dimitriadis, A., Ivezic, N., Kulvatunyou, B., Mavridis, I.: D4I - digital forensics framework for reviewing and investigating cyber attacks. Array 5, 100015 (2020). https:\/\/doi.org\/10.1016\/j.array.2019.100015","journal-title":"Array"},{"key":"23_CR21","doi-asserted-by":"publisher","unstructured":"Pollitt, M., Caloyannides, M., Novotny, J., Shenoi, S.: Digital forensics: operational, legal and research issues. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XVII. IFIPIFIP, vol. 142, pp. 393\u2013403. Springer, Boston (2004). https:\/\/doi.org\/10.1007\/1-4020-8070-0_28","DOI":"10.1007\/1-4020-8070-0_28"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Nance, K., Ryan, D.J.: Legal aspects of digital forensics: a research agenda. In: Proceedings of the 44th Hawaii International Conference on Systems and Sciences, Kauai, HI, USA. IEEE, February 2011","DOI":"10.1109\/HICSS.2011.282"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Yaacoub, J.-P.A., Noura, H.N., Salman, O., Chehab, A.: Digital forensics vs. anti-digital forensics: techniques, limitations and recommendations, March 2021. http:\/\/arxiv.org\/abs\/2103.17028","DOI":"10.1016\/j.iot.2022.100544"},{"key":"23_CR24","doi-asserted-by":"publisher","unstructured":"Jansen, A.: Digital records forensics: ensuring authenticity and trustworthiness of evidence over time. In: 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, pp. 84\u201388. IEEE Computer Society (2010).https:\/\/doi.org\/10.1109\/SADFE.2010.20.","DOI":"10.1109\/SADFE.2010.20"},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Horsman, G., Lyle, J.R.: Dataset construction challenges for digital forensics. Forensic Sci. Int. Digit. Investig. 38 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301264","DOI":"10.1016\/j.fsidi.2021.301264"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Casino, F., et al.: Research trends, challenges, and emerging topics in digital forensics: a review of reviews. IEEE Access 10, 25464\u201325493 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3154059","DOI":"10.1109\/ACCESS.2022.3154059"},{"key":"23_CR27","unstructured":"Chow, K.P., et al.: Digital evidence search kit. IEEE, Taipei, Taiwan (2005)"},{"key":"23_CR28","doi-asserted-by":"publisher","unstructured":"Dewald, A.: Characteristic evidence, counter evidence and reconstruction problems in forensic computing. In: Proceedings - 9th International Conference on IT Security Incident Management and IT Forensics, IMF 2015, pp. 77\u201382. Institute of Electrical and Electronics Engineers Inc., August 2015. https:\/\/doi.org\/10.1109\/IMF.2015.15","DOI":"10.1109\/IMF.2015.15"},{"key":"23_CR29","doi-asserted-by":"publisher","unstructured":"Yadav, D., Mishra, M., Prakash, S.: Mobile forensics challenges and admissibility of electronic evidences in India. In: Proceedings - 5th International Conference on Computational Intelligence and Communication Networks, CICN 2013, pp. 237\u2013242 (2013). https:\/\/doi.org\/10.1109\/CICN.2013.57","DOI":"10.1109\/CICN.2013.57"},{"key":"23_CR30","doi-asserted-by":"publisher","unstructured":"Zhao, Z.: A framework to analyze reliability of digital evidences in computer systems. In: Proceedings - 2015 6th International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2015, pp. 21\u201325. Institute of Electrical and Electronics Engineers Inc., April 2016. https:\/\/doi.org\/10.1109\/ISDEA.2015.15","DOI":"10.1109\/ISDEA.2015.15"},{"key":"23_CR31","doi-asserted-by":"publisher","unstructured":"Moussa, A.F.: Electronic evidence and its authenticity in forensic evidence. Egypt. J. Forensic Sci. 11(1) (2021). https:\/\/doi.org\/10.1186\/s41935-021-00234-6","DOI":"10.1186\/s41935-021-00234-6"},{"key":"23_CR32","doi-asserted-by":"publisher","unstructured":"Azemovi\u0107, J., Mu\u0161i\u0107, D.: Methods for efficient digital evidence collecting of business processes and users activity in eLearning environments. In: IC4E 2010 - 2010 International Conference on e-Education, e-Business, e-Management and e-Learning, pp. 126\u2013130 (2010). https:\/\/doi.org\/10.1109\/IC4E.2010.92","DOI":"10.1109\/IC4E.2010.92"},{"issue":"2","key":"23_CR33","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.diin.2006.05.002","volume":"3","author":"BJ Nikkel","year":"2006","unstructured":"Nikkel, B.J.: Improving evidence acquisition from live network sources. Digit. Investig. 3(2), 89\u201396 (2006). https:\/\/doi.org\/10.1016\/j.diin.2006.05.002","journal-title":"Digit. Investig."},{"key":"23_CR34","doi-asserted-by":"publisher","unstructured":"Alenezi, A., Atlam, H.F., Alsagri, R., Alassafi, M.O., Wills, G.B.: IoT forensics: a state-of-the-art review, challenges and future directions. In: COMPLEXIS 2019 - Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk, pp. 106\u2013115. SciTePress (2019). https:\/\/doi.org\/10.5220\/0007905401060115","DOI":"10.5220\/0007905401060115"},{"key":"23_CR35","doi-asserted-by":"publisher","unstructured":"Khan, A., Wiil, U.K., Memon, N.: Digital forensics and crime investigation: legal issues in prosecution at national level. In: 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, pp. 133\u2013140 (2010).https:\/\/doi.org\/10.1109\/SADFE.2010.8","DOI":"10.1109\/SADFE.2010.8"},{"key":"23_CR36","doi-asserted-by":"publisher","first-page":"286","DOI":"10.17705\/1cais.03712","volume":"37","author":"G Schryen","year":"2015","unstructured":"Schryen, G.: Writing qualitative is literature reviews\u2014guidelines for synthesis, interpretation, and guidance of research. Commun. Assoc. Inf. Syst. 37, 286\u2013325 (2015). https:\/\/doi.org\/10.17705\/1cais.03712","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"23_CR37","doi-asserted-by":"publisher","unstructured":"Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering - a systematic literature review. Inf. Softw. Technol. 51(1), 7\u201315 (2009). https:\/\/doi.org\/10.1016\/j.infsof.2008.09.009","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"23_CR38","doi-asserted-by":"publisher","first-page":"250","DOI":"10.29007\/42v2","volume":"12","author":"G Oosterwyk","year":"2019","unstructured":"Oosterwyk, G., Brown, I., Geeling, S.: A synthesis of literature review guidelines from information systems journals. Kalpa Publ. Comput. 12, 250\u2013260 (2019)","journal-title":"Kalpa Publ. Comput."},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Khan, K.S., Kunz, R., Kleijnen, J., Antes, G.: Five steps to conducting a systematic review. J. R. Soc. Med. 96, 118\u2013121 (2003). http:\/\/www.ncbi.nlm.nib.gov\/entrez\/query\/","DOI":"10.1258\/jrsm.96.3.118"},{"key":"23_CR40","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1146\/annurev-psych-010418","volume":"70","author":"AP Siddaway","year":"2019","unstructured":"Siddaway, A.P., Wood, A.M., Hedges, L.V.: How to do a systematic review: a best practice guide for conducting and reporting narrative reviews, meta-analyses, and meta-syntheses. Annu. Rev. Psychol. 70, 747\u2013770 (2019). https:\/\/doi.org\/10.1146\/annurev-psych-010418","journal-title":"Annu. Rev. Psychol."},{"key":"23_CR41","doi-asserted-by":"crossref","unstructured":"Okoli, C.: A guide to conducting a standalone systematic literature review. Commun. Assoc. Inf. Syst. 37, 1\u201333 (2015). http:\/\/aisel.aisnet.org\/cais\/vol37\/iss1\/43","DOI":"10.17705\/1CAIS.03743"},{"key":"23_CR42","unstructured":"Michelle Liu, X.: A risk-based approach to cybersecurity: a case study of financial messaging networks data breaches. Coast. Bus. J. 18(1) (2021)"},{"key":"23_CR43","unstructured":"Motau, T.: The Great Bank Heist Investigator\u2019s Report to the Prudential: Venda Building Society (VBS), Johannesburg (2018)"},{"key":"23_CR44","unstructured":"Orion, P.: Complainant versus orion pharmaceutical email and website. Code Pract. Rev., 1\u20134 (2020)"},{"key":"23_CR45","unstructured":"Experian \u00ae Data Breach Resolution: Data Breach Industry Forecast 2020, Johannesburg (2020)"},{"key":"23_CR46","doi-asserted-by":"publisher","unstructured":"Salfati, E., Pease, M.: Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) (2022). https:\/\/doi.org\/10.6028\/NIST.IR.8428","DOI":"10.6028\/NIST.IR.8428"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Moabalobelo, T., Ngobeni, S., Molema, B., Phantsi, P., Dlamini, M., Nelufule, N.: Towards a privacy compliance assessment toolkit. In: IEEE IST-Africa Conference Proceedings, Pretoria, South Africa, pp. 1\u20138. IEEE, May 2023","DOI":"10.23919\/IST-Africa60249.2023.10187837"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Towards new e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81570-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T17:53:46Z","timestamp":1739296426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81570-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031815690","9783031815706"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81570-6_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"12 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICOMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Infrastructure and e-Services for Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bobo-Dioulasso","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Burkina Faso","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africom2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africommconference.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}