{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:28Z","timestamp":1725538228408},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_1","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T08:04:42Z","timestamp":1254211482000},"page":"3-15","source":"Crossref","is-referenced-by-count":2,"title":["Digital Forensics as a Surreal Narrative"],"prefix":"10.1007","author":[{"given":"Mark","family":"Pollitt","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Narratology: Introduction to the Theory of Narrative","author":"M. Bal","year":"1997","unstructured":"M. Bal, Narratology: Introduction to the Theory of Narrative, University of Toronto Press, Toronto, Canada, 1997."},{"key":"1_CR2","first-page":"3","volume-title":"Advances in Digital Forensics","author":"N. Beebe","year":"2005","unstructured":"N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 3\u201316, 2005."},{"issue":"1-2","key":"1_CR3","first-page":"1","volume":"15","author":"W. Benjamin","year":"1984","unstructured":"W. Benjamin, Theoretics of knowledge; theory of progress, Philosophical Forum, vol. 15(1-2), pp. 1\u201340, 1984.","journal-title":"Philosophical Forum"},{"key":"1_CR4","volume-title":"Les Manifestes du Surrealisme","author":"A. Breton","year":"1972","unstructured":"A. Breton, Les Manifestes du Surrealisme, Jean-Jacques Pauvert, Paris, France, 1972."},{"key":"1_CR5","volume-title":"Mastering Windows Network Forensics and Investigation","author":"S. Bunting","year":"2007","unstructured":"S. Bunting and S. Anson, Mastering Windows Network Forensics and Investigation, Sybex, Alameda, California, 2007."},{"key":"1_CR6","volume-title":"File System Forensic Analysis","author":"B. Carrier","year":"2005","unstructured":"B. Carrier, File System Forensic Analysis, Addison-Wesley, Boston, Massachusetts, 2005."},{"key":"1_CR7","volume-title":"Windows Forensic Analysis","author":"H. Carvey","year":"2007","unstructured":"H. Carvey, Windows Forensic Analysis, Syngress, Rockland, Massachusetts, 2007."},{"key":"1_CR8","volume-title":"Digital Evidence and Computer Crime","author":"E. Casey","year":"2004","unstructured":"E. Casey, Digital Evidence and Computer Crime, Academic Press, Boston, Massachusetts, 2004."},{"issue":"1","key":"1_CR9","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1080\/00043249.1987.10792339","volume":"46","author":"J. Gibson","year":"1987","unstructured":"J. Gibson, Surrealism before Freud: Dynamic psychiatry\u2019s \u201csimple recording instrument,\u201d Art Journal, vol. 46(1), pp. 56\u201360, 1987.","journal-title":"Art Journal"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1007\/978-3-540-24767-8_74","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"J. Guan","year":"2004","unstructured":"J. Guan, D. Liu and T. Wang, Applications of fuzzy data mining methods for intrusion detection systems, Proceedings of the International Conference on Computational Science and its Applications, pp. 706\u2013714, 2004."},{"key":"1_CR11","volume-title":"The Shadow and its Shadow: Surrealist Writings on the Cinema","author":"P. Hammond","year":"2000","unstructured":"P. Hammond, The Shadow and its Shadow: Surrealist Writings on the Cinema, City Lights Books, San Francisco, California, 2000."},{"key":"1_CR12","first-page":"67","volume-title":"Advances in Digital Forensics","author":"M. Hoeschele","year":"2005","unstructured":"M. Hoeschele and M. Rogers, Detecting social engineering, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 67\u201377, 2005."},{"key":"1_CR13","volume-title":"Computer Forensics: Incident Response Essentials","author":"W. Kruse","year":"2001","unstructured":"W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley, Boston, Massachusetts, 2001."},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.2307\/589352","volume":"33","author":"E. Leach","year":"1982","unstructured":"E. Leach, The social theory of Claude Levi-Strauss, British Journal of Sociology, vol. 33(1), pp. 148\u2013149, 1982.","journal-title":"British Journal of Sociology"},{"volume-title":"Theodor W. Adorno and Walter Benjamin: The Complete Correspondence, 1928-1940","year":"1999","key":"1_CR15","unstructured":"H. Lonitz (Ed.), Theodor W. Adorno and Walter Benjamin: The Complete Correspondence, 1928-1940, Harvard University Press, Cambridge, Massachusetts, 1999."},{"key":"1_CR16","unstructured":"P. Lyman and H. Varian, How much information? University of California, Berkeley, California (www2.sims.berkeley.edu\/research \/projects\/how-much-info-2003), 2003."},{"key":"1_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/9780849383298","volume-title":"Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes","author":"A. Marcella","year":"2007","unstructured":"A. Marcella and D. Menendez, Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes, Auerbach Publications, Boca Raton, Florida, 2007."},{"key":"1_CR18","volume-title":"Orality and Literacy","author":"W. Ong","year":"2002","unstructured":"W. Ong, Orality and Literacy, Routledge, New York, 2002."},{"volume-title":"Advances in Digital Forensics","year":"2005","key":"1_CR19","unstructured":"M. Pollitt and S. Shenoi (Eds.), Advances in Digital Forensics, Springer, Boston, Massachusetts, 2005."},{"key":"1_CR20","volume-title":"The Avant-Garde Finds Andy Hardy","author":"R. Ray","year":"1995","unstructured":"R. Ray, The Avant-Garde Finds Andy Hardy, Harvard University Press, Cambridge, Massachusetts, 1995."},{"key":"1_CR21","unstructured":"Scientific Working Groups on Digital Evidence and Imaging Technology, SWGDE and SWGIT Digital and Multimedia Evidence Glossary (www.swgde.org\/documents\/swgde2008\/SWGDE_ SWGITGlossaryV2.2.pdf), 2007."},{"key":"1_CR22","unstructured":"TheFreeDictionary.com, text (www.thefreedictionary.com\/text)."},{"key":"1_CR23","unstructured":"M. Wesch, Digital ethnography (mediatedcultures.net\/about.htm)."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T16:45:42Z","timestamp":1710607542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}