{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:46:50Z","timestamp":1757778410782,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672076"},{"type":"electronic","value":"9783319672083"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67208-3_2","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T12:21:00Z","timestamp":1504095660000},"page":"23-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Model for Digital Evidence Admissibility Assessment"],"prefix":"10.1007","author":[{"given":"Albert","family":"Antwi-Boasiako","sequence":"first","affiliation":[]},{"given":"Hein","family":"Venter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"key":"2_CR1","unstructured":"Ami-Narh, J., Williams, P.: Digital forensics and the legal system: a dilemma of our time. In: Proceedings of the Sixth Australian Digital Forensics Conference (2008)"},{"key":"2_CR2","unstructured":"Association of Chief Police Officers, Good Practice Guide for Computer-Based Evidence. United Kingdom, London (2008)"},{"key":"2_CR3","volume-title":"Essentials of the Ghana Law of Evidence","author":"S Brobbey","year":"2014","unstructured":"Brobbey, S.: Essentials of the Ghana Law of Evidence. Datro Publications, Accra (2014)"},{"key":"2_CR4","volume-title":"Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet","author":"E Casey","year":"2011","unstructured":"Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Academic Press, Waltham (2011)"},{"key":"2_CR5","unstructured":"Garrie, D., Morrissy, J.: Digital forensic evidence in the courtroom: Understanding content and quality. Northwestern Journal of Technology and Intellectual Property 12(2), article no. 5 (2014)"},{"key":"2_CR6","unstructured":"Giova, G.: Improving chain of custody in forensic investigations of electronic digital systems. International Journal of Computer Science and Network Security 11(1) (2011)"},{"key":"2_CR7","unstructured":"Grobler, M.: Digital forensic standards: international progress. In: Proceedings of the South African Information Security Multi-Conference, pp. 261\u2013271 (2010)"},{"key":"2_CR8","unstructured":"International Organization of Standardization, Information Technology \u2013 Security Techniques \u2013 Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence, ISO\/IEC 27037:2012 Standard, Geneva, Switzerland (2012)"},{"key":"2_CR9","unstructured":"International Organization of Standardization, Information Technology \u2013 Security Techniques \u2013 Guidance on Assuring Suitability and Adequacy of Incident Investigative Methods, ISO\/IEC 27041:2015 Standard, Geneva, Switzerland (2015)"},{"key":"2_CR10","unstructured":"International Organization of Standardization, Information Technology \u2013 Security Techniques \u2013 Incident Investigation Principles and Processes, ISO\/IEC 27043:2015 Standard, Geneva, Switzerland (2015)"},{"issue":"1","key":"2_CR11","first-page":"55","volume":"6","author":"G Kessler","year":"2011","unstructured":"Kessler, G.: Judges\u2019 awareness, understanding and application of digital evidence. Journal of Digital Forensics, Security and Law 6(1), 55\u201372 (2011)","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"2_CR12","unstructured":"Leigland, R., Krings, A.: A formalization of digital forensics. International Journal of Digital Evidence 3(2) (2004)"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/1360086042000223508","volume":"18","author":"O Leroux","year":"2004","unstructured":"Leroux, O.: Legal admissibility of electronic evidence. International Review of Law, Computers and Technology 18(2), 193\u2013222 (2004)","journal-title":"International Review of Law, Computers and Technology"},{"key":"2_CR14","volume-title":"Electronic Evidence","author":"S Mason","year":"2012","unstructured":"Mason, S.: Electronic Evidence. Butterworths Law, London (2012)"},{"key":"2_CR15","unstructured":"National Forensic Science Technology Center, Crime Scene Investigation: A Guide for Law Enforcement, Largo, Florida (2013)"},{"key":"2_CR16","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York (2001)"},{"key":"2_CR17","unstructured":"Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. International Journal of Digital Evidence 1(3) (2002)"},{"key":"2_CR18","volume-title":"Practical Digital Evidence: Law and Technology, Part I","author":"E Roffeh","year":"2015","unstructured":"Roffeh, E.: Practical Digital Evidence: Law and Technology, Part I. CreateSpace Independent Publishing Platform, Seattle (2015)"},{"key":"2_CR19","unstructured":"Schroeder, S.: How to be a digital forensic expert witness. In: Proceedings of the First International Conference on Systematic Approaches to Digital Forensic Engineering, pp. 69\u201385 (2005)"},{"key":"2_CR20","unstructured":"Scientific Working Group on Digital Evidence, SWGDE Best Practices for Computer Forensics, Version 3.1 (2014). www.swgde.org\/documents\/Current%20Documents\/SWGDE%20Best%20Practices%20for%20Computer%20Forensics"},{"key":"2_CR21","unstructured":"Technical Working Group for Electronic Crime Scene Investigation, Electronic Crime Scene Investigation: A Guide for First Responders. National Institute of Justice, Washington, DC (2001)"},{"key":"2_CR22","unstructured":"U.S. Supreme Court, Daubert v. Merrell Dow Pharmaceuticals Inc., United States Reports, vol. 509, pp. 579\u2013601 (1983)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Valjarevic, A., Venter, H.: Harmonized digital forensic process model. In: Proceedings of the Information Security for South Africa Conference (2012)","DOI":"10.1109\/ISSA.2012.6320441"},{"key":"2_CR24","volume-title":"Developing a Computer Forensics Team, InfoSec Reading Room","author":"C Vecchio-Flaim","year":"2001","unstructured":"Vecchio-Flaim, C.: Developing a Computer Forensics Team, InfoSec Reading Room. SANS Institute, Bethesda (2001)"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67208-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:04:58Z","timestamp":1630368298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67208-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672076","9783319672083"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67208-3_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 February 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgram2017.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}