{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:59:29Z","timestamp":1742997569949,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184999"},{"type":"electronic","value":"9783319185002"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18500-2_9","type":"book-chapter","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T11:05:41Z","timestamp":1430305541000},"page":"101-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Innovative Approach in Digital Forensic Education and Training"],"prefix":"10.1007","author":[{"given":"Primo\u017e","family":"Cigoj","sequence":"first","affiliation":[]},{"given":"Borka Jerman","family":"Bla\u017ei\u010d","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Downes, S.E.: Learning 2.0. The eLearn Magazine (2005). \nhttp:\/\/www.elearnmag.org\/subpage.cfm?section=articles&article=29-1\n\n. Accessed 12 December 2014"},{"key":"9_CR2","unstructured":"Massachusetts Institute of Technology: Open course ware project. \nhttp:\/\/ocw.mit.edu\/index.htm\n\n. Accessed 1 December 2014"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1080\/15567280802047135","volume":"2","author":"M Pollitt","year":"2008","unstructured":"Pollitt, M., Nance, K., Hay, B., Dodge, R.C., Craiger, P., Burke, P., Brubaker, B.: Virtualization and digital forensics: a research and education agenda. J. Digital Forensic Pract. 2(2), 62\u201373 (2008)","journal-title":"J. Digital Forensic Pract."},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/1047124.1047403","volume":"37","author":"Larry Gottschalk","year":"2005","unstructured":"Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., Stein, M.: Computer forensics programs in higher education: a preliminary study. In: Proceedings of the ACM SIGCSE Bulletin, vol. 37, no. 1, pp. 147\u2013151. ACM Press, St. Louis (2005)","journal-title":"ACM SIGCSE Bulletin"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Taylor, C., Endicott-Popovsky, B., Phillips, A.: Forensics education: assessment and measures of excellence. In: 2007 Second International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 155\u2013165. IEEE (2012)","DOI":"10.1109\/SADFE.2007.11"},{"key":"9_CR6","unstructured":"Hartel, P., Junger, M., Wieringa, R.: Cyber-crime science\u00a0=\u00a0crime science\u00a0+\u00a0information security. twente university report. \nhttp:\/\/www.eprints.eemcs.utwente.nl\/18500\/\n\n. Accessed 1 December 2014"},{"key":"9_CR7","unstructured":"D-FET project. \nhttp:\/\/www.d-fet.eu\/project-overview\/\n\n. Accessed 5 December 2014"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Laisheng, X., Zhengxia, W.: Cloud computing a new business paradigm for E-learning. In: Proceeding of International Conference on Measuring Technology and Mechatronics Automation, pp. 716\u2013719 (2011)","DOI":"10.1109\/ICMTMA.2011.181"},{"key":"9_CR9","unstructured":"ISEC: Prevention and fight against crime. \nhttp:\/\/ec.europa.eu\/dgs\/home-affairs\/financing\/fundings\/security-and-safeguarding-liberties\/prevention-of-and-fight-against-crime\/index_en.htm\n\n. Accessed 18 Dec 2014"},{"key":"9_CR10","unstructured":"ISO, 2012. ISO 27037:2012: Information technology \u2014 security techniques \u2014 guidelines for identification, collection, acquisition, and preservation of digital evidence. Accessed 2 March 2015"},{"key":"9_CR11","unstructured":"Diagnostics for libguestfs. \nhttp:\/\/libguestfs.org\/libguestfs-test-tool.1.html\n\n. Accessed 5 December 2014"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education Across the Curriculum"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18500-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T14:26:14Z","timestamp":1589984774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18500-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184999","9783319185002"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18500-2_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}